/external/iproute2/tc/ |
H A D | tc_qdisc.c | 34 fprintf(stderr, " [ handle QHANDLE ] [ root | ingress | parent CLASSID ]\n"); 80 } else if (strcmp(*argv, "handle") == 0) { 81 __u32 handle; local 83 duparg("handle", *argv); 85 if (get_qdisc_handle(&handle, *argv)) 87 req.t.tcm_handle = handle; 109 __u32 handle; local 113 if (get_tc_classid(&handle, *argv)) 115 req.t.tcm_parent = handle;
|
/external/javasqlite/src/main/java/SQLite/ |
H A D | Stmt.java | 15 * Internal handle for the SQLite3 statement. 18 private long handle = 0; field in class:Stmt
|
/external/javassist/src/main/javassist/bytecode/ |
H A D | ExceptionTable.java | 30 ExceptionTableEntry(int start, int end, int handle, int type) { argument 33 handlerPc = handle; 62 int handle = in.readUnsignedShort(); 64 list.add(new ExceptionTableEntry(start, end, handle, type));
|
/external/kernel-headers/original/asm-arm/ |
H A D | dma-mapping.h | 48 static inline int dma_is_consistent(dma_addr_t handle) argument 65 * @handle: bus-specific DMA address 69 * return the CPU-viewed address, and sets @handle to be the 73 dma_alloc_coherent(struct device *dev, size_t size, dma_addr_t *handle, gfp_t gfp); 80 * @handle: device-view address returned from dma_alloc_coherent 85 * References to memory and mappings associated with cpu_addr/handle 90 dma_addr_t handle); 97 * @handle: device-view address returned from dma_alloc_coherent 105 void *cpu_addr, dma_addr_t handle, size_t size); 112 * @handle 196 dma_unmap_single(struct device *dev, dma_addr_t handle, size_t size, enum dma_data_direction dir) argument 220 dma_unmap_page(struct device *dev, dma_addr_t handle, size_t size, enum dma_data_direction dir) argument 314 dma_sync_single_for_cpu(struct device *dev, dma_addr_t handle, size_t size, enum dma_data_direction dir) argument 322 dma_sync_single_for_device(struct device *dev, dma_addr_t handle, size_t size, enum dma_data_direction dir) argument [all...] |
/external/libpcap/ |
H A D | pcap-septel.c | 194 septel_inject(pcap_t *handle, const void *buf _U_, size_t size _U_) argument 196 strlcpy(handle->errbuf, "Sending packets isn't supported on Septel cards", 202 * Get a handle for a live capture from the given Septel device. Always pass a NULL device 210 pcap_t *handle; local 212 handle = malloc(sizeof(*handle)); 213 if (handle == NULL) { 220 memset(handle, 0, sizeof(*handle)); 222 handle [all...] |
/external/libsepol/src/ |
H A D | context.c | 11 #include "handle.h" 87 int context_to_string(sepol_handle_t * handle, argument 135 ERR(handle, "out of memory, could not convert " "context to string"); 143 int context_from_record(sepol_handle_t * handle, argument 162 ERR(handle, "out of memory"); 171 ERR(handle, "user %s is not defined", user); 180 ERR(handle, "role %s is not defined", role); 189 ERR(handle, "type %s is not defined", type); 196 ERR(handle, "MLS is disabled, but MLS context \"%s\" found", 200 ERR(handle, "ML 242 context_to_record(sepol_handle_t * handle, const policydb_t * policydb, const context_struct_t * context, sepol_context_t ** record) argument 291 context_from_string(sepol_handle_t * handle, const policydb_t * policydb, context_struct_t ** cptr, const char *con_str, size_t con_str_len) argument 328 sepol_context_check(sepol_handle_t * handle, const sepol_policydb_t * policydb, const sepol_context_t * context) argument [all...] |
