/external/clang/test/CodeGen/ |
H A D | boolassign.c | 4 int ss; local 5 if ((ss = ss && ss)) {}
|
H A D | x86_64-arguments-darwin.c | 13 str ss; variable 16 func(ss);
|
/external/chromium/chrome/browser/sync/notifier/ |
H A D | invalidation_util.cc | 36 std::stringstream ss; local 37 ss << "{ "; 38 ss << "name: " << object_id.name() << ", "; 39 ss << "source: " << object_id.source(); 40 ss << " }"; 41 return ss.str(); 54 std::stringstream ss; local 55 ss << "{ "; 56 ss << "code: " << status.code() << ", "; 57 ss << "descriptio 64 std::stringstream ss; local 74 std::stringstream ss; local 86 std::stringstream ss; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslsecur.c | 25 * Currently, the list of functions called through ss->handshake is: 42 * The ss->handshake function returns SECWouldBlock under these conditions: 54 * ss->getClientAuthData() 56 * - ssl2_HandleServerHelloMessage() -> ss->handleBadCert() 61 * ss->handleBadCert() 66 * ss->getClientAuthData() 78 ssl_Do1stHandshake(sslSocket *ss) argument 84 PORT_Assert(ss->opt.noLocks || ssl_Have1stHandshakeLock(ss) ); 85 PORT_Assert(ss 128 ssl_FinishHandshake(sslSocket *ss) argument 150 ssl3_AlwaysBlock(sslSocket *ss) argument 160 ssl3_SetAlwaysBlock(sslSocket *ss) argument 171 sslSocket *ss; local 196 sslSocket *ss; local 264 sslSocket *ss; local 319 sslSocket *ss; local 352 sslSocket *ss; local 381 sslSocket *ss; local 423 sslSocket *ss; local 540 ssl_SaveWriteData(sslSocket *ss, const void *data, unsigned int len) argument 558 ssl_SendSavedWriteData(sslSocket *ss) argument 597 DoRecv(sslSocket *ss, unsigned char *out, int len, int flags) argument 740 ssl_ConfigSecureServer(sslSocket *ss, CERTCertificate *cert, const CERTCertificateList *certChain, ssl3KeyPair *keyPair, SSLKEAType kea) argument 828 sslSocket *ss; local 924 ssl_CreateSecurityInfo(sslSocket *ss) argument 942 ssl_CopySecurityInfo(sslSocket *ss, sslSocket *os) argument 1068 ssl_SecureConnect(sslSocket *ss, const PRNetAddr *sa) argument 1124 ssl_SecureClose(sslSocket *ss) argument 1148 ssl_SecureShutdown(sslSocket *ss, int nsprHow) argument 1180 ssl_SecureRecv(sslSocket *ss, unsigned char *buf, int len, int flags) argument 1230 ssl_SecureRead(sslSocket *ss, unsigned char *buf, int len) argument 1237 ssl_SecureSend(sslSocket *ss, const unsigned char *buf, int len, int flags) argument 1338 ssl_SecureWrite(sslSocket *ss, const unsigned char *buf, int len) argument 1346 sslSocket *ss; local 1369 sslSocket * ss = ssl_FindSocket(fd); local 1442 sslSocket *ss; local 1459 sslSocket * ss = ssl_FindSocket(fd); local 1478 ssl3_CacheSessionUnlocked(sslSocket *ss) argument 1491 sslSocket * ss = ssl_FindSocket(fd); local 1510 sslSocket * ss = ssl_FindSocket(fd); local 1523 sslSocket * ss; local 1556 sslSocket * ss; local 1601 sslSocket * ss = ssl_FindSocket(fd); local 1640 sslSocket * ss = ssl_FindSocket(fd); local 1675 SSL_RestartHandshakeAfterServerCert(sslSocket * ss) argument 1686 sslSocket *ss = ssl_FindSocket(fd); local 1716 sslSocket *ss; local [all...] |
