/external/chromium_org/ipc/ |
H A D | ipc_perftest_support.cc | 102 std::string payload; variable 103 EXPECT_TRUE(iter.ReadString(&payload)); 108 if (payload == "hello") { 110 } else if (payload == "quit") { 123 msg->WriteString(payload);
|
/external/chromium_org/third_party/WebKit/Source/platform/heap/ |
H A D | Heap.cpp | 304 // memory region) that is used for the actual heap page payload. 322 // Setup the payload one OS page into the page memory. The 331 // [ guard os page | ... payload ... | guard os page ] 461 HeapObjectHeader* HeapObjectHeader::fromPayload(const void* payload) argument 463 Address addr = reinterpret_cast<Address>(const_cast<void*>(payload)); 496 HeapObjectHeader::finalize(m_gcInfo, payload(), payloadSize()); 545 if (heapObjectHeader()->hasVTable() && !vTableInitialized(payload())) { 548 ASSERT(isUninitializedMemory(header->payload(), header->payloadSize())); 558 if (gcInfo()->hasVTable() && !vTableInitialized(payload())) { 561 ASSERT(isUninitializedMemory(header->payload(), heade 580 fromPayload(const void* payload) argument 792 Address payload = header->payload(); local [all...] |
/external/chromium_org/net/http/ |
H A D | http_stream_parser.cc | 526 const base::StringPiece payload(request_body_read_buf_->data(), result); 528 result = EncodeChunk(payload, 1015 int HttpStreamParser::EncodeChunk(const base::StringPiece& payload, argument 1018 if (output_size < payload.size() + kChunkHeaderFooterSize) 1025 static_cast<int>(payload.size())); 1027 // Add the payload if any. 1028 if (payload.size() > 0) { 1029 memcpy(cursor, payload.data(), payload.size()); 1030 cursor += payload [all...] |
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/ |
H A D | packet_buffer_unittest.cc | 58 packet->payload = new uint8_t[payload_size_bytes]; 173 EXPECT_EQ(0, current_pt); // Current payload type changed to 0. 174 EXPECT_EQ(0xFF, current_cng_pt); // CNG payload type not changed. 181 // Test inserting a list of packets. Last packet is of a different payload type. 195 // Insert 11th packet of another payload type (not CNG). 214 EXPECT_EQ(1, current_pt); // Current payload type changed to 0. 215 EXPECT_EQ(0xFF, current_cng_pt); // CNG payload type not changed. 257 // Primary payload. 261 // Secondary payload. 278 // Special case for the dropped primary payload [all...] |
/external/libnfc-nxp/src/ |
H A D | phHciNfc_Felica.c | 786 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]); 788 && ((FEL_MULTIPLE_TAGS_FOUND == message->payload[i] ) 789 || (FEL_SINGLE_TAG_FOUND == message->payload[i])) 794 if (FEL_MULTIPLE_TAGS_FOUND == message->payload[i]) 945 hcp_message->payload[i++] = nxp_nfc_felica_timeout ; 947 hcp_message->payload[i++] = FELICA_STATUS; 949 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, 966 hcp_message->payload[i++] = 968 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/external/antlr/antlr-3.4/runtime/C/src/ |
H A D | antlr3commontreeadaptor.c | 47 static pANTLR3_BASE_TREE create (pANTLR3_BASE_TREE_ADAPTOR adpator, pANTLR3_COMMON_TOKEN payload); 48 static pANTLR3_BASE_TREE dbgCreate (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload); 259 create (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload) argument 265 ct = ((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum->newFromToken(((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum, payload); 272 dbgCreate (pANTLR3_BASE_TREE_ADAPTOR adaptor, pANTLR3_COMMON_TOKEN payload) argument 276 ct = create(adaptor, payload); 284 * token DECL, but you need to create it as a payload or whatever for 287 * If you care what the token payload objects' type is, you should 310 * token DECL, but you need to create it as a payload or whatever for 319 * If you care what the token payload object [all...] |
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime.Tree/ |
H A D | TreeWizard.cs | 100 public TreePattern(IToken payload) : argument 101 base(payload) { 113 public WildcardTreePattern(IToken payload) : argument 114 base(payload) { 120 public override object Create(IToken payload) { argument 121 return new TreePattern(payload);
|
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/ |
H A D | TreeWizard.cs | 109 public TreePattern( IToken payload ) : 110 base( payload ) 128 public WildcardTreePattern( IToken payload ) : 129 base( payload ) 137 public override object Create( IToken payload ) 139 return new TreePattern( payload );
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/ |
H A D | jspipe_test.cc | 51 // nodes: [ name, payload ] 53 const char* operation, PP_Var payload) { 64 PP_Var payload_key = VarFromCStr(var_iface, "payload"); 68 dict_iface->Set(message, payload_key, payload); 71 var_iface->Release(payload); 162 // "payload": payload 167 const char* payload, 185 PP_Var key3 = VarFromCStr(var_iface, "payload"); 198 // Verify the payload 52 CreatePipeMessage(PepperInterface* ppapi, const char* pipe, const char* operation, PP_Var payload) argument 164 VerifyPipeMessage(PP_Var message, const char* pipe_name, const char* operation, const char* payload, int payload_length, int32_t int_payload=0) argument [all...] |