H A D | interfaces.c | 5 #include "handle.h" 12 static int iface_from_record(sepol_handle_t * handle, argument 30 if (context_from_record(handle, policydb, 39 if (context_from_record(handle, policydb, 51 ERR(handle, "out of memory"); 62 ERR(handle, "error creating interface structure"); 66 static int iface_to_record(sepol_handle_t * handle, argument 78 if (sepol_iface_create(handle, &tmp_record) < 0) 81 if (sepol_iface_set_name(handle, tmp_record, name) < 0) 84 if (context_to_record(handle, policyd 134 sepol_iface_query(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_iface_key_t * key, sepol_iface_t ** response) argument 165 sepol_iface_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_iface_key_t * key, const sepol_iface_t * data) argument 237 sepol_iface_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_iface_t * iface, void *fn_arg), void *arg) argument [all...] |
H A D | node_record.c | 44 static int node_parse_addr(sepol_handle_t * handle, argument 55 ERR(handle, "could not parse IPv4 address " 68 ERR(handle, "could not parse IPv6 address " 81 ERR(handle, "unsupported protocol %u, could not " 92 static int node_alloc_addr(sepol_handle_t * handle, argument 116 ERR(handle, "unsupported protocol %u", proto); 125 ERR(handle, "out of memory"); 129 ERR(handle, "could not allocate address of protocol %s", 138 static int node_expand_addr(sepol_handle_t * handle, argument 153 ERR(handle, 193 node_alloc_addr_string(sepol_handle_t * handle, int proto, char **addr) argument 232 sepol_node_key_create(sepol_handle_t * handle, const char *addr, const char *mask, int proto, sepol_node_key_t ** key_ptr) argument 365 sepol_node_get_addr(sepol_handle_t * handle, const sepol_node_t * node, char **addr) argument [all...] |
H A D | nodes.c | 7 #include "handle.h" 14 static int node_from_record(sepol_handle_t * handle, argument 30 if (sepol_node_get_addr_bytes(handle, data, &addr_buf, &addr_bsize) < 0) 32 if (sepol_node_get_mask_bytes(handle, data, &mask_buf, &mask_bsize) < 0) 47 ERR(handle, "unsupported protocol %u", proto); 56 if (context_from_record(handle, policydb, &tmp_con, 68 ERR(handle, "out of memory"); 79 ERR(handle, "could not create node structure"); 83 static int node_to_record(sepol_handle_t * handle, argument 93 if (sepol_node_create(handle, 170 sepol_node_exists(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_node_key_t * key, int *response) argument 230 sepol_node_query(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_node_key_t * key, sepol_node_t ** response) argument 296 sepol_node_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_node_key_t * key, const sepol_node_t * data) argument 345 sepol_node_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_node_t * node, void *fn_arg), void *arg) argument [all...] |
H A D | policydb_public.c | 50 sepol_handle_t * handle) 52 pf->pf.handle = handle; 165 int sepol_policydb_from_image(sepol_handle_t * handle, argument 168 return policydb_from_image(handle, data, len, &p->p); 171 int sepol_policydb_to_image(sepol_handle_t * handle, argument 175 return policydb_to_image(handle, &p->p, newdata, newlen); 49 sepol_policy_file_set_handle(sepol_policy_file_t * pf, sepol_handle_t * handle) argument
|