H A D | sslauth.c | 16 sslSocket *ss; local 18 ss = ssl_FindSocket(fd); 19 if (!ss) { 24 if (ss->opt.useSecurity && ss->sec.peerCert) { 25 return CERT_DupCertificate(ss->sec.peerCert); 34 sslSocket *ss; local 39 ss = ssl_FindSocket(fd); 40 if (!ss) { 45 if (!ss 74 sslSocket *ss; local 100 sslSocket *ss; local 185 sslSocket *ss; local 205 sslSocket *ss; local 223 sslSocket *ss = ssl_FindSocket(fd); local 244 sslSocket *ss; local 263 sslSocket *ss; local 286 sslSocket * ss; local [all...] |
H A D | sslsock.c | 224 static SECStatus ssl_MakeLocks(sslSocket *ss); 239 sslSocket *ss; local 251 ss = (sslSocket *)fd->secret; 252 ss->fd = fd; 253 return ss; 265 sslSocket *ss; local 276 ss = (sslSocket *)layer->secret; 277 ss->fd = layer; 278 return ss; 284 sslSocket *ss; local 392 ssl_DestroyLocks(sslSocket *ss) argument 428 ssl_DestroySocketContents(sslSocket *ss) argument 488 ssl_FreeSocket(sslSocket *ss) argument 523 ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled) argument 542 ssl_ChooseOps(sslSocket *ss) argument 549 PrepareSocket(sslSocket *ss) argument 658 sslSocket *ss = ssl_FindSocket(fd); local 899 sslSocket *ss = ssl_FindSocket(fd); local 1340 sslSocket *ss = ssl_FindSocket(fd); local 1363 sslSocket *ss = ssl_FindSocket(fd); local 1377 sslSocket *ss = ssl_FindSocket(fd); local 1431 sslSocket *ss = ssl_FindSocket(fd); local 1465 sslSocket * ss = ssl_FindSocket(model); local 1505 sslSocket *ss = ssl_FindSocket(fd); local 1532 sslSocket *ss = ssl_FindSocket(fd); local 1580 sslSocket *ss; local 1609 sslSocket *ss = ssl_FindSocket(fd); local 1643 sslSocket *ss; local 1689 sslSocket * ss; local 1935 sslSocket *ss = ssl_FindSocket(fd); local 1980 sslSocket *ss = ssl_FindSocket(fd); local 2021 sslSocket *ss = ssl_FindSocket(fd); local 2040 sslSocket *ss = ssl_FindSocket(fd); local 2062 sslSocket *ss = ssl_FindSocket(fd); local 2077 sslSocket *ss = ssl_FindSocket(fd); local 2096 sslSocket *ss; local 2167 sslSocket *ss; local 2192 sslSocket * ss = ssl_GetPrivate(fd); local 2212 sslSocket * ss = ssl_GetPrivate(fd); local 2232 sslSocket * ss = ssl_GetPrivate(fd); local 2260 sslSocket *ss; local 2288 sslSocket *ss; local 2309 sslSocket *ss; local 2329 sslSocket *ss; local 2349 sslSocket *ss; local 2369 sslSocket *ss; local 2382 ssl_GetPeerInfo(sslSocket *ss) argument 2412 sslSocket *ss; local 2426 sslSocket *ss; local 2454 sslSocket *ss; local 2477 sslSocket *ss; local 2628 ssl_SocketIsBlocking(sslSocket *ss) argument 2986 ssl_MakeLocks(sslSocket *ss) argument 3116 sslSocket *ss; local [all...] |
H A D | ssl3gthr.c | 35 ssl3_GatherData(sslSocket *ss, sslGather *gs, int flags) argument 43 PORT_Assert( ss->opt.noLocks || ssl_HaveRecvBufLock(ss) ); 56 SSL_GETPID(), ss->fd, gs->state, gs->remainder)); 58 nb = ssl_DefRecv(ss, bp, gs->remainder, flags); 61 PRINT_BUF(60, (ss, "raw gather data:", bp, nb)); 64 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd)); 68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, 106 SSL3_SendAlert(ss, alert_fatal, unexpected_message); 160 dtls_GatherData(sslSocket *ss, sslGathe argument 274 ssl3_GatherCompleteHandshake(sslSocket *ss, int flags) argument 437 ssl3_GatherAppDataRecord(sslSocket *ss, int flags) argument [all...] |
