/external/iproute2/tc/ |
H A D | q_hfsc.c | 149 struct tc_service_curve rsc, fsc, usc; local 153 memset(&rsc, 0, sizeof(rsc)); 161 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 175 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 179 memcpy(&fsc, &rsc, sizeof(fsc)); 216 addattr_l(n, 1024, TCA_HFSC_RSC, &rsc, sizeof(rsc)); 241 struct tc_service_curve *rsc = NULL, *fsc = NULL, *usc = NULL; local 249 if (RTA_PAYLOAD(tb[TCA_HFSC_RSC]) < sizeof(*rsc)) [all...] |
/external/oprofile/module/ia64/ |
H A D | IA64minstate.h | 42 (pUser) mov ar.rsc=0; \ 62 (pUser) mov ar.rsc=0x3; 78 (pUser) mov ar.rsc=0; \ 99 (pUser) mov ar.rsc=0x3; 141 mov rARRSC=ar.rsc; \ 178 st8 [r17]=rARRSC, 16; /* save ar.rsc */ \ 188 /* compute ar.rsc to be used for "loadrs" */ \ 191 st8 [r16]=r18, 16; /* save ar.rsc value for "loadrs" */ \
|
/external/chromium_org/third_party/icu/source/test/cintltst/ |
H A D | spooftest.c | 139 USpoofChecker *rsc; local 160 rsc = uspoof_openFromSource(confusables, confusablesLength, 168 uspoof_close(rsc);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 824 u8 key_buf[32], rsc[6]; local 881 os_memset(rsc, 0, 6); 883 rsc, sizeof(rsc), _key, key_len) < 0) { 896 u8 rsc[6]; local 901 os_memset(rsc, 0, 6); 903 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 176 u8 rsc[6]; local 179 os_memset(rsc, 0, 6); 197 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 824 u8 key_buf[32], rsc[6]; local 881 os_memset(rsc, 0, 6); 883 rsc, sizeof(rsc), _key, key_len) < 0) { 896 u8 rsc[6]; local 901 os_memset(rsc, 0, 6); 903 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 176 u8 rsc[6]; local 179 os_memset(rsc, 0, 6); 197 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 824 u8 key_buf[32], rsc[6]; local 881 os_memset(rsc, 0, 6); 883 rsc, sizeof(rsc), _key, key_len) < 0) { 896 u8 rsc[6]; local 901 os_memset(rsc, 0, 6); 903 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
|
H A D | tdls.c | 176 u8 rsc[6]; local 179 os_memset(rsc, 0, 6); 197 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
/external/llvm/test/MC/ARM/ |
H A D | basic-arm-instructions.s | 1612 rsc r4, r5, #0xf000 1613 rsc r4, r5, r6 1614 rsc r4, r5, r6, lsl #5 1616 rsc r4, r5, r6, lsr #5 1617 rsc r4, r5, r6, asr #5 1618 rsc r4, r5, r6, ror #5 1619 rsc r6, r7, r8, lsl r9 1620 rsc r6, r7, r8, lsr r9 1621 rsc r6, r7, r8, asr r9 1626 rsc r [all...] |
/external/icu4c/test/cintltst/ |
H A D | spooftest.c | 141 USpoofChecker *rsc; local 165 rsc = uspoof_openFromSource(confusables, confusablesLength, 173 uspoof_close(rsc);
|
/external/chromium_org/v8/test/cctest/ |
H A D | test-disasm-arm.cc | 166 COMPARE(rsc(r7, r8, Operand(ip, LSL, r0)), 167 "e0e8701c rsc r7, r8, ip, lsl r0"); 168 COMPARE(rsc(r7, r8, Operand(ip, LSL, r1)), 169 "e0e8711c rsc r7, r8, ip, lsl r1"); 170 COMPARE(rsc(r7, r8, Operand(ip), SetCC), 172 COMPARE(rsc(r7, r8, Operand(ip, LSL, r3), SetCC, ls),
|
/external/v8/test/cctest/ |
H A D | test-disasm-arm.cc | 170 COMPARE(rsc(r7, r8, Operand(ip, LSL, r0)), 171 "e0e8701c rsc r7, r8, ip, lsl r0"); 172 COMPARE(rsc(r7, r8, Operand(ip, LSL, r1)), 173 "e0e8711c rsc r7, r8, ip, lsl r1"); 174 COMPARE(rsc(r7, r8, Operand(ip), SetCC), 176 COMPARE(rsc(r7, r8, Operand(ip, LSL, r3), SetCC, ls),
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1927 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1928 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1956 _rsc = rsc; 2241 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2298 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1927 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1928 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1956 _rsc = rsc; 2241 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2298 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1927 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 1928 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 1956 _rsc = rsc; 2241 u8 rsc[WPA_KEY_RSC_LEN]; local 2260 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2262 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2298 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
|
/external/chromium_org/third_party/icu/source/i18n/ |
H A D | rbnf.cpp | 133 int32_t rsc = getNumberOfRuleSets(); local 134 if (rsc == rhs->getNumberOfRuleSets()) { 135 for (int i = 0; i < rsc; ++i) { 149 for (int j = 0; j < rsc; ++j) {
|
/external/icu4c/i18n/ |
H A D | rbnf.cpp | 131 int32_t rsc = getNumberOfRuleSets(); local 132 if (rsc == rhs->getNumberOfRuleSets()) { 133 for (int i = 0; i < rsc; ++i) { 147 for (int j = 0; j < rsc; ++j) {
|
/external/chromium_org/third_party/re2/ |
H A D | Makefile | 17 ARFLAGS=rsc
|
/external/chromium_org/v8/src/arm/ |
H A D | disasm-arm.cc | 913 Format(instr, "rsc'cond's 'rd, 'rn, 'shift_op");
|
H A D | assembler-arm.h | 890 void rsc(Register dst, Register src1, const Operand& src2,
|
H A D | assembler-arm.cc | 1388 void Assembler::rsc(Register dst, Register src1, const Operand& src2, function in class:v8::internal::Assembler
|
/external/regex-re2/ |
H A D | Makefile | 17 ARFLAGS=rsc
|
/external/v8/src/arm/ |
H A D | assembler-arm.h | 815 void rsc(Register dst, Register src1, const Operand& src2,
|
/external/robolectric/lib/main/ |
H A D | sqlite-jdbc-3.7.2.jar | META-INF/ META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org. ... |