H A D | ports.c | 6 #include "handle.h" 11 static inline int sepol2ipproto(sepol_handle_t * handle, int proto) argument 20 ERR(handle, "unsupported protocol %u", proto); 25 static inline int ipproto2sepol(sepol_handle_t * handle, int proto) argument 34 ERR(handle, "invalid protocol %u " "found in policy", proto); 41 static int port_from_record(sepol_handle_t * handle, argument 59 tmp_proto = sepol2ipproto(handle, proto); 68 ERR(handle, "low port %d exceeds high port %d", 74 if (context_from_record(handle, policydb, &tmp_con, 86 ERR(handle, "ou 100 port_to_record(sepol_handle_t * handle, const policydb_t * policydb, ocontext_t * port, sepol_port_t ** record) argument 162 sepol_port_exists(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_port_key_t * key, int *response) argument 200 sepol_port_query(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_port_key_t * key, sepol_port_t ** response) argument 240 sepol_port_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_port_key_t * key, const sepol_port_t * data) argument 276 sepol_port_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_port_t * port, void *fn_arg), void *arg) argument [all...] |
H A D | user_record.c | 30 int sepol_user_key_create(sepol_handle_t * handle, argument 38 ERR(handle, "out of memory, " 59 int sepol_user_key_extract(sepol_handle_t * handle, 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { 65 ERR(handle, "could not extract key from user %s", user->name); 96 int sepol_user_set_name(sepol_handle_t * handle, argument 102 ERR(handle, "out of memory, could not set name"); 121 int sepol_user_set_mlslevel(sepol_handle_t * handle, 127 ERR(handle, "out of memory, " 146 int sepol_user_set_mlsrange(sepol_handle_t * handle, 170 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) argument 260 sepol_user_get_roles(sepol_handle_t * handle, const sepol_user_t * user, const char ***roles_arr, unsigned int *num_roles) argument 302 sepol_user_create(sepol_handle_t * handle, sepol_user_t ** user_ptr) argument [all...] |
H A D | users.c | 7 #include "handle.h" 15 static int user_to_record(sepol_handle_t * handle, argument 28 if (sepol_user_create(handle, &tmp_record) < 0) 31 if (sepol_user_set_name(handle, tmp_record, name) < 0) 38 if (sepol_user_add_role(handle, tmp_record, role) < 0) 51 ERR(handle, "could not copy MLS level"); 57 ERR(handle, "could not copy MLS level"); 61 if (mls_to_string(handle, policydb, &context, &str) < 0) { 67 if (sepol_user_set_mlslevel(handle, tmp_record, str) < 0) { 75 ERR(handle, "coul 101 sepol_user_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_user_key_t * key, const sepol_user_t * user) argument 315 sepol_user_query(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_user_key_t * key, sepol_user_t ** response) argument 345 sepol_user_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_user_t * user, void *fn_arg), void *arg) argument [all...] |
/external/libusb_aah/libusb/os/ |
H A D | poll_windows.h | 71 HANDLE handle; // what we need to attach overlapped to the I/O op, so we can poll it member in struct:winfd 85 struct winfd usbi_create_fd(HANDLE handle, int access_mode); 88 struct winfd handle_to_winfd(HANDLE handle);
|
/external/protobuf/src/google/protobuf/compiler/ |
H A D | subprocess.cc | 52 static void CloseHandleOrDie(HANDLE handle) { argument 53 if (!CloseHandle(handle)) {
|
/external/qemu/android/utils/ |