H A D | ssltrace.c | 36 void ssl_PrintBuf(sslSocket *ss, const char *msg, const void *vp, int len) argument 43 if (ss) { 44 SSL_TRACE(("%d: SSL[%d]: %s [Len: %d]", SSL_GETPID(), ss->fd, 74 static void PrintType(sslSocket *ss, char *msg) argument 76 if (ss) { 77 SSL_TRACE(("%d: SSL[%d]: dump-msg: %s", SSL_GETPID(), ss->fd, 84 static void PrintInt(sslSocket *ss, char *msg, unsigned v) argument 86 if (ss) { 87 SSL_TRACE(("%d: SSL[%d]: %s=%u", SSL_GETPID(), ss->fd, 98 static void PrintBuf(sslSocket *ss, cha argument 138 ssl_DumpMsg(sslSocket *ss, unsigned char *bp, unsigned len) argument [all...] |
H A D | sslgathr.c | 13 static SECStatus ssl2_HandleV3HandshakeRecord(sslSocket *ss); 20 ** and is to be called multiple times until ss->sec.recordLen != 0. 54 ssl2_GatherData(sslSocket *ss, sslGather *gs, int flags) argument 60 PORT_Assert( ss->opt.noLocks || ssl_HaveRecvBufLock(ss) ); 76 PORT_Assert(ss->sec.hash != 0); 82 SSL_GETPID(), ss->fd, gs->state, gs->remainder)); 84 nb = ssl_DefRecv(ss, bp, gs->remainder, flags); 86 PRINT_BUF(60, (ss, "raw gather data:", bp, nb)); 90 SSL_TRC(30, ("%d: SSL[%d]: EOF", SSL_GETPID(), ss 362 ssl2_GatherRecord(sslSocket *ss, int flags) argument 377 ssl2_StartGatherBytes(sslSocket *ss, sslGather *gs, unsigned int count) argument 423 ssl2_HandleV3HandshakeRecord(sslSocket *ss) argument [all...] |
H A D | sslcon.c | 145 ssl2_ConstructCipherSpecs(sslSocket *ss) argument 155 PORT_Assert( ss->opt.noLocks || ssl_Have1stHandshakeLock(ss) ); 158 PORT_Assert(ss != 0); 159 allowed = !ss->opt.enableSSL2 ? 0 : 160 (ss->allowedByPolicy & ss->chosenPreference & SSL_CB_IMPLEMENTED); 172 ssl3_config_match_init(ss); 175 rv = ssl3_ConstructV2CipherSpecsHack(ss, NULL, &ssl3_count); 188 if (ss 226 ssl2_CheckConfigSanity(sslSocket *ss) argument 371 ssl2_CipherPrefSet(sslSocket *ss, PRInt32 which, PRBool enabled) argument 393 ssl2_CipherPrefGet(sslSocket *ss, PRInt32 which, PRBool *enabled) argument 415 ssl2_InitSocketPolicy(sslSocket *ss) argument 461 ssl2_GetSendBuffer(sslSocket *ss, unsigned int len) argument 494 ssl2_SendErrorMessage(sslSocket *ss, int error) argument 522 ssl2_SendClientFinishedMessage(sslSocket *ss) argument 557 ssl2_SendServerVerifyMessage(sslSocket *ss) argument 592 ssl2_SendServerFinishedMessage(sslSocket *ss) argument 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize, PRUint8 *ca, int caLen, PRUint8 *ck, int ckLen, PRUint8 *ek, int ekLen) argument 698 ssl2_SendCertificateRequestMessage(sslSocket *ss) argument 738 ssl2_SendCertificateResponseMessage(sslSocket *ss, SECItem *cert, SECItem *encCode) argument 849 ssl2_SendClear(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 920 