/external/iproute2/tc/ |
H A D | q_hfsc.c | 145 struct tc_service_curve rsc, fsc, usc; local 149 memset(&rsc, 0, sizeof(rsc)); 157 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 171 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 175 memcpy(&fsc, &rsc, sizeof(fsc)); 212 addattr_l(n, 1024, TCA_HFSC_RSC, &rsc, sizeof(rsc)); 237 struct tc_service_curve *rsc = NULL, *fsc = NULL, *usc = NULL; local 245 if (RTA_PAYLOAD(tb[TCA_HFSC_RSC]) < sizeof(*rsc)) [all...] |
/external/oprofile/module/ia64/ |
H A D | IA64minstate.h | 42 (pUser) mov ar.rsc=0; \ 62 (pUser) mov ar.rsc=0x3; 78 (pUser) mov ar.rsc=0; \ 99 (pUser) mov ar.rsc=0x3; 141 mov rARRSC=ar.rsc; \ 178 st8 [r17]=rARRSC, 16; /* save ar.rsc */ \ 188 /* compute ar.rsc to be used for "loadrs" */ \ 191 st8 [r16]=r18, 16; /* save ar.rsc value for "loadrs" */ \
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 835 u8 key_buf[32], rsc[6]; local 892 os_memset(rsc, 0, 6); 894 rsc, sizeof(rsc), _key, key_len) < 0) { 907 u8 rsc[6]; local 912 os_memset(rsc, 0, 6); 914 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 832 u8 key_buf[32], rsc[6]; local 889 os_memset(rsc, 0, 6); 891 rsc, sizeof(rsc), _key, key_len) < 0) { 904 u8 rsc[6]; local 909 os_memset(rsc, 0, 6); 911 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 160 u8 rsc[6]; local 163 os_memset(rsc, 0, 6); 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 832 u8 key_buf[32], rsc[6]; local 889 os_memset(rsc, 0, 6); 891 rsc, sizeof(rsc), _key, key_len) < 0) { 904 u8 rsc[6]; local 909 os_memset(rsc, 0, 6); 911 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 160 u8 rsc[6]; local 163 os_memset(rsc, 0, 6); 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 832 u8 key_buf[32], rsc[6]; local 889 os_memset(rsc, 0, 6); 891 rsc, sizeof(rsc), _key, key_len) < 0) { 904 u8 rsc[6]; local 909 os_memset(rsc, 0, 6); 911 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 160 u8 rsc[6]; local 163 os_memset(rsc, 0, 6); 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/llvm/test/MC/ARM/ |
H A D | basic-arm-instructions.s | 1468 rsc r4, r5, #0xf000 1469 rsc r4, r5, r6 1470 rsc r4, r5, r6, lsl #5 1472 rsc r4, r5, r6, lsr #5 1473 rsc r4, r5, r6, asr #5 1474 rsc r4, r5, r6, ror #5 1475 rsc r6, r7, r8, lsl r9 1476 rsc r6, r7, r8, lsr r9 1477 rsc r6, r7, r8, asr r9 1482 rsc r [all...] |
/external/icu4c/test/cintltst/ |
H A D | spooftest.c | 141 USpoofChecker *rsc; local 162 rsc = uspoof_openFromSource(confusables, confusablesLength, 170 uspoof_close(rsc);
|
/external/v8/test/cctest/ |
H A D | test-disasm-arm.cc | 170 COMPARE(rsc(r7, r8, Operand(ip, LSL, r0)), 171 "e0e8701c rsc r7, r8, ip, lsl r0"); 172 COMPARE(rsc(r7, r8, Operand(ip, LSL, r1)), 173 "e0e8711c rsc r7, r8, ip, lsl r1"); 174 COMPARE(rsc(r7, r8, Operand(ip), SetCC), 176 COMPARE(rsc(r7, r8, Operand(ip, LSL, r3), SetCC, ls),
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1912 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; local 1931 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1932 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1951 _rsc = rsc; 2242 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2288 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1912 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; local 1931 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1932 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1951 _rsc = rsc; 2242 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2288 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 1912 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; local 1931 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1932 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1951 _rsc = rsc; 2242 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2288 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/icu4c/i18n/ |
H A D | rbnf.cpp | 133 int32_t rsc = getNumberOfRuleSets(); local 134 if (rsc == rhs->getNumberOfRuleSets()) { 135 for (int i = 0; i < rsc; ++i) { 149 for (int j = 0; j < rsc; ++j) {
|
/external/regex-re2/ |
H A D | Makefile | 17 ARFLAGS=rsc
|
/external/v8/src/arm/ |
H A D | assembler-arm.h | 815 void rsc(Register dst, Register src1, const Operand& src2,
|
H A D | assembler-arm.cc | 1116 void Assembler::rsc(Register dst, Register src1, const Operand& src2,
|