/external/icu/icu4c/source/test/cintltst/ |
H A D | spooftest.c | 122 USpoofChecker *rsc; local 146 rsc = uspoof_openFromSource(confusables, confusablesLength, 153 checkResults = uspoof_check(rsc, goodLatin, -1, NULL, &status); 160 uspoof_close(rsc);
|
/external/iproute2/ip/ |
H A D | iplink_vxlan.c | 29 fprintf(f, " [ [no]learning ] [ [no]proxy ] [ [no]rsc ]\n"); 63 __u8 rsc = 0; local 183 rsc = 0; 184 } else if (!matches(*argv, "rsc")) { 185 rsc = 1; 277 addattr8(n, 1024, IFLA_VXLAN_RSC, rsc); 389 fputs("rsc ", f);
|
/external/iproute2/tc/ |
H A D | q_hfsc.c | 149 struct tc_service_curve rsc, fsc, usc; local 153 memset(&rsc, 0, sizeof(rsc)); 161 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 175 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { 179 memcpy(&fsc, &rsc, sizeof(fsc)); 216 addattr_l(n, 1024, TCA_HFSC_RSC, &rsc, sizeof(rsc)); 241 struct tc_service_curve *rsc = NULL, *fsc = NULL, *usc = NULL; local 249 if (RTA_PAYLOAD(tb[TCA_HFSC_RSC]) < sizeof(*rsc)) [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 814 u8 key_buf[32], rsc[6]; local 869 os_memset(rsc, 0, 6); 871 rsc, sizeof(rsc), _key, key_len) < 0) { 886 u8 rsc[6]; local 891 os_memset(rsc, 0, 6); 893 rsc, sizeof(rsc), peerkey->stk.tk,
|
H A D | tdls.c | 193 u8 rsc[6]; local 210 os_memset(rsc, 0, 6); 230 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
H A D | wpa.c | 794 const u8 *rsc) 810 if (rsclen == 6 && ((rsc[5] && !rsc[0]) || rsc[6] || rsc[7])) { 813 rsc[0], rsc[1], rsc[2], rsc[3], 814 rsc[ 793 wpa_supplicant_rsc_relaxation(const struct wpa_sm *sm, const u8 *rsc) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 814 u8 key_buf[32], rsc[6]; local 869 os_memset(rsc, 0, 6); 871 rsc, sizeof(rsc), _key, key_len) < 0) { 886 u8 rsc[6]; local 891 os_memset(rsc, 0, 6); 893 rsc, sizeof(rsc), peerkey->stk.tk,
|
H A D | tdls.c | 193 u8 rsc[6]; local 210 os_memset(rsc, 0, 6); 230 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
H A D | wpa.c | 794 const u8 *rsc) 810 if (rsclen == 6 && ((rsc[5] && !rsc[0]) || rsc[6] || rsc[7])) { 813 rsc[0], rsc[1], rsc[2], rsc[3], 814 rsc[ 793 wpa_supplicant_rsc_relaxation(const struct wpa_sm *sm, const u8 *rsc) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 814 u8 key_buf[32], rsc[6]; local 869 os_memset(rsc, 0, 6); 871 rsc, sizeof(rsc), _key, key_len) < 0) { 886 u8 rsc[6]; local 891 os_memset(rsc, 0, 6); 893 rsc, sizeof(rsc), peerkey->stk.tk,
|
H A D | tdls.c | 193 u8 rsc[6]; local 210 os_memset(rsc, 0, 6); 230 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
|
H A D | wpa.c | 794 const u8 *rsc) 810 if (rsclen == 6 && ((rsc[5] && !rsc[0]) || rsc[6] || rsc[7])) { 813 rsc[0], rsc[1], rsc[2], rsc[3], 814 rsc[ 793 wpa_supplicant_rsc_relaxation(const struct wpa_sm *sm, const u8 *rsc) argument [all...] |
/external/icu/icu4c/source/i18n/ |
H A D | rbnf.cpp | 135 int32_t rsc = getNumberOfRuleSets(); local 136 if (rsc == rhs->getNumberOfRuleSets()) { 137 for (int i = 0; i < rsc; ++i) { 151 for (int j = 0; j < rsc; ++j) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 2175 u8 rsc[WPA_KEY_RSC_LEN]; local 2184 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0) 2187 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2222 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2241 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2242 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2272 _rsc = rsc; 2587 u8 rsc[WPA_KEY_RSC_LEN]; local 2607 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2609 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 2175 u8 rsc[WPA_KEY_RSC_LEN]; local 2184 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0) 2187 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2222 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2241 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2242 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2272 _rsc = rsc; 2587 u8 rsc[WPA_KEY_RSC_LEN]; local 2607 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2609 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 2175 u8 rsc[WPA_KEY_RSC_LEN]; local 2184 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0) 2187 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2222 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2241 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2242 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); 2272 _rsc = rsc; 2587 u8 rsc[WPA_KEY_RSC_LEN]; local 2607 os_memset(rsc, 0, WPA_KEY_RSC_LEN); 2609 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); [all...] |
/external/v8/src/arm/ |
H A D | assembler-arm.cc | 1473 void Assembler::rsc(Register dst, Register src1, const Operand& src2, function in class:v8::internal::Assembler
|
/external/robolectric/v1/lib/main/ |
H A D | sqlite-jdbc-3.7.2.jar | META-INF/ META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org. ... |