/external/iproute2/include/linux/tc_act/ |
H A D | tc_pedit.h | 28 unsigned char nkeys; member in struct:tc_pedit_sel
|
/external/kernel-headers/original/uapi/linux/tc_act/ |
H A D | tc_pedit.h | 28 unsigned char nkeys; member in struct:tc_pedit_sel
|
/external/smali/util/src/main/java/org/jf/util/ |
H A D | SparseIntArray.java | 134 int[] nkeys = new int[n]; 138 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 141 mKeys = nkeys; 229 int[] nkeys = new int[n]; 233 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 236 mKeys = nkeys;
|
H A D | SparseArray.java | 164 int[] nkeys = new int[n]; 168 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 171 mKeys = nkeys; 304 int[] nkeys = new int[n]; 308 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 311 mKeys = nkeys; 331 int[] nkeys = new int[capacity]; 334 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 337 mKeys = nkeys;
|
/external/openssh/ |
H A D | sshconnect.h | 30 int nkeys; member in struct:Sensitive
|
H A D | ssh-pkcs11.c | 386 * add 'wrapped' public keys to the 'keysp' array and increment nkeys. 387 * keysp points to an (possibly empty) array with *nkeys keys. 395 struct sshkey ***keysp, int *nkeys) 419 keysp, nkeys) < 0 || 421 keysp, nkeys) < 0) 427 pkcs11_key_included(struct sshkey ***keysp, int *nkeys, struct sshkey *key) argument 431 for (i = 0; i < *nkeys; i++) 440 struct sshkey ***keysp, int *nkeys) 526 if (pkcs11_key_included(keysp, nkeys, key)) { 530 *keysp = xrealloc(*keysp, *nkeys 394 pkcs11_fetch_keys(struct pkcs11_provider *p, CK_ULONG slotidx, struct sshkey ***keysp, int *nkeys) argument 438 pkcs11_fetch_keys_filter(struct pkcs11_provider *p, CK_ULONG slotidx, CK_ATTRIBUTE filter[], CK_ATTRIBUTE attribs[3], struct sshkey ***keysp, int *nkeys) argument 551 int nkeys, need_finalize = 0; local [all...] |
H A D | ssh-pkcs11-client.c | 190 int i, nkeys; local 206 nkeys = buffer_get_int(&msg); 207 *keysp = xcalloc(nkeys, sizeof(Key *)); 208 for (i = 0; i < nkeys; i++) { 217 nkeys = -1; 220 return (nkeys);
|
H A D | authfd.h | 21 size_t nkeys; member in struct:ssh_identitylist
|
H A D | hostfile.h | 48 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
|
H A D | ssh-pkcs11-helper.c | 118 int i, nkeys; local 126 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { 128 buffer_put_int(&msg, nkeys); 129 for (i = 0; i < nkeys; i++) {
|
H A D | clientloop.c | 2104 size_t nkeys; member in struct:hostkeys_update_ctx 2124 for (i = 0; i < ctx->nkeys; i++) 2148 for (i = 0; i < ctx->nkeys; i++) { 2179 for (i = 0; i < ctx->nkeys; i++) { 2232 ctx->host_str, ctx->ip_str, ctx->keys, ctx->nkeys, 2268 for (ndone = i = 0; i < ctx->nkeys; i++) { 2368 for (i = 0; i < ctx->nkeys; i++) { 2376 if ((tmp = reallocarray(ctx->keys, ctx->nkeys + 1, 2378 fatal("%s: reallocarray failed nkeys = %zu", 2379 __func__, ctx->nkeys); [all...] |
H A D | hostfile.c | 470 size_t nkeys; member in struct:host_delete_ctx 500 for (i = 0; i < ctx->nkeys; i++) { 532 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) 546 if ((ctx.skip_keys = calloc(nkeys, sizeof(*ctx.skip_keys))) == NULL) 549 ctx.nkeys = nkeys; 583 for (i = 0; i < nkeys; i++) { 531 hostfile_replace_entries(const char *filename, const char *host, const char *ip, struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) argument
|
H A D | ssh.c | 1219 sensitive_data.nkeys = 0; 1224 sensitive_data.nkeys = 9; 1225 sensitive_data.keys = xcalloc(sensitive_data.nkeys, 1227 for (i = 0; i < sensitive_data.nkeys; i++) 1338 if (sensitive_data.nkeys != 0) { 1339 for (i = 0; i < sensitive_data.nkeys; i++) { 1952 int nkeys; local 1963 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, 1965 for (i = 0; i < nkeys; i++) {
|
H A D | ssh-keygen.c | 787 int i, nkeys; local 796 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys); 797 if (nkeys <= 0) 799 for (i = 0; i < nkeys; i++) { 1562 int r, i, nkeys; local 1568 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, &keys); 1569 debug3("%s: %d keys", __func__, nkeys); 1570 if (nkeys <= 0) 1572 for (i = 0; i < nkeys; i++) {
|
H A D | sshd.c | 928 int i, nkeys, r; local 933 for (i = nkeys = 0; i < options.num_host_key_files; i++) { 943 if (nkeys == 0) { 953 nkeys++; 955 debug3("%s: sent %d hostkeys", __func__, nkeys); 956 if (nkeys == 0)
|
H A D | authfd.c | 354 idl->nkeys = num; 372 for (i = 0; i < idl->nkeys; i++) {
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
H A D | ShadowSparseArray.java | 172 int[] nkeys = new int[n]; 176 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 179 mKeys = nkeys; 321 int[] nkeys = new int[n]; 325 System.arraycopy(mKeys, 0, nkeys, 0, mKeys.length); 328 mKeys = nkeys;
|
/external/protobuf/java/src/main/java/com/google/protobuf/nano/ |
H A D | FieldArray.java | 148 int[] nkeys = new int[n]; 151 System.arraycopy(mFieldNumbers, 0, nkeys, 0, mFieldNumbers.length); 154 mFieldNumbers = nkeys;
|
/external/iproute2/tc/ |
H A D | f_flow.c | 63 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) argument 69 *nkeys = 0; 79 (*nkeys)++; 140 __u32 keys = 0, nkeys = 0; local 163 if (flow_parse_keys(&keys, &nkeys, *argv)) 254 if (nkeys > 1 && mode != FLOW_MODE_HASH) {
|
H A D | m_pedit.c | 124 int hwm = sel->nkeys; 140 sel->nkeys++; 543 addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_key)); 569 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys); 578 if (sel->nkeys) { 582 for (i=0; i<sel->nkeys; i++, key++) { 590 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys);
|
H A D | f_u32.c | 121 int hwm = sel->nkeys; 145 sel->nkeys++; 1092 if (sel2.sel.nkeys != 1) { 1168 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key)); 1247 if (sel->nkeys) { 1249 for (i=0; i<sel->nkeys; i++) {
|
/external/libnl/lib/route/cls/ |
H A D | u32.c | 129 (sel->nkeys * sizeof(uint64_t)); 236 for (i = 0; i < sel->nkeys; i++) { 268 nl_dump(p, "nkeys %u ", s->nkeys); 415 sel->keys[sel->nkeys].mask = mask; 416 sel->keys[sel->nkeys].val = val & mask; 417 sel->keys[sel->nkeys].off = off; 418 sel->keys[sel->nkeys].offmask = offmask; 419 sel->nkeys++;
|
/external/clang/test/CodeGen/ |
H A D | designated-initializers.c | 165 int nkeys; member in struct:S
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 206 unsigned char nkeys; member in struct:tc_u32_sel
|
/external/libnl/include/linux/ |
H A D | pkt_cls.h | 215 unsigned char nkeys; member in struct:tc_u32_sel
|