/external/smack/src/org/xbill/DNS/ |
H A D | Client.java | 37 int nkeys = 0; 39 nkeys = key.selector().select(timeout); 41 nkeys = key.selector().selectNow(); 42 if (nkeys == 0)
|
/external/iproute2/include/linux/tc_act/ |
H A D | tc_pedit.h | 28 unsigned char nkeys; member in struct:tc_pedit_sel
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/genperf/ |
H A D | perfect.c | 313 ub4 nkeys, /* total number of keys */ 334 finished = inithex(keys, nkeys, alen, blen, smax, salt, final, form); 343 if (nkeys <= 1) 460 ub4 nkeys, /* final hash must be in 0..nkeys-1 */ 467 ub4 highhash = ((form->perfect == MINIMAL_HP) ? nkeys : smax); 543 ub4 nkeys, 552 ((form->perfect == MINIMAL_HP) ? nkeys : smax))); 563 if (!augment(tabb, tabh, tabq, blen, scramble, smax, &tabb[i], nkeys, 570 /* Success! We found a perfect hash of all keys into 0..nkeys 311 initkey( key *keys, ub4 nkeys, bstuff *tabb, ub4 alen, ub4 blen, ub4 smax, ub4 salt, hashform *form, gencode *final) argument 452 augment( bstuff *tabb, hstuff *tabh, qstuff *tabq, ub4 blen, ub4 *scramble, ub4 smax, bstuff *item, ub4 nkeys, ub4 highwater, hashform *form) argument 536 perfect( bstuff *tabb, hstuff *tabh, qstuff *tabq, ub4 blen, ub4 smax, ub4 *scramble, ub4 nkeys, hashform *form) argument 579 hash_ab( bstuff **tabb, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final, ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form) argument 680 initalen( ub4 *alen, ub4 *blen, ub4 *smax, ub4 nkeys, hashform *form) argument 813 findhash( bstuff **tabb, hstuff **tabh, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final, ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form) argument [all...] |
H A D | perfect.h | 125 gencode *final, ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, 129 int inithex(key *keys, ub4 nkeys, ub4 alen, ub4 blen, ub4 smax, ub4 salt,
|
H A D | genperf.c | 154 ub4 nkeys; local 184 nkeys = 0; 193 nkeys++; 198 scramble, &smax, keys, nkeys, &form); 206 * or up to pakd.nkeys for MINIMAL_HP. 208 fprintf(out, " static const struct %s pd[%lu] = {\n", struct_name, nkeys); 209 for (i=0; i<nkeys; i++) { 225 if (i < nkeys-1) 238 fprintf(out, " if (rsl >= %lu) return NULL;\n", nkeys);
|
/external/smali/dexlib/src/main/java/org/jf/dexlib/Util/ |
H A D | SparseIntArray.java | 127 int[] nkeys = new int[n]; 131 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 134 mKeys = nkeys; 222 int[] nkeys = new int[n]; 226 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 229 mKeys = nkeys;
|
H A D | SparseArray.java | 157 int[] nkeys = new int[n]; 161 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 164 mKeys = nkeys; 297 int[] nkeys = new int[n]; 301 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 304 mKeys = nkeys; 324 int[] nkeys = new int[capacity]; 327 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 330 mKeys = nkeys;
|
/external/openssh/ |
H A D | sshconnect.h | 30 int nkeys; member in struct:Sensitive
|
H A D | ssh-pkcs11-client.c | 186 int i, nkeys; local 202 nkeys = buffer_get_int(&msg); 203 *keysp = xcalloc(nkeys, sizeof(Key *)); 204 for (i = 0; i < nkeys; i++) { 213 nkeys = -1; 216 return (nkeys);
|
H A D | ssh-pkcs11.c | 385 * add 'wrapped' public keys to the 'keysp' array and increment nkeys. 386 * keysp points to an (possibly empty) array with *nkeys keys. 390 int *nkeys) 463 *keysp = xrealloc(*keysp, *nkeys + 1, 465 (*keysp)[*nkeys] = key; 466 *nkeys = *nkeys + 1; 467 debug("have %d keys", *nkeys); 484 int nkeys, need_finalize = 0; local 551 nkeys 389 pkcs11_fetch_keys(struct pkcs11_provider *p, CK_ULONG slotidx, Key ***keysp, int *nkeys) argument [all...] |
