/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
resource.h | 36 long ru_msgrcv; /* messages received */ 37 long ru_nsignals; /* signals received */
|
/system/extras/tests/bionic/libc/common/ |
test_pthread_join.c | 47 printf("thread2 received code %08x from thread1\n", (int)result); 59 printf("thread3 received code %08x from thread1\n", (int)result);
|
/hardware/ti/wlan/wl1271/stad/src/Data_link/ |
rx.c | 849 TRACE0(pRxData->hReport, REPORT_SEVERITY_WARNING, ": Remove data filter request received but the specified filter was not found!"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 44 "received content type 0x%x", ct); 58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 224 "received content type 0x%x", ct); 263 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 273 "TLSv1: Received Certificate (certificate_list len %lu)", 486 "received content type 0x%x", ct); 524 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 532 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerKeyExchange"); 574 "received content type 0x%x", ct) [all...] |
tlsv1_record.c | 232 * tlsv1_record_receive - TLS record layer: Process a received message 234 * @in_data: Received data 235 * @in_len: Length of the received data 242 * This function decrypts the received message, verifies HMAC and TLS record 254 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 264 wpa_printf(MSG_DEBUG, "TLSv1: Received content type %d version %d.%d " 310 "processing received record"); 335 "received record", 344 "received record", 392 "received message") [all...] |
tlsv1_server_read.c | 47 "received content type 0x%x", ct); 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 278 "received content type 0x%x", ct); 322 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 331 "TLSv1: Received Certificate (certificate_list len %lu)", 685 "received content type 0x%x", ct); 719 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 726 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientKeyExchange"); 778 "received content type 0x%x", ct) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 40 "received content type 0x%x", ct); 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 225 "received content type 0x%x", ct); 264 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 274 "TLSv1: Received Certificate (certificate_list len %lu)", 488 "received content type 0x%x", ct); 526 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 534 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerKeyExchange"); 576 "received content type 0x%x", ct) [all...] |
tlsv1_server_read.c | 42 "received content type 0x%x", ct); 56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 288 "received content type 0x%x", ct); 332 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 341 "TLSv1: Received Certificate (certificate_list len %lu)", 699 "received content type 0x%x", ct); 733 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 740 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientKeyExchange"); 792 "received content type 0x%x", ct) [all...] |
/sdk/apps/SdkController/src/com/android/tools/sdkcontroller/handlers/ |
MultiTouchChannel.java | 37 * A new frame buffer has been received from the emulator. 42 * A multi-touch "start" command has been received from the emulator. 47 * A multi-touch "stop" command has been received from the emulator. There 100 * A message has been received from the emulator. 103 * @param msg_data Packet received from the emulator. 122 * A query has been received from the emulator.
|
/external/openssl/crypto/jpake/ |
jpake.c | 302 int JPAKE_STEP1_process(JPAKE_CTX *ctx, const JPAKE_STEP1