/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
H A D | push.h | 57 void Push(const Fst<Arc> &ifst, MutableFst<Arc> *ofst, uint32 ptype) { argument 59 if (ptype == kPushWeights) { 62 } else if (ptype & kPushLabels) { 69 if (ptype == (kPushWeights | kPushLabels)) {
|
/external/iproute2/include/linux/tc_act/ |
H A D | tc_gact.h | 18 __u16 ptype; member in struct:tc_gact_p
|
/external/openssl/crypto/pem/ |
H A D | pem_info.c | 101 unsigned int i,raw,ptype; local 119 ptype = 0; 181 ptype=EVP_PKEY_RSA; 203 ptype = EVP_PKEY_DSA; 225 ptype = EVP_PKEY_EC; 248 if (ptype) 250 if (!d2i_PrivateKey(ptype, pp, &p, len))
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_agg.c | 331 int ptype; local 543 ptype = oakley_validate_auth(iph1); 544 if (ptype != 0) { 545 if (ptype == -1) { 550 isakmp_info_send_n1(iph1, ptype, NULL); 1289 int error = -1, ptype; local 1391 ptype = oakley_validate_auth(iph1); 1392 if (ptype != 0) { 1393 if (ptype == -1) { 1398 isakmp_info_send_n1(iph1, ptype, NUL [all...] |
H A D | isakmp_base.c | 588 int error = -1, ptype; local 683 ptype = oakley_validate_auth(iph1); 684 if (ptype != 0) { 685 if (ptype == -1) { 690 isakmp_info_send_n1(iph1, ptype, NULL); 1069 int error = -1, ptype; local 1174 ptype = oakley_validate_auth(iph1); 1175 if (ptype != 0) { 1176 if (ptype == -1) { 1181 isakmp_info_send_n1(iph1, ptype, NUL [all...] |
/external/qemu/android/ |
H A D | hw-events.c | 134 int *ptype, 144 *ptype = 0; 154 *ptype = eventList_findCodeByName( _ev_types_tab, p, q-p ); 155 if (*ptype < 0) { 156 *ptype = (int) strtol( p, &end, 0 ); 169 list = eventList_findByType( *ptype ); 133 android_event_from_str( const char* name, int *ptype, int *pcode, int *pvalue ) argument
|
/external/iproute2/ip/ |
H A D | xfrm.h | 103 __u8 ptype; member in struct:xfrm_filter 131 const char *strxf_ptype(__u8 ptype);
|
H A D | xfrm_policy.c | 58 fprintf(stderr, "Usage: ip xfrm policy { add | update } dir DIR SELECTOR [ index INDEX ] [ ptype PTYPE ]\n"); 60 fprintf(stderr, "Usage: ip xfrm policy { delete | get } dir DIR [ SELECTOR | index INDEX ] [ ptype PTYPE ] [mark MARK [mask MASK]]\n"); 63 fprintf(stderr, "Usage: ip xfrm policy flush [ ptype PTYPE ]\n"); 125 static int xfrm_policy_ptype_parse(__u8 *ptype, int *argcp, char ***argvp) argument 131 *ptype = XFRM_POLICY_TYPE_MAIN; 133 *ptype = XFRM_POLICY_TYPE_SUB; 270 } else if (strcmp(*argv, "ptype") == 0) { 272 duparg("ptype", *argv); 367 __u8 ptype) 375 if ((ptype 366 xfrm_policy_filter_match(struct xfrm_userpolicy_info *xpinfo, __u8 ptype) argument 430 __u8 ptype = XFRM_POLICY_TYPE_MAIN; local 657 __u8 ptype = XFRM_POLICY_TYPE_MAIN; local [all...] |
H A D | ipxfrm.c | 263 const char *strxf_ptype(__u8 ptype) argument 267 switch (ptype) { 275 sprintf(str, "%u", ptype); 904 fprintf(fp, "ptype ");
|
/external/libnfc-nxp/src/ |
H A D | phFriNfc_LlcpTransport.c | 81 uint8_t ptype; local 95 ptype = (uint8_t)sLlcpLocalHeader.ptype; 104 switch(ptype) 133 ptype,
|
H A D | phFriNfc_Llcp.h | 232 unsigned ptype : 4; member in struct:phFriNfc_Llcp_sPacketHeader
|
H A D | phFriNfc_LlcpTransport_Connection.c | 230 psLocalLlcpSocket->sLlcpHeader.ptype = PHFRINFC_LLCP_PTYPE_CC; 321 psLlcpSocket->sLlcpHeader.ptype = PHFRINFC_LLCP_PTYPE_I; 410 psTransport->sDmHeader.ptype = PHFRINFC_LLCP_PTYPE_DM; 444 pLlcpSocket->sLlcpHeader.ptype = PHFRINFC_LLCP_PTYPE_RR; 484 pLlcpSocket->sLlcpHeader.ptype = PHFRINFC_LLCP_PTYPE_RNR; 556 psTransport->sLlcpHeader.ptype = PHFRINFC_LLCP_PTYPE_FRMR; 1654 uint8_t ptype, 1659 switch(ptype) 1729 dsap, ptype, ssap, 2024 pLlcpSocket->sLlcpHeader.ptype 1651 Handle_ConnectionOriented_IncommingFrame(phFriNfc_LlcpTransport_t *psTransport, phNfc_sData_t *psData, uint8_t dsap, uint8_t ptype, uint8_t ssap) argument [all...] |
/external/openssl/crypto/dh/ |