ssl2_SendStream(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 1021 ssl2_SendBlock(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 1150 ssl2_UseEncryptedSendFunc(sslSocket *ss) argument 1164 ssl2_UseClearSendFunc(sslSocket *ss) argument 1211 ssl_GatherRecord1stHandshake(sslSocket *ss) argument 1317 ssl2_ProduceKeys(sslSocket * ss, SECItem * readKey, SECItem * writeKey, SECItem * masterKey, PRUint8 * challenge, PRUint8 * nonce, int cipherType) argument 1393 ssl2_CreateSessionCypher(sslSocket *ss, sslSessionID *sid, PRBool isClient) argument 1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument 1731 ssl2_QualifyCypherSpecs(sslSocket *ss, PRUint8 * cs, int csLen) argument 1791 ssl2_ChooseSessionCypher(sslSocket *ss, int hc, PRUint8 * hs, int * pKeyLen) argument 1901 ssl2_ClientHandleServerCert(sslSocket *ss, PRUint8 *certData, int certLen) argument 2012 ssl2_ClientSetupSessionCypher(sslSocket *ss, PRUint8 *cs, int csLen) argument 2164 ssl2_ClientRegSessionID(sslSocket *ss, PRUint8 *s) argument 2180 ssl2_TriggerNextMessage(sslSocket *ss) argument 2205 ssl2_TryToFinish(sslSocket *ss) argument 2238 ssl2_SignResponse(sslSocket *ss, SECKEYPrivateKey *key, SECItem *response) argument 2289 ssl2_HandleRequestCertificate(sslSocket *ss) argument 2396 ssl2_HandleClientCertificate(sslSocket * ss, PRUint8 certType, PRUint8 * cd, unsigned int cdLen, PRUint8 * response, unsigned int responseLen) argument 2491 ssl2_HandleMessage(sslSocket *ss) argument 2687 ssl2_HandleVerifyMessage(sslSocket *ss) argument 2736 ssl2_HandleServerHelloMessage(sslSocket *ss) argument 2963 ssl2_BeginClientHandshake(sslSocket *ss) argument 3216 ssl2_HandleClientSessionKeyMessage(sslSocket *ss) argument 3302 ssl2_HandleClientHelloMessage(sslSocket *ss) argument 3619 ssl2_BeginServerHandshake(sslSocket *ss) argument [all...] |
H A D | dtlscon.c | 17 static SECStatus dtls_TransmitMessageFlight(sslSocket *ss); 18 static void dtls_RetransmitTimerExpiredCb(sslSocket *ss); 19 static SECStatus dtls_SendSavedWriteData(sslSocket *ss); 86 ssl3_DisableNonDTLSSuites(sslSocket * ss) argument 91 SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); 178 dtls_HandleHandshake(sslSocket *ss, sslBuffer *origBuf) argument 189 PORT_Assert(ss->opt.noLocks || ssl_HaveRecvBufLock(ss)); 190 PORT_Assert(ss->opt.noLocks || ssl_HaveSSL3HandshakeLock(ss)); 452 dtls_QueueMessage(sslSocket *ss, SSL3ContentType type, const SSL3Opaque *pIn, PRInt32 nIn) argument 483 dtls_StageHandshakeMessage(sslSocket *ss) argument 510 dtls_FlushHandshakeMessages(sslSocket *ss, PRInt32 flags) argument 542 dtls_RetransmitTimerExpiredCb(sslSocket *ss) argument 576 dtls_TransmitMessageFlight(sslSocket *ss) argument 737 dtls_SendSavedWriteData(sslSocket *ss) argument 768 dtls_CompressMACEncryptRecord(sslSocket * ss, DTLSEpoch epoch, PRBool use_epoch, SSL3ContentType type, const SSL3Opaque * pIn, PRUint32 contentLen, sslBuffer * wrBuf) argument 823 dtls_StartTimer(sslSocket *ss, DTLSTimerCb cb) argument 838 