Searched refs:payload (Results 351 - 375 of 665) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/chrome/browser/policy/test/
H A Dpolicy_testserver.py708 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
709 if payload is None:
711 payload = settings.SerializeToString()
714 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
715 if payload is None:
717 payload = settings.SerializeToString()
720 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
721 if payload is None:
722 payload = self.CreatePolicyForExternalPolicyData(policy_key)
749 policy_data.policy_value = payload
[all...]
/external/libnfc-nxp/src/
H A DphHciNfc_RFReaderA.c836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]);
839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] )
840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i]))
845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i])
1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout;
1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS;
1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
1081 hcp_message->payload[i++] =
1084 hcp_message->payload[i++] =
1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
[all...]
H A DphHciNfc_ISO15693.c596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i]))
605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
692 hcp_message->payload[i++] =
695 hcp_message->payload[i++] =
698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gpsk.c278 const u8 *payload,
292 end = payload + payload_len;
294 pos = eap_gpsk_process_id_server(data, payload, end);
548 const u8 *payload,
566 data->specifier, payload, pos - payload, mic)
587 const u8 *payload,
600 end = payload + payload_len;
602 pos = eap_gpsk_validate_rand(data, payload, end);
606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po
274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument
583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
H A Deap_sake.c145 const u8 *payload,
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
189 const u8 *payload,
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
289 const u8 *payload,
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gpsk.c278 const u8 *payload,
292 end = payload + payload_len;
294 pos = eap_gpsk_process_id_server(data, payload, end);
548 const u8 *payload,
566 data->specifier, payload, pos - payload, mic)
587 const u8 *payload,
600 end = payload + payload_len;
602 pos = eap_gpsk_validate_rand(data, payload, end);
606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po
274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument
583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
H A Deap_sake.c145 const u8 *payload,
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
189 const u8 *payload,
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
289 const u8 *payload,
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c278 const u8 *payload,
292 end = payload + payload_len;
294 pos = eap_gpsk_process_id_server(data, payload, end);
548 const u8 *payload,
566 data->specifier, payload, pos - payload, mic)
587 const u8 *payload,
600 end = payload + payload_len;
602 pos = eap_gpsk_validate_rand(data, payload, end);
606 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po
274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument
583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
H A Deap_sake.c145 const u8 *payload,
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
189 const u8 *payload,
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
289 const u8 *payload,
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
/external/fio/
H A Dclient.c834 struct cmd_ts_pdu *p = (struct cmd_ts_pdu *) cmd->payload;
867 struct group_run_stats *gs = (struct group_run_stats *) cmd->payload;
874 struct cmd_text_pdu *pdu = (struct cmd_text_pdu *) cmd->payload;
923 struct cmd_du_pdu *du = (struct cmd_du_pdu *) cmd->payload;
1051 struct jobs_eta *je = (struct jobs_eta *) cmd->payload;
1070 struct cmd_probe_reply_pdu *probe = (struct cmd_probe_reply_pdu *) cmd->payload;
1095 struct cmd_start_pdu *pdu = (struct cmd_start_pdu *) cmd->payload;
1115 struct cmd_end_pdu *pdu = (struct cmd_end_pdu *) cmd->payload;
1122 struct cmd_text_pdu *pdu = (struct cmd_text_pdu *) cmd->payload;
1202 struct cmd_iolog_pdu *pdu = (struct cmd_iolog_pdu *) cmd->payload;
[all...]
