Searched refs:payload (Results 276 - 300 of 665) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/ipc/
H A Dipc_perftest_support.cc102 std::string payload; variable
103 EXPECT_TRUE(iter.ReadString(&payload));
108 if (payload == "hello") {
110 } else if (payload == "quit") {
123 msg->WriteString(payload);
/external/chromium_org/third_party/WebKit/Source/platform/heap/
H A DHeap.cpp304 // memory region) that is used for the actual heap page payload.
322 // Setup the payload one OS page into the page memory. The
331 // [ guard os page | ... payload ... | guard os page ]
461 HeapObjectHeader* HeapObjectHeader::fromPayload(const void* payload) argument
463 Address addr = reinterpret_cast<Address>(const_cast<void*>(payload));
496 HeapObjectHeader::finalize(m_gcInfo, payload(), payloadSize());
545 if (heapObjectHeader()->hasVTable() && !vTableInitialized(payload())) {
548 ASSERT(isUninitializedMemory(header->payload(), header->payloadSize()));
558 if (gcInfo()->hasVTable() && !vTableInitialized(payload())) {
561 ASSERT(isUninitializedMemory(header->payload(), heade
580 fromPayload(const void* payload) argument
792 Address payload = header->payload(); local
[all...]
/external/chromium_org/net/http/
H A Dhttp_stream_parser.cc526 const base::StringPiece payload(request_body_read_buf_->data(), result);
528 result = EncodeChunk(payload,
1015 int HttpStreamParser::EncodeChunk(const base::StringPiece& payload, argument
1018 if (output_size < payload.size() + kChunkHeaderFooterSize)
1025 static_cast<int>(payload.size()));
1027 // Add the payload if any.
1028 if (payload.size() > 0) {
1029 memcpy(cursor, payload.data(), payload.size());
1030 cursor += payload
[all...]
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/
H A Dpacket_buffer_unittest.cc58 packet->payload = new uint8_t[payload_size_bytes];
173 EXPECT_EQ(0, current_pt); // Current payload type changed to 0.
174 EXPECT_EQ(0xFF, current_cng_pt); // CNG payload type not changed.
181 // Test inserting a list of packets. Last packet is of a different payload type.
195 // Insert 11th packet of another payload type (not CNG).
214 EXPECT_EQ(1, current_pt); // Current payload type changed to 0.
215 EXPECT_EQ(0xFF, current_cng_pt); // CNG payload type not changed.
257 // Primary payload.
261 // Secondary payload.
278 // Special case for the dropped primary payload
[all...]
/external/libnfc-nxp/src/
H A DphHciNfc_Felica.c786 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]);
788 && ((FEL_MULTIPLE_TAGS_FOUND == message->payload[i] )
789 || (FEL_SINGLE_TAG_FOUND == message->payload[i]))
794 if (FEL_MULTIPLE_TAGS_FOUND == message->payload[i])
945 hcp_message->payload[i++] = nxp_nfc_felica_timeout ;
947 hcp_message->payload[i++] = FELICA_STATUS;
949 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
966 hcp_message->payload[i++] =
968 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
/external/antlr/antlr-3.4/runtime/C/src/
H A Dantlr3commontreeadaptor.c47 static pANTLR3_BASE_TREE create (pANTLR3_BASE_TREE_ADAPTOR adpator, pANTLR3_COMMON_TOKEN payload);
48 static pANTLR3_BASE_TREE dbgCreate (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload);
259 create (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload) argument
265 ct = ((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum->newFromToken(((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum, payload);
272 dbgCreate (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload) argument
276 ct = create(adaptor, payload);
284 * token DECL, but you need to create it as a payload or whatever for
287 * If you care what the token payload objects' type is, you should
310 * token DECL, but you need to create it as a payload or whatever for
319 * If you care what the token payload object
[all...]
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime.Tree/
H A DTreeWizard.cs100 public TreePattern(IToken payload) : argument
101 base(payload) {
113 public WildcardTreePattern(IToken payload) : argument
114 base(payload) {
120 public override object Create(IToken payload) { argument
121 return new TreePattern(payload);
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/
H A DTreeWizard.cs109 public TreePattern( IToken payload ) :
110 base( payload )
128 public WildcardTreePattern( IToken payload ) :
129 base( payload )
137 public override object Create( IToken payload )
139 return new TreePattern( payload );
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/
H A Djspipe_test.cc51 // nodes: [ name, payload ]
53 const char* operation, PP_Var payload) {
64 PP_Var payload_key = VarFromCStr(var_iface, "payload");
68 dict_iface->Set(message, payload_key, payload);
71 var_iface->Release(payload);
162 // "payload": payload
167 const char* payload,
185 PP_Var key3 = VarFromCStr(var_iface, "payload");
198 // Verify the payload
52 CreatePipeMessage(PepperInterface* ppapi, const char* pipe, const char* operation, PP_Var payload) argument
164 VerifyPipeMessage(PP_Var message, const char* pipe_name, const char* operation, const char* payload, int payload_length, int32_t int_payload=0) argument
[all...]