H A D | mapfile.c | 95 mapfile_close(MapFile* handle) argument 98 if (CloseHandle(handle)) { 105 return close((int)(ptrdiff_t)handle); 110 mapfile_read(MapFile* handle, void* buf, size_t nbyte) argument 115 if (ReadFile(handle, buf, nbyte, &read_bytes, NULL)) { 125 ret = read((int)(ptrdiff_t)handle, buf, nbyte); 132 mapfile_read_at(MapFile* handle, size_t offset, void* buf, size_t nbyte) argument 137 if ((SetFilePointer(handle, convert.LowPart, &convert.HighPart, 143 return mapfile_read(handle, buf, nbyte); 145 ssize_t res = lseek((int)(ptrdiff_t)handle, offse 151 mapfile_map(MapFile* handle, size_t offset, size_t size, int prot, void** mapped_offset, size_t* mapped_size) argument [all...] |
/external/qemu/distrib/sdl-1.2.15/src/cdrom/mint/ |
H A D | SDL_syscdrom.c | 75 int i, handle; local 101 handle = Metaopen(i, &metaopen); 102 if (handle == 0) { 143 int handle; local 145 handle = Metaopen(metados_drives[drive].device[0], &(metados_drives[drive].metaopen)); 146 if (handle == 0) {
|
/external/qemu/distrib/sdl-1.2.15/src/thread/symbian/ |
H A D | SDL_syssem.cpp | 48 TInt handle; member in struct:SDL_semaphore 74 sem->handle = s.Handle(); 85 sema.SetHandle(sem->handle); 126 sema.SetHandle(sem->handle); 150 sema.SetHandle(sem->handle); 157 TInfo* info = new (ELeave)TInfo(timeout, sem->handle); 211 sema.SetHandle(sem->handle);
|
/external/qemu/distrib/sdl-1.2.15/src/video/wincommon/ |
H A D | SDL_wingl.c | 597 HMODULE handle; local 607 handle = LoadLibrary(path); 608 if ( handle == NULL ) { 619 GetProcAddress(handle, "wglGetProcAddress"); 621 GetProcAddress(handle, "wglCreateContext"); 623 GetProcAddress(handle, "wglDeleteContext"); 625 GetProcAddress(handle, "wglMakeCurrent"); 627 GetProcAddress(handle, "wglSwapIntervalEXT"); 629 GetProcAddress(handle, "wglGetSwapIntervalEXT"); 636 FreeLibrary(handle); [all...] |
/external/qemu/memcheck/ |
H A D | memcheck_util.c | 236 ELFF_HANDLE handle; local 242 handle = elff_init(sym_path); 243 if (handle == NULL) { 247 if (!elff_is_exec(handle)) { 250 if (elff_get_pc_address_info(handle, rel_pc, info)) { 251 elff_close(handle); 256 if (elff_get_pc_address_info(handle, abs_pc, info)) { 257 elff_close(handle); 262 *elff_handle = handle;
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLMechanism.java | 97 * Builds and sends the <tt>auth</tt> stanza to the server. The callback handler will handle
171 public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
method in class:SASLMechanism
|
/external/sonivox/arm-fm-22k/host_src/ |
H A D | eas_main.c | 75 EAS_HANDLE handle; local 99 if ((reportResult = EAS_OpenFile(easData, filename, &handle)) != EAS_SUCCESS) 106 if ((result = EAS_Prepare(easData, handle)) != EAS_SUCCESS) 113 if ((result = EAS_ParseMetaData(easData, handle, &playTime)) != EAS_SUCCESS) 140 if ((result = EAS_GetLocation(easData, handle, &playTime)) != EAS_SUCCESS) 171 if ((result = EAS_State(easData, handle, &state)) != EAS_SUCCESS) 195 if ((result = EAS_CloseFile(easData,handle)) != EAS_SUCCESS)
|
/external/sonivox/arm-fm-22k/lib_src/ |
H A D | eas_data.h | 74 EAS_VOID_PTR handle; member in struct:s_eas_stream_tag
|
/external/sonivox/arm-hybrid-22k/host_src/ |
H A D | eas_main.c | 75 EAS_HANDLE handle; local 99 if ((reportResult = EAS_OpenFile(easData, filename, &handle)) != EAS_SUCCESS) 106 if ((result = EAS_Prepare(easData, handle)) != EAS_SUCCESS) 113 if ((result = EAS_ParseMetaData(easData, handle, &playTime)) != EAS_SUCCESS) 140 if ((result = EAS_GetLocation(easData, handle, &playTime)) != EAS_SUCCESS) 171 if ((result = EAS_State(easData, handle, &state)) != EAS_SUCCESS) 195 if ((result = EAS_CloseFile(easData,handle)) != EAS_SUCCESS)
|
/external/sonivox/arm-hybrid-22k/lib_src/ |
H A D | eas_data.h | 74 EAS_VOID_PTR handle; member in struct:s_eas_stream_tag
|