/external/clang/test/CodeGen/ |
H A D | mms-bitfields.c | 17 struct s3 { struct 20 } s3; variable in typeref:struct:s3 22 // CHECK: %struct.s3 = type { i32, [4 x i8], %struct.s1 }
|
H A D | ms_struct.c | 18 struct s3 { struct 21 } ATTR s3; variable in typeref:struct:s3 23 // CHECK: %struct.s3 = type { i32, [4 x i8], %struct.s1 }
|
H A D | packed-arrays.c | 20 struct __attribute__((packed)) s3 { struct 33 int align3 = __alignof(struct s3); 43 int align3_x = __alignof(((struct s3*) 0)->x); 52 int align3_x0 = __alignof(((struct s3*) 0)->x[0]); 134 int f3_a(struct s3 *a) { 137 int f3_b(struct s3 *a) { 140 int f3_c(struct s3 *a) { 143 int f3_d(struct s3 *a) {
|
/external/openssl/ssl/ |
H A D | t1_reneg.c | 121 if((s->s3->previous_client_finished_len+1) > maxlen) 128 *p = s->s3->previous_client_finished_len; 131 memcpy(p, s->s3->previous_client_finished, 132 s->s3->previous_client_finished_len); 135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty"); 139 *len=s->s3->previous_client_finished_len + 1; 171 if(ilen != s->s3->previous_client_finished_len) 178 if(memcmp(d, s->s3->previous_client_finished, 179 s->s3->previous_client_finished_len)) 190 s->s3 [all...] |
H A D | s3_pkt.c | 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified 139 rb = &(s->s3->rbuf); 230 /* Now we have len+left bytes at the front of s->s3->rbuf.buf 278 * ssl->s3->rrec.type - is the type of record 279 * ssl->s3->rrec.data, - data 280 * ssl->s3->rrec.length, - number of bytes 303 rr= &(s->s3->rrec); 311 extra && !s->s3->init_extra) 324 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); 363 if (rr->length > s->s3 [all...] |
H A D | s3_enc.c | 191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE); 192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 232 c=s->s3->tmp.new_sym_enc; 233 m=s->s3->tmp.new_hash; 237 if (s->s3->tmp.new_compression == NULL) 240 comp=s->s3->tmp.new_compression->method; 270 if (s->s3->rrec.comp == NULL) 271 s->s3->rrec.comp=(unsigned char *) 273 if (s->s3 [all...] |
H A D | t1_enc.c | 287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 289 s->s3->server_random,SSL3_RANDOM_SIZE, 290 s->s3->client_random,SSL3_RANDOM_SIZE, 332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 333 c=s->s3->tmp.new_sym_enc; 334 m=s->s3->tmp.new_hash; 335 mac_type = s->s3->tmp.new_mac_pkey_type; 337 comp=s->s3->tmp.new_compression; 343 s->s3->tmp.new_cipher->algorithm_mkey, 344 s->s3 [all...] |
H A D | s3_both.c | 163 sender,slen,s->s3->tmp.finish_md); 164 s->s3->tmp.finish_md_len = i; 165 memcpy(p, s->s3->tmp.finish_md, i); 174 memcpy(s->s3->previous_client_finished, 175 s->s3->tmp.finish_md, i); 176 s->s3->previous_client_finished_len=i; 181 memcpy(s->s3->previous_server_finished, 182 s->s3->tmp.finish_md, i); 183 s->s3->previous_server_finished_len=i; 223 s->s3 [all...] |
H A D | d1_pkt.c | 192 if (s->s3->rbuf.buf != NULL) 193 OPENSSL_free(s->s3->rbuf.buf); 197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER)); 198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD)); 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER)); 231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD)); 245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER)); 246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD)); 310 s->s3 [all...] |
H A D | s3_lib.c | 2117 return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0; 2122 SSL3_STATE *s3; local 2124 if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err; 2125 memset(s3,0,sizeof *s3); 2126 memset(s3->rrec.seq_num,0,sizeof(s3->rrec.seq_num)); 2127 memset(s3 [all...] |
/external/clang/test/Analysis/ |