dtls_RestartTimer(sslSocket *ss, PRBool backoff, DTLSTimerCb cb) argument 856 dtls_CancelTimer(sslSocket *ss) argument 868 dtls_CheckTimer(sslSocket *ss) argument 892 dtls_FinishedTimerCb(sslSocket *ss) argument 906 dtls_RehandshakeCleanup(sslSocket *ss) argument 926 dtls_SetMTU(sslSocket *ss, PRUint16 advertised) argument 954 dtls_HandleHelloVerifyRequest(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 1107 sslSocket * ss = NULL; local [all...] |
H A D | sslimpl.h | 190 typedef SECStatus (*sslHandshakeFunc)(sslSocket *ss); 197 typedef PRInt32 (*sslSendFunc)(sslSocket *ss, const unsigned char *buf, 210 typedef PRInt32 (*ssl3HelloExtensionSenderFunc)(sslSocket *ss, PRBool append, 216 typedef SECStatus (* ssl3HelloExtensionHandlerFunc)(sslSocket *ss, 233 ssl3_RegisterServerHelloExtensionSender(sslSocket *ss, PRUint16 ex_type, 237 ssl3_CallHelloExtensionSenders(sslSocket *ss, PRBool append, PRUint32 maxBytes, 244 ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen, 575 ** (direct and indirect) is protected by the reader/writer lock ss->specLock. 951 ** This is the "ssl3" struct, as in "ss->ssl3". 1011 #define IS_DTLS(ss) (s [all...] |
H A D | ssldef.c | 20 int ssl_DefConnect(sslSocket *ss, const PRNetAddr *sa) argument 22 PRFileDesc *lower = ss->fd->lower; 25 rv = lower->methods->connect(lower, sa, ss->cTimeout); 29 int ssl_DefBind(sslSocket *ss, const PRNetAddr *addr) argument 31 PRFileDesc *lower = ss->fd->lower; 38 int ssl_DefListen(sslSocket *ss, int backlog) argument 40 PRFileDesc *lower = ss->fd->lower; 47 int ssl_DefShutdown(sslSocket *ss, int how) argument 49 PRFileDesc *lower = ss->fd->lower; 56 int ssl_DefRecv(sslSocket *ss, unsigne argument 79 ssl_DefSend(sslSocket *ss, const unsigned char *buf, int len, int flags) argument 118 ssl_DefRead(sslSocket *ss, unsigned char *buf, int len) argument 131 ssl_DefWrite(sslSocket *ss, const unsigned char *buf, int len) argument 156 ssl_DefGetpeername(sslSocket *ss, PRNetAddr *name) argument 165 ssl_DefGetsockname(sslSocket *ss, PRNetAddr *name) argument 174 ssl_DefClose(sslSocket *ss) argument [all...] |
/external/chromium_org/chrome_frame/cfinstall/src/miniclosure/ |
H A D | style.js | 16 var ss = document.createElement('style'); 17 ss.setAttribute('type', 'text/css'); 18 if (ss.styleSheet) { 19 ss.styleSheet.cssText = rules; 21 ss.appendChild(document.createTextNode(rules)); 25 h.insertBefore(ss, firstChild);
|
/external/chromium_org/third_party/libjingle/source/talk/xmllite/ |
H A D | xmlprinter_unittest.cc | 46 std::stringstream ss; local 47 XmlPrinter::PrintXml(&ss, &elt); 48 EXPECT_EQ("<test:first xmlns:test=\"google:test\"/>", ss.str()); 54 std::stringstream ss; local 60 XmlPrinter::PrintXml(&ss, &elt, &ns_stack); 61 EXPECT_EQ("<gg:first><second/></gg:first>", ss.str());
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/ |
