/system/core/sh/ |
trap.c | 251 char *t, tsig; local 286 tsig = *t; 287 if (tsig == 0) { 302 tsig = S_IGN; /* don't hard ignore these */ 304 tsig = S_HARD_IGN; 306 tsig = S_RESET; /* force to be set */ 309 if (tsig == S_HARD_IGN || tsig == action)
|
/external/strace/ |
signal.c | 367 char tsig[40]; local 368 sprintf(tsig, "RT_%u", i - __SIGRTMIN); 369 sprintf(s, format, tsig); 373 char tsig[32]; local 374 sprintf(tsig, "%u", i); 375 sprintf(s, format, tsig); [all...] |
/bionic/libc/private/ |
arpa_nameser.h | 202 /* The following are TSIG errors */ 216 * This structure is used for TSIG authenticated messages 226 * This structure is used for TSIG authenticated TCP messages
|
resolv_private.h | 241 #define RES_KEEPTSIG 0x00010000 /* do not strip TSIG records */
|
/external/dnsmasq/src/ |
rfc1035.c | 445 forwarding. We look for SIG and TSIG in the addition section, and TKEY queries (for GSS-TSIG) */ [all...] |
cache.c | 59 { 250, "TSIG" }, [all...] |
/external/tcpdump/ |
print-domain.c | 301 { T_TSIG, "TSIG" }, /* RFC 2845 */
|
CHANGES | 239 DNS dissector handles TKEY, TSIG and IXFR.
|
/bionic/libc/netbsd/resolv/ |
res_debug.c | 463 {ns_t_tsig, "TSIG", "transaction signature"},
|
/ndk/build/platforms/android-3/arch-arm/usr/lib/ |
libc.so | |
/ndk/build/platforms/android-4/arch-arm/usr/lib/ |
libc.so | |
/ndk/build/platforms/android-5/arch-arm/usr/lib/ |
libc.so | |
/ndk/build/platforms/android-5/arch-x86/usr/lib/ |
libc.so | |
/ndk/build/platforms/android-8/arch-arm/usr/lib/ |
libc.so | |
/ndk/build/platforms/android-8/arch-x86/usr/lib/ |
libc.so | |