/external/chromium_org/chrome/browser/policy/test/ |
H A D | policy_testserver.py | 708 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 709 if payload is None: 711 payload = settings.SerializeToString() 714 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 715 if payload is None: 717 payload = settings.SerializeToString() 720 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 721 if payload is None: 722 payload = self.CreatePolicyForExternalPolicyData(policy_key) 749 policy_data.policy_value = payload [all...] |
/external/libnfc-nxp/src/ |
H A D | phHciNfc_RFReaderA.c | 836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]); 839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] ) 840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i])) 845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i]) 1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout; 1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS; 1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, 1081 hcp_message->payload[i++] = 1084 hcp_message->payload[i++] = 1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, [all...] |
H A D | phHciNfc_ISO15693.c | 596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i])) 605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 692 hcp_message->payload[i++] = 695 hcp_message->payload[i++] = 698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 278 const u8 *payload, 292 end = payload + payload_len; 294 pos = eap_gpsk_process_id_server(data, payload, end); 548 const u8 *payload, 566 data->specifier, payload, pos - payload, mic) 587 const u8 *payload, 600 end = payload + payload_len; 602 pos = eap_gpsk_validate_rand(data, payload, end); 606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_sake.c | 145 const u8 *payload, 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 const u8 *payload, 208 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 const u8 *payload, 304 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 278 const u8 *payload, 292 end = payload + payload_len; 294 pos = eap_gpsk_process_id_server(data, payload, end); 548 const u8 *payload, 566 data->specifier, payload, pos - payload, mic) 587 const u8 *payload, 600 end = payload + payload_len; 602 pos = eap_gpsk_validate_rand(data, payload, end); 606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_sake.c | 145 const u8 *payload, 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 const u8 *payload, 208 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 const u8 *payload, 304 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 278 const u8 *payload, 292 end = payload + payload_len; 294 pos = eap_gpsk_process_id_server(data, payload, end); 548 const u8 *payload, 566 data->specifier, payload, pos - payload, mic) 587 const u8 *payload, 600 end = payload + payload_len; 602 pos = eap_gpsk_validate_rand(data, payload, end); 606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_sake.c | 145 const u8 *payload, 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 const u8 *payload, 208 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 const u8 *payload, 304 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/fio/ |
H A D | client.c | 834 struct cmd_ts_pdu *p = (struct cmd_ts_pdu *) cmd->payload; 867 struct group_run_stats *gs = (struct group_run_stats *) cmd->payload; 874 struct cmd_text_pdu *pdu = (struct cmd_text_pdu *) cmd->payload; 923 struct cmd_du_pdu *du = (struct cmd_du_pdu *) cmd->payload; 1051 struct jobs_eta *je = (struct jobs_eta *) cmd->payload; 1070 struct cmd_probe_reply_pdu *probe = (struct cmd_probe_reply_pdu *) cmd->payload; 1095 struct cmd_start_pdu *pdu = (struct cmd_start_pdu *) cmd->payload; 1115 struct cmd_end_pdu *pdu = (struct cmd_end_pdu *) cmd->payload; 1122 struct cmd_text_pdu *pdu = (struct cmd_text_pdu *) cmd->payload; 1202 struct cmd_iolog_pdu *pdu = (struct cmd_iolog_pdu *) cmd->payload; [all...] |
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | user_cloud_policy_store_unittest.cc | 75 InitPolicyPayload(&policy_.payload()); 87 void InitPolicyPayload(enterprise_management::CloudPolicySettings* payload) { argument 88 payload->mutable_passwordmanagerenabled()->set_value(true); 89 payload->mutable_urlblacklist()->mutable_value()->add_entries( 214 InitPolicyPayload(&unsigned_builder.payload()); 331 first_policy.payload().mutable_passwordmanagerenabled()->set_value(false);