H A D | SystemScopeTest.java | 43 IdentityScope ss = null; field in class:SystemScopeTest 51 if (mode) ss = new SystemScope("SystemScope"); 53 ss = IdentityScope.getSystemScope(); 54 Enumeration e = ss.identities(); 55 while (e.hasMoreElements()) ss.removeIdentity((Identity)e.nextElement()); 72 //SystemScope ss = new SystemScope("SystemScope"); 73 assertEquals(0, ss.size()); 74 ss.addIdentity(new IdentityScopeStub("aaa")); 75 assertEquals(1, ss.size()); 76 ss [all...] |
/external/libffi/testsuite/libffi.call/ |
H A D | promotion.c | 9 static int promotion(signed char sc, signed short ss, argument 12 int r = (int) sc + (int) ss + (int) uc + (int) us; 25 signed short ss; local 34 values[1] = &ss; 47 for (ss = -30000; ss <= 30000; ss += 10000) 54 CHECK((int)rint == (signed char) sc + (signed short) ss +
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/svga/ |
H A D | svga_resource_buffer_upload.h | 40 svga_buffer_create_hw_storage(struct svga_screen *ss, 44 svga_buffer_destroy_hw_storage(struct svga_screen *ss, 48 svga_buffer_create_host_surface(struct svga_screen *ss, 52 svga_buffer_destroy_host_surface(struct svga_screen *ss,
|
/external/mesa3d/src/gallium/drivers/svga/ |
H A D | svga_resource_buffer_upload.h | 40 svga_buffer_create_hw_storage(struct svga_screen *ss, 44 svga_buffer_destroy_hw_storage(struct svga_screen *ss, 48 svga_buffer_create_host_surface(struct svga_screen *ss, 52 svga_buffer_destroy_host_surface(struct svga_screen *ss,
|
/external/clang/test/FixIt/ |
H A D | fixit-unicode.c | 45 int ssกss = 42; local 46 int b = ssกs; // expected-error{{use of undeclared identifier 'ssกs'; did you mean 'ssกss'?}} 48 // CHECK: {{^ ss.+ss}} 49 // CHECK-MACHINE: fix-it:"{{.*}}":{[[@LINE-3]]:11-[[@LINE-3]]:17}:"ss\340\270\201ss" [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportchannel.cc | 36 std::stringstream ss; local 37 ss << "Channel[" << name_ << "|" << READABLE_ABBREV[readable_] 39 return ss.str();
|
/external/chromium_org/third_party/freetype/src/autofit/ |
H A D | afpic.c | 82 FT_UInt ss; local 103 for ( ss = 0 ; ss < AF_SCRIPT_CLASSES_REC_COUNT ; ss++ ) 105 container->af_script_classes[ss] = 106 &container->af_script_classes_rec[ss]; 111 ss = 0; 113 &container->af_script_classes_rec[ss++] ); 116 &container->af_script_classes_rec[ss++] ); 119 &container->af_script_classes_rec[ss [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportchannel.cc | 36 std::stringstream ss; local 37 ss << "Channel[" << content_name_ 40 return ss.str();
|
/external/freetype/src/autofit/ |
H A D | afpic.c | 82 FT_UInt ss; local 103 for ( ss = 0 ; ss < AF_SCRIPT_CLASSES_REC_COUNT ; ss++ ) 105 container->af_script_classes[ss] = 106 &container->af_script_classes_rec[ss]; 111 ss = 0; 113 &container->af_script_classes_rec[ss++] ); 116 &container->af_script_classes_rec[ss++] ); 119 &container->af_script_classes_rec[ss [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | natserver_main.cc | 50 PhysicalSocketServer* ss = new PhysicalSocketServer(); local 51 pthMain->set_socketserver(ss); 52 NATServer* server = new NATServer(NAT_OPEN_CONE, ss, internal, ss, external);
|