/external/chromium_org/third_party/webrtc/modules/audio_coding/codecs/isac/main/test/
H A DsimpleKenny.c105 uint16_t payload[600]; local
138 printf("-plim payloadLim..... payload limit in bytes,\n");
313 printf("cannot set maximum payload size %d.\n", payloadLimit);
357 if(fread(payload, 1, auxSizet, inp) < auxSizet)
359 printf("last payload is corrupted\n");
379 (uint8_t*)payload);
403 payload, stream_len, packetData.rtp_number,
445 if (fwrite(payload, 1, stream_len,
463 declen = WebRtcIsac_Decode(ISAC_main_inst, payload,
534 // printf("Maximum payload lowe
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c290 const u8 *payload, size_t payloadlen)
304 const u8 *payload, size_t payloadlen)
314 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
367 const u8 *payload, size_t payloadlen)
377 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
402 const u8 *payload, size_t payloadlen)
287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_cred.c377 pos = hdr.payload;
390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
399 pos = hdr.payload + hdr.length;
412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c290 const u8 *payload, size_t payloadlen)
304 const u8 *payload, size_t payloadlen)
314 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
367 const u8 *payload, size_t payloadlen)
377 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
402 const u8 *payload, size_t payloadlen)
287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_cred.c377 pos = hdr.payload;
390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
399 pos = hdr.payload + hdr.length;
412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c290 const u8 *payload, size_t payloadlen)
304 const u8 *payload, size_t payloadlen)
314 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
367 const u8 *payload, size_t payloadlen)
377 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
402 const u8 *payload, size_t payloadlen)
287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_cred.c377 pos = hdr.payload;
390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
399 pos = hdr.payload + hdr.length;
412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/
H A DInstructionCodec.java473 * payload target instructions.
758 PackedSwitchPayloadDecodedInstruction payload =
760 int[] targets = payload.getTargets();
763 out.write(payload.getOpcodeUnit());
765 out.writeInt(payload.getFirstKey());
794 SparseSwitchPayloadDecodedInstruction payload =
796 int[] keys = payload.getKeys();
797 int[] targets = payload.getTargets();
800 out.write(payload.getOpcodeUnit());
864 FillArrayDataPayloadDecodedInstruction payload
[all...]
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/
H A Ddebug.rb21 def create_with_payload( payload )
23 @debug_listener.create_node( node, payload )
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
H A Dextensions.py224 original_payload_size = len(frame.payload)
233 frame.payload = self._deflater.filter(frame.payload)
236 filtered_payload_size = len(frame.payload)
249 received_payload_size = len(frame.payload)
257 frame.payload = self._inflater.filter(frame.payload)
260 filtered_payload_size = len(frame.payload)
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/sync/
H A DChromiumSyncAdapterTest.java52 public void requestSync(int objectSource, String objectId, long version, String payload) { argument
56 mPayload = payload;
/external/chromium_org/chrome/browser/chromeos/policy/
H A Ddevice_system_use_24hour_clock_browsertest.cc120 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
146 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
/external/chromium_org/chrome/browser/extensions/api/push_messaging/
H A Dpush_messaging_api.h42 const std::string& payload);
48 const std::string& payload) OVERRIDE;
H A Dpush_messaging_apitest.cc99 const std::string& payload) {
101 syncer::Invalidation::Init(object_id, version, payload));
125 GetEventRouter()->TriggerMessageForTest(extension->id(), 1, "payload");
150 ExtensionAndSubchannelToObjectId(extension->id(), 1), 5, "payload");
96 EmitInvalidation( const invalidation::ObjectId& object_id, int64 version, const std::string& payload) argument
/external/chromium_org/chromeos/dbus/
H A Deasy_unlock_client.cc76 virtual void CreateSecureMessage(const std::string& payload,
85 AppendStringAsByteArray(payload, &writer);
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/
H A Dextensions.py269 original_payload_size = len(frame.payload)
279 frame.payload = self._rfc1979_deflater.filter(
280 frame.payload, bfinal=self._bfinal)
283 filtered_payload_size = len(frame.payload)
298 received_payload_size = len(frame.payload)
307 frame.payload = self._rfc1979_inflater.filter(frame.payload)
310 filtered_payload_size = len(frame.payload)

Completed in 974 milliseconds

<<11121314151617181920>>