H A D | dh_ameth.c | 75 int ptype; local 85 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 87 if (ptype != V_ASN1_SEQUENCE) 133 int ptype; local 149 ptype = V_ASN1_SEQUENCE; 166 ptype, pval, penc, penclen)) 188 int ptype; local 199 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 201 if (ptype != V_ASN1_SEQUENCE) 317 ASN1_PCTX *ctx, int ptype) 316 do_dh_print(BIO *bp, const DH *x, int indent, ASN1_PCTX *ctx, int ptype) argument [all...] |
/external/qemu/android/skin/ |
H A D | file.c | 460 skin_layout_event_decode( const char* event, int *ptype, int *pcode, int *pvalue ) argument 493 *ptype = ev->value;
|
/external/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 73 int ptype; local 83 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 86 if (ptype == V_ASN1_SEQUENCE) 99 else if ((ptype == V_ASN1_NULL) || (ptype == V_ASN1_UNDEF)) 142 int ptype; local 158 ptype = V_ASN1_SEQUENCE; 161 ptype = V_ASN1_UNDEF; 174 ptype, pval, penc, penclen)) 194 int ptype; local 430 do_dsa_print(BIO *bp, const DSA *x, int off, int ptype) argument [all...] |
/external/openssl/crypto/ec/ |
H A D | ec_ameth.c | 107 int ptype; local 111 if (!eckey_param2type(&ptype, &pval, ec_key)) 127 ptype, pval, penc, penclen)) 130 if (ptype == V_ASN1_OBJECT) 139 static EC_KEY *eckey_type2param(int ptype, void *pval) argument 142 if (ptype == V_ASN1_SEQUENCE) 155 else if (ptype == V_ASN1_OBJECT) 194 int ptype, pklen; local 200 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 202 eckey = eckey_type2param(ptype, pva 244 int ptype, pklen; local 316 int eplen, ptype; local [all...] |
/external/stlport/test/unit/ |
H A D | unordered_test.cpp | 242 typedef pair<int, int> ptype; typedef 243 vector<ptype> us_val; 253 us_val.push_back(ptype((*lit).first, (*lit).second)); 259 ptype p(i, i);
|
/external/tcpdump/ |
H A D | print-atalk.c | 57 u_int16_t htype, ptype; member in struct:aarp 205 EXTRACT_16BITS(&ap->ptype) == ETHERTYPE_ATALK && 224 (void)printf("len %u op %u htype %u ptype %#x halen %u palen %u", 226 EXTRACT_16BITS(&ap->ptype), ap->halen, ap->palen);
|
H A D | print-udp.c | 145 const char * ptype; local 157 ptype = "rtpv1"; 164 ptype = "rtp"; 169 ptype,
|
/external/bluetooth/bluez/compat/ |
H A D | sdp.c | 428 uint16_t ptype[4] = { local 436 sdp_data_t *data = sdp_data_alloc(SDP_UINT16, &ptype[p]);
|
/external/grub/netboot/ |
H A D | main.c | 746 unsigned short ptype; local 766 ptype = (((unsigned short) nic.packet[12]) << 8 774 && ptype == ARP) 825 && ptype == RARP) 845 if (nic.packetlen < protohdrlen || ptype != IP)
|
/external/bluetooth/bluez/network/ |
H A D | server.c | 243 uint16_t ptype[] = { local 251 sdp_data_t *data = sdp_data_alloc(SDP_UINT16, &ptype[p]);
|
/external/bluetooth/bluez/lib/ |
H A D | hci.c | 251 char *hci_ptypetostr(unsigned int ptype) argument 253 return hci_bit2str(pkt_type_map, ptype); 261 char *hci_scoptypetostr(unsigned int ptype) argument 263 return hci_bit2str(sco_ptype_map, ptype); 1229 int hci_create_connection(int dd, const bdaddr_t *bdaddr, uint16_t ptype, argument 1239 cp.pkt_type = ptype;
|
/external/bluetooth/bluez/tools/ |
H A D | hcitool.c | 1206 { "ptype", 1, 0, 'p' }, 1212 "\tcc [--role=m|s] [--ptype=pkt_types] <bdaddr>\n" 1214 "\tcc --ptype=dm1,dh3,dh5 01:02:03:04:05:06\n" 1222 unsigned int ptype; local 1226 ptype = HCI_DM1 | HCI_DM3 | HCI_DM5 | HCI_DH1 | HCI_DH3 | HCI_DH5; 1231 hci_strtoptype(optarg, &ptype); 1261 if (hci_create_connection(dd, &bdaddr, htobs(ptype), 1698 unsigned int ptype; local 1711 hci_strtoptype(argv[1], &ptype); 1741 cp.pkt_type = ptype; [all...] |
/external/bluetooth/glib/gobject/ |
H A D | gsignal.c | 1980 GType ptype = node->param_types[i] & ~G_SIGNAL_TYPE_STATIC_SCOPE; local 1985 g_value_init (param_values + i, ptype); 2949 GType ptype = node->param_types[i] & ~G_SIGNAL_TYPE_STATIC_SCOPE; local 2954 g_value_init (param_values + i, ptype);
|