/external/chromium_org/components/policy/core/common/cloud/
H A Duser_cloud_policy_store_unittest.cc75 InitPolicyPayload(&policy_.payload());
87 void InitPolicyPayload(enterprise_management::CloudPolicySettings* payload) { argument
88 payload->mutable_passwordmanagerenabled()->set_value(true);
89 payload->mutable_urlblacklist()->mutable_value()->add_entries(
214 InitPolicyPayload(&unsigned_builder.payload());
331 first_policy.payload().mutable_passwordmanagerenabled()->set_value(false);
/external/chromium_org/third_party/webrtc/modules/rtp_rtcp/source/
H A Drtcp_sender_unittest.cc188 void CreateRtpPacket(const bool marker_bit, const uint8_t payload, argument
192 ASSERT_TRUE(payload <= 127);
194 array[(*cur_pos)++] = payload | (marker_bit ? 0x80 : 0);
205 // VP8 payload header
352 const uint8_t payload = 100; local
357 CreateRtpPacket(marker_bit, payload, seq_num, timestamp, ssrc, packet_,
364 codec_inst.plType = payload;
/external/libpcap/
H A Dpcap-netfilter-linux.c128 const unsigned char *payload = NULL; local
174 payload = NFA_DATA(payload_attr);
179 payload = NLMSG_DATA(nlh);
183 if (payload) {
188 bpf_filter(handle->fcode.bf_insns, payload, pkth.len, pkth.caplen))
191 callback(user, &pkth, payload);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwnm_ap.c373 const u8 *payload; local
379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1;
380 action = *payload++;
385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload,
389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload,
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
/external/wpa_supplicant_8/src/ap/
H A Dwnm_ap.c373 const u8 *payload; local
379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1;
380 action = *payload++;
385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload,
389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload,
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwnm_ap.c373 const u8 *payload; local
379 payload = ((const u8 *) mgmt) + IEEE80211_HDRLEN + 1;
380 action = *payload++;
385 ieee802_11_rx_bss_trans_mgmt_query(hapd, mgmt->sa, payload,
389 ieee802_11_rx_bss_trans_mgmt_resp(hapd, mgmt->sa, payload,
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/
H A DBaseTreeAdaptor.as27 * if no token payload but you might have to set token type for diff
215 * token DECL, but you need to create it as a payload or whatever for
218 * If you care what the token payload objects' type is, you should
227 * token DECL, but you need to create it as a payload or whatever for
236 * If you care what the token payload objects' type is, you should
244 public function createWithPayload(payload:Token):Object {
/external/chromium_org/chrome/browser/ui/views/toolbar/
H A Dbrowser_action_view.cc174 std::pair<const std::string, const std::string>* payload = local
177 if (extension()->id() == payload->first &&
178 payload->second ==
/external/chromium_org/net/quic/
H A Dquic_framer.h40 // Number of bytes reserved to store payload length in stream frame.
114 // |payload| is the non-encrypted FEC protected payload of the packet.
115 virtual void OnFecProtectedPayload(base::StringPiece payload) = 0;
162 // |payload| is the non-encrypted FEC protected payload of the packet.
164 base::StringPiece payload) = 0;
248 // might be null padded past the end of the payload, which will be correctly
254 // Return true if the packet was processed succesfully. |payload| must be
255 // the complete DECRYPTED payload o
[all...]
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/
H A Dbrw_wm_pass0.c375 /* Initialize payload "registers".
384 &c->payload.depth[j] );
393 &c->payload.depth[c->key.source_depth_reg/2]);
398 &c->payload.input_interp[i] );
H A Dbrw_wm_pass2.c82 prealloc_reg(c, &c->payload.depth[j], i++);
91 prealloc_reg(c, &c->payload.input_interp[j], i++);
112 prealloc_reg(c, &c->payload.input_interp[fp_index], i);
/external/chromium_org/third_party/webrtc/test/channel_transport/
H A Dudp_socket2_manager_win.cc473 memset(&item->payload.ioContext,0,sizeof(PerIoContext));
474 item->payload.base = item;
479 return &((IoContextPoolItem*)pListEntry)->payload.ioContext;
/external/mesa3d/src/mesa/drivers/dri/i965/
H A Dbrw_wm_pass0.c375 /* Initialize payload "registers".
384 &c->payload.depth[j] );
393 &c->payload.depth[c->key.source_depth_reg/2]);
398 &c->payload.input_interp[i] );
H A Dbrw_wm_pass2.c82 prealloc_reg(c, &c->payload.depth[j], i++);
91 prealloc_reg(c, &c->payload.input_interp[j], i++);
112 prealloc_reg(c, &c->payload.input_interp[fp_index], i);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c142 * @payload: Payload to be sent
143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
198 os_memmove(pos, payload, payload_len);
217 crypto_hash_update(hmac, payload, payload_len);
150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument

Completed in 859 milliseconds

<<11121314151617181920>>