/external/chromium_org/third_party/webrtc/modules/audio_coding/codecs/isac/main/test/ |
H A D | simpleKenny.c | 105 uint16_t payload[600]; local 138 printf("-plim payloadLim..... payload limit in bytes,\n"); 313 printf("cannot set maximum payload size %d.\n", payloadLimit); 357 if(fread(payload, 1, auxSizet, inp) < auxSizet) 359 printf("last payload is corrupted\n"); 379 (uint8_t*)payload); 403 payload, stream_len, packetData.rtp_number, 445 if (fwrite(payload, 1, stream_len, 463 declen = WebRtcIsac_Decode(ISAC_main_inst, payload, 534 // printf("Maximum payload lowe [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 290 const u8 *payload, size_t payloadlen) 304 const u8 *payload, size_t payloadlen) 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 367 const u8 *payload, size_t payloadlen) 377 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 402 const u8 *payload, size_t payloadlen) 287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_cred.c | 377 pos = hdr.payload; 390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 397 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 399 pos = hdr.payload + hdr.length; 412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 290 const u8 *payload, size_t payloadlen) 304 const u8 *payload, size_t payloadlen) 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 367 const u8 *payload, size_t payloadlen) 377 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 402 const u8 *payload, size_t payloadlen) 287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_cred.c | 377 pos = hdr.payload; 390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 397 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 399 pos = hdr.payload + hdr.length; 412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 290 const u8 *payload, size_t payloadlen) 304 const u8 *payload, size_t payloadlen) 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 367 const u8 *payload, size_t payloadlen) 377 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 402 const u8 *payload, size_t payloadlen) 287 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 301 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 364 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 399 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_cred.c | 377 pos = hdr.payload; 390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 397 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 399 pos = hdr.payload + hdr.length; 412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
H A D | InstructionCodec.java | 473 * payload target instructions. 758 PackedSwitchPayloadDecodedInstruction payload = 760 int[] targets = payload.getTargets(); 763 out.write(payload.getOpcodeUnit()); 765 out.writeInt(payload.getFirstKey()); 794 SparseSwitchPayloadDecodedInstruction payload = 796 int[] keys = payload.getKeys(); 797 int[] targets = payload.getTargets(); 800 out.write(payload.getOpcodeUnit()); 864 FillArrayDataPayloadDecodedInstruction payload [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/ |
H A D | debug.rb | 21 def create_with_payload( payload ) 23 @debug_listener.create_node( node, payload )
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
H A D | extensions.py | 224 original_payload_size = len(frame.payload) 233 frame.payload = self._deflater.filter(frame.payload) 236 filtered_payload_size = len(frame.payload) 249 received_payload_size = len(frame.payload) 257 frame.payload = self._inflater.filter(frame.payload) 260 filtered_payload_size = len(frame.payload)
|
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/sync/ |
H A D | ChromiumSyncAdapterTest.java | 52 public void requestSync(int objectSource, String objectId, long version, String payload) { argument 56 mPayload = payload;
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | device_system_use_24hour_clock_browsertest.cc | 120 em::ChromeDeviceSettingsProto& proto(device_policy()->payload()); 146 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
|
/external/chromium_org/chrome/browser/extensions/api/push_messaging/ |
H A D | push_messaging_api.h | 42 const std::string& payload); 48 const std::string& payload) OVERRIDE;
|
H A D | push_messaging_apitest.cc | 99 const std::string& payload) { 101 syncer::Invalidation::Init(object_id, version, payload)); 125 GetEventRouter()->TriggerMessageForTest(extension->id(), 1, "payload"); 150 ExtensionAndSubchannelToObjectId(extension->id(), 1), 5, "payload"); 96 EmitInvalidation( const invalidation::ObjectId& object_id, int64 version, const std::string& payload) argument
|
/external/chromium_org/chromeos/dbus/ |
H A D | easy_unlock_client.cc | 76 virtual void CreateSecureMessage(const std::string& payload, 85 AppendStringAsByteArray(payload, &writer);
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
H A D | extensions.py | 269 original_payload_size = len(frame.payload) 279 frame.payload = self._rfc1979_deflater.filter( 280 frame.payload, bfinal=self._bfinal) 283 filtered_payload_size = len(frame.payload) 298 received_payload_size = len(frame.payload) 307 frame.payload = self._rfc1979_inflater.filter(frame.payload) 310 filtered_payload_size = len(frame.payload)
|