Searched refs:rsc (Results 1 - 25 of 53) sorted by relevance

123

/external/iproute2/tc/
H A Dq_hfsc.c149 struct tc_service_curve rsc, fsc, usc; local
153 memset(&rsc, 0, sizeof(rsc));
161 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) {
175 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) {
179 memcpy(&fsc, &rsc, sizeof(fsc));
216 addattr_l(n, 1024, TCA_HFSC_RSC, &rsc, sizeof(rsc));
241 struct tc_service_curve *rsc = NULL, *fsc = NULL, *usc = NULL; local
249 if (RTA_PAYLOAD(tb[TCA_HFSC_RSC]) < sizeof(*rsc))
[all...]
/external/libutf/
H A DNOTICE18 to Russ Cox <rsc@swtch.com>.
H A DMakefile101 scp *.rpm rsc@amsterdam.lcs.mit.edu:public_html/software
117 scp *.tgz rsc@amsterdam.lcs.mit.edu:public_html/software
/external/syslinux/gpxe/src/include/gpxe/
H A Dsec80211.h75 const void *key, int len, const void *rsc );
H A Dwpa.h147 u8 rsc[8]; member in struct:eapol_key_pkt
H A Dnet80211.h699 * @v rsc Initial receive sequence counter, if applicable
708 int keylen, const void *rsc );
/external/libunwind/src/ia64/
H A Dgetcontext.S55 mov.m rRSC = ar.rsc // M2, 12 cyc.
110 mov.m ar.rsc = rTMP // put RSE into lazy mode // M2, ? cycles
164 mov.m ar.rsc = rRSC // restore RSE mode // M2
H A DGinstall_cursor.S64 mov.m r10 = ar.rsc // (ar.rsc: ~ 12 cycle latency)
142 and r11 = 0x1c, r10 // clear all but rsc.be and rsc.pl
242 mov.m ar.rsc = r11 // put RSE into enforced lazy mode
262 mov.m ar.rsc = r11 // 14 cycles latency to loadrs
289 mov.m ar.rsc = r10 // restore original ar.rsc
299 .next: mov.m ar.rsc = r10 // restore original ar.rsc
[all...]
/external/iproute2/ip/
H A Diplink_vxlan.c29 fprintf(f, " [ [no]learning ] [ [no]proxy ] [ [no]rsc ]\n");
63 __u8 rsc = 0; local
183 rsc = 0;
184 } else if (!matches(*argv, "rsc")) {
185 rsc = 1;
277 addattr8(n, 1024, IFLA_VXLAN_RSC, rsc);
389 fputs("rsc ", f);
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/text/
H A DSpoofCheckerTest.java93 SpoofChecker rsc = null;
98 rsc = new SpoofChecker.Builder().setData(confusables).build();
103 if (rsc == null) {
108 checkSkeleton(rsc, "TestOpenFromSourceRules");
111 rsc.failsChecks("Hello", result);
116 assertEquals("Checker built from rules equals default", defaultChecker, rsc);
117 assertEquals("Checker built from rules has same hash code as default", defaultChecker.hashCode(), rsc.hashCode());
121 assertFalse("", optionChecker.equals(rsc));
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/text/
H A DSpoofCheckerTest.java92 SpoofChecker rsc = null;
97 rsc = new SpoofChecker.Builder().setData(confusables).build();
102 if (rsc == null) {
107 checkSkeleton(rsc, "TestOpenFromSourceRules");
110 rsc.failsChecks("Hello", result);
115 assertEquals("Checker built from rules equals default", defaultChecker, rsc);
116 assertEquals("Checker built from rules has same hash code as default", defaultChecker.hashCode(), rsc.hashCode());
120 assertFalse("", optionChecker.equals(rsc));
/external/syslinux/gpxe/src/net/80211/
H A Dsec80211.c87 * @v rsc Initial receive sequence counter, if applicable