H A D | ssh-pkcs11-helper.c | 118 int i, nkeys; local 126 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { 128 buffer_put_int(&msg, nkeys); 129 for (i = 0; i < nkeys; i++) {
|
H A D | ssh.c | 815 sensitive_data.nkeys = 0; 820 sensitive_data.nkeys = 7; 821 sensitive_data.keys = xcalloc(sensitive_data.nkeys, 823 for (i = 0; i < sensitive_data.nkeys; i++) 922 if (sensitive_data.nkeys != 0) { 923 for (i = 0; i < sensitive_data.nkeys; i++) { 1489 int nkeys; local 1500 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, 1502 for (i = 0; i < nkeys; i++) {
|
H A D | ssh-keygen.c | 722 int i, nkeys; local 725 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys); 726 if (nkeys <= 0) 728 for (i = 0; i < nkeys; i++) { 1478 int i, nkeys; local 1483 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, &keys); 1484 debug3("%s: %d keys", __func__, nkeys); 1485 if (nkeys <= 0) 1487 for (i = 0; i < nkeys; i++) {
|
H A D | sshconnect1.c | 705 for (i = 0; i < sensitive->nkeys; i++) {
|
/external/chromium_org/third_party/WebKit/Tools/TestResultServer/model/ |
H A D | datastorefile_test.py | 69 nkeys = len(self.test_file.data_keys) + len(self.test_file.new_data_keys) 70 self.assertEqual(nkeys, nchunks) 76 nkeys = len(self.test_file.data_keys) + len(self.test_file.new_data_keys) 77 self.assertEqual(nkeys, nchunks)
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
H A D | ShadowSparseArray.java | 172 int[] nkeys = new int[n]; 176 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 179 mKeys = nkeys; 321 int[] nkeys = new int[n]; 325 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 328 mKeys = nkeys;
|
/external/iproute2/tc/ |
H A D | f_flow.c | 63 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) argument 69 *nkeys = 0; 79 (*nkeys)++; 140 __u32 keys = 0, nkeys = 0; local 163 if (flow_parse_keys(&keys, &nkeys, *argv)) 254 if (nkeys > 1 && mode != FLOW_MODE_HASH) {
|
H A D | m_pedit.c | 124 int hwm = sel->nkeys; 140 sel->nkeys++; 543 addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_key)); 569 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys); 578 if (sel->nkeys) { 582 for (i=0; i<sel->nkeys; i++, key++) { 590 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys);
|
H A D | f_u32.c | 121 int hwm = sel->nkeys; 145 sel->nkeys++; 1092 if (sel2.sel.nkeys != 1) { 1168 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key)); 1247 if (sel->nkeys) { 1249 for (i=0; i<sel->nkeys; i++) {
|
/external/clang/test/CodeGen/ |
H A D | designated-initializers.c | 105 int nkeys; member in struct:S
|
/external/chromium/net/tools/testserver/ |
H A D | device_management.py | 466 nkeys = len(self._server.keys) 467 if msg.signature_type == dm.PolicyFetchRequest.SHA1_RSA and nkeys > 0: 468 if msg.public_key_version in range(1, nkeys + 1): 471 key_version = (msg.public_key_version % nkeys) + 1
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 206 unsigned char nkeys; member in struct:tc_u32_sel
|
/external/kernel-headers/original/linux/ |
H A D | pkt_cls.h | 215 unsigned char nkeys; member in struct:tc_u32_sel
|
/external/chromium_org/chrome/browser/policy/test/ |
H A D | policy_testserver.py | 578 nkeys = len(self.server.keys) 580 current_key_index in range(nkeys)): 582 if msg.public_key_version in range(1, nkeys + 1):
|
/external/chromium_org/third_party/ply/ |
H A D | yacc.py | 2521 nkeys = { } 2525 nkeys[s] = None 2526 for n in nkeys:
|