|
/external/chromium_org/third_party/webrtc/modules/rtp_rtcp/source/ |
H A D | rtcp_sender_unittest.cc | 188 void CreateRtpPacket(const bool marker_bit, const uint8_t payload, argument 192 ASSERT_TRUE(payload <= 127); 194 array[(*cur_pos)++] = payload | (marker_bit ? 0x80 : 0); 205 // VP8 payload header 352 const uint8_t payload = 100; local 357 CreateRtpPacket(marker_bit, payload, seq_num, timestamp, ssrc, packet_, 364 codec_inst.plType = payload;
|
/external/libpcap/ |
H A D | pcap-netfilter-linux.c | 128 const unsigned char *payload = NULL; local 174 payload = NFA_DATA(payload_attr); 179 payload = NLMSG_DATA(nlh); 183 if (payload) { 188 bpf_filter(handle->fcode.bf_insns, payload, pkth.len, pkth.caplen)) 191 callback(user, &pkth, payload);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wnm_ap.c | 373 const u8 *payload; local 379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1; 380 action = *payload++; 385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload, 389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload, 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wnm_ap.c | 373 const u8 *payload; local 379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1; 380 action = *payload++; 385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload, 389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload, 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wnm_ap.c | 373 const u8 *payload; local 379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1; 380 action = *payload++; 385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload, 389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload, 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/ |
H A D | BaseTreeAdaptor.as | 27 * if no token payload but you might have to set token type for diff 215 * token DECL, but you need to create it as a payload or whatever for 218 * If you care what the token payload objects' type is, you should 227 * token DECL, but you need to create it as a payload or whatever for 236 * If you care what the token payload objects' type is, you should 244 public function createWithPayload(payload:Token):Object {
|
/external/chromium_org/chrome/browser/ui/views/toolbar/ |
H A D | browser_action_view.cc | 174 std::pair<const std::string, const std::string>* payload = local 177 if (extension()->id() == payload->first && 178 payload->second ==
|
/external/chromium_org/net/quic/ |
H A D | quic_framer.h | 40 // Number of bytes reserved to store payload length in stream frame. 114 // |payload| is the non-encrypted FEC protected payload of the packet. 115 virtual void OnFecProtectedPayload(base::StringPiece payload) = 0; 162 // |payload| is the non-encrypted FEC protected payload of the packet. 164 base::StringPiece payload) = 0; 248 // might be null padded past the end of the payload, which will be correctly 254 // Return true if the packet was processed succesfully. |payload| must be 255 // the complete DECRYPTED payload o [all...] |
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/ |
H A D | brw_wm_pass0.c | 375 /* Initialize payload "registers". 384 &c->payload.depth[j] ); 393 &c->payload.depth[c->key.source_depth_reg/2]); 398 &c->payload.input_interp[i] );
|
H A D | brw_wm_pass2.c | 82 prealloc_reg(c, &c->payload.depth[j], i++); 91 prealloc_reg(c, &c->payload.input_interp[j], i++); 112 prealloc_reg(c, &c->payload.input_interp[fp_index], i);
|
/external/chromium_org/third_party/webrtc/test/channel_transport/ |
H A D | udp_socket2_manager_win.cc | 473 memset(&item->payload.ioContext,0,sizeof(PerIoContext)); 474 item->payload.base = item; 479 return &((IoContextPoolItem*)pListEntry)->payload.ioContext;
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_wm_pass0.c | 375 /* Initialize payload "registers". 384 &c->payload.depth[j] ); 393 &c->payload.depth[c->key.source_depth_reg/2]); 398 &c->payload.input_interp[i] );
|
H A D | brw_wm_pass2.c | 82 prealloc_reg(c, &c->payload.depth[j], i++); 91 prealloc_reg(c, &c->payload.input_interp[j], i++); 112 prealloc_reg(c, &c->payload.input_interp[fp_index], i);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 142 * @payload: Payload to be sent 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 198 os_memmove(pos, payload, payload_len); 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|