100 const void *key, int len, const void *rsc )
141 return crypto->init ( crypto, key, len, rsc );
H A Dwpa.c380 * @v rsc Receive sequence counter field in EAPOL-Key packet
384 const void *rsc )
391 &ctx->gtk.tk, len, rsc );
400 * @v rsc Receive sequence counter field in EAPOL-Key packet
405 const void *rsc )
433 return wpa_install_gtk ( ctx, kde->len - 6, rsc );
718 pkt->rsc );
789 pkt->rsc );
810 wpa_install_gtk ( ctx, pkt->datalen, pkt->rsc );
H A Dwpa_ccmp.c152 * @v rsc Initial receive sequence counter
155 int keylen, const void *rsc )
162 if ( rsc )
163 ctx->rx_seq = pn_to_u64 ( rsc );
H A Dwep.c91 * @v rsc Initial receive sequence counter (unused)
98 int keylen, const void *rsc __unused )
/external/llvm/test/MC/ARM/
H A Dbasic-arm-instructions.s2056 rsc r4, r5, #0xf000
2057 rsc r4, r5, $0xf000
2058 rsc r4, r5, 0xf000
2059 rsc r7, r8, #(0xff << 16)
2060 rsc r7, r8, #-2147483638
2061 rsc r7, r8, #42, #2
2062 rsc r7, r8, #40, #2
2063 rsc r7, r8, $40, $2
2064 rsc r7, r8, 40, 2
2065 rsc r
[all...]
/external/icu/icu4c/source/test/cintltst/
H A Dspooftest.c125 USpoofChecker *rsc; local
149 rsc = uspoof_openFromSource(confusables, confusablesLength,
156 checkResults = uspoof_check(rsc, goodLatin, -1, NULL, &status);
163 uspoof_close(rsc);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c813 u8 key_buf[32], rsc[6]; local
874 os_memset(rsc, 0, 6);
876 rsc, sizeof(rsc), _key, key_len) < 0) {
891 u8 rsc[6]; local
896 os_memset(rsc, 0, 6);
898 rsc, sizeof(rsc), peerkey->stk.tk,
H A Dwpa.c846 const u8 *rsc)
862 if (rsclen == 6 && ((rsc[5] && !rsc[0]) || rsc[6] || rsc[7])) {
865 rsc[0], rsc[1], rsc[2], rsc[3],
866 rsc[
845 wpa_supplicant_rsc_relaxation(const struct wpa_sm *sm, const u8 *rsc) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c813 u8 key_buf[32], rsc[6]; local
874 os_memset(rsc, 0, 6);
876 rsc, sizeof(rsc), _key, key_len) < 0) {
891 u8 rsc[6]; local
896 os_memset(rsc, 0, 6);
898 rsc, sizeof(rsc), peerkey->stk.tk,
H A Dwpa.c846 const u8 *rsc)
862 if (rsclen == 6 && ((rsc[5] && !rsc[0]) || rsc[6] || rsc[7])) {
865 rsc[0], rsc[1], rsc[2], rsc[3],
866 rsc[
845 wpa_supplicant_rsc_relaxation(const struct wpa_sm *sm, const u8 *rsc) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c813 u8 key_buf[32], rsc[6]; local
874 os_memset(rsc, 0, 6);
876 rsc, sizeof(rsc), _key, key_len) < 0) {
891 u8 rsc[6]; local
896 os_memset(rsc, 0, 6);
898 rsc, sizeof(rsc), peerkey->stk.tk,
/external/swiftshader/third_party/LLVM/test/MC/ARM/
H A Dbasic-arm-instructions.s1374 rsc r4, r5, #0xf000
1375 rsc r4, r5, r6
1376 rsc r4, r5, r6, lsl #5
1378 rsc r4, r5, r6, lsr #5
1379 rsc r4, r5, r6, asr #5
1380 rsc r4, r5, r6, ror #5
1381 rsc r6, r7, r8, lsl r9
1382 rsc r6, r7, r8, lsr r9
1383 rsc r6, r7, r8, asr r9
1388 rsc r
[all...]
/external/libunwind/tests/
H A Dia64-test-rbs-asm.S113 mov ar.rsc = r2;; \
177 mov ar.rsc = 0 // put RSE into enforced lazy mode
H A Dia64-test-stack-asm.S136 mov ar.rsc = 0 // put RSE into enforced lazy mode

Completed in 637 milliseconds

123