H A D | array-struct.c | 126 struct s3 { struct 130 static struct s3 opt; 134 struct s3 my_opt = opt; 147 struct s3 p[1]; 153 void f16(struct s3 *p) { 154 struct s3 a = *((struct s3*) ((char*) &p[0])); // expected-warning{{Casting a non-structure type to a structure type and accessing a field can lead to memory access errors or data corruption.}}
|
H A D | stack-addr-ps.cpp | 19 int &s3 = s2; // expected-note {{binding reference variable 's3' here}} local 20 return s3; // expected-warning{{Address of stack memory associated with local variable 's1' returned}} expected-warning {{reference to stack memory associated with local variable 's1' returned}}
|
/external/clang/test/Sema/ |
H A D | warn-strlcpycat-size.c | 10 char * s3; variable 23 strlcpy(s1, s3, strlen(s3)+1); // expected-warning {{size argument in 'strlcpy' call appears to be size of the source; expected the size of the destination}} expected-note {{change size argument to be the size of the destination}} 24 strlcat(s2, s3, sizeof(s3)); // expected-warning {{size argument in 'strlcat' call appears to be size of the source; expected the size of the destination}} expected-note {{change size argument to be the size of the destination}}
|
H A D | pragma-pack-and-options-align.c | 35 struct s3 { struct 39 extern int a[sizeof(struct s3) == 8 ? 1 : -1];
|
H A D | arm-layout.c | 35 struct s3 { struct 40 check(s3_size, sizeof(struct s3) == 8); 41 check(s3_offset_0, __builtin_offsetof(struct s3, field0) == 0); 42 check(s3_offset_1, __builtin_offsetof(struct s3, field2) == 7);
|
H A D | pragma-align-mac68k.c | 31 struct s3 { struct 35 extern int a3_0[offsetof(struct s3, f0) == 0 ? 1 : -1]; 36 extern int a3_1[offsetof(struct s3, f1) == 2 ? 1 : -1]; 37 extern int a3_2[sizeof(struct s3) == 18 ? 1 : -1]; 38 extern int a3_3[__alignof(struct s3) == 2 ? 1 : -1];
|
/external/v8/test/mjsunit/regress/ |
H A D | regress-crbug-3867.js | 55 assertArrayEquals(["s1", "s2", "s3"], props({s1: 0, s2: 0, s3: 0})); 56 assertArrayEquals(["s3", "s2", "s1"], props({s3: 0, s2: 0, s1: 0})); 57 assertArrayEquals(["s3", "s1", "s2"], props({s3: 0, s1: 0, s2: 0})); 69 var o1 = {s1: 0, s2: 0, s3: 0} 72 assertArrayEquals(["s1", "s2", "s3", "s0", "s4"], props(o1)); 74 var o2 = {s3: 0, s2: 0, s1: 0} 77 assertArrayEquals(["s3", "s [all...] |
/external/clang/test/SemaCXX/ |
H A D | elaborated-type-specifier.cpp | 13 bool test_elab(S1 *s1, struct S2 *s2, struct S3 *s3) { argument 15 if (s1->y == s3) return true;
|
H A D | cxx0x-initializer-aggregates.cpp | 22 S s3{ 1, 2, 3, 4, 5, 6 }; // expected-error 5 {{cannot omit braces}}
|
H A D | type-definition-in-specifier.cpp | 18 struct S3 { int x; } s3; local
|
/external/chromium/chrome/common/extensions/ |
H A D | extension_error_utils.cc | 31 const std::string& s3) { 35 ReplaceFirstSubstringAfterOffset(&ret_val, 0, "*", s3); 27 FormatErrorMessage( const std::string& format, const std::string& s1, const std::string& s2, const std::string& s3) argument
|
/external/clang/test/PCH/ |
H A D | cxx-templates.cpp | 31 S3<int> s3; local 32 s3.m();
|
/external/clang/test/SemaTemplate/ |
H A D | self-comparison.cpp | 45 S3 s3; s3.foo<1, 1>(); local
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
H A D | pelican.c | 57 ulong32 s0, s1, s2, s3, t0, t1, t2, t3; local 63 LOAD32H(s3, pelmac->state + 12); 69 Te3(byte(s3, 0)); 73 Te2(byte(s3, 1)) ^ 77 Te1(byte(s3, 2)) ^ 81 Te0(byte(s3, 3)) ^ 85 s0 = t0; s1 = t1; s2 = t2; s3 = t3; 90 STORE32H(s3, pelmac->state + 12);
|
/external/tremolo/Tremolo/ |
H A D | mdct.c | 109 REG_TYPE s3 = x[2] - x[3]; local 115 x[0] = s5 + s3; 117 x[2] = s5 - s3; 129 REG_TYPE s0, s1, s2, s3; local 134 s3 = x[ 3] - x[ 2]; x[11] = x[ 3] + x[2]; 136 x[ 1] = MULT31((s2 + s3) , cPI2_8); 138 x[ 3] = MULT31((s3 - s2) , cPI2_8); 142 s3 = x[14] - x[15]; x[14] += x[15]; 146 x[ 6] = s3; x[ 7] = s0; 156 REG_TYPE s0, s1, s2, s3; local 201 REG_TYPE s0, s1, s2, s3; local 279 REG_TYPE s0, s1, s2, s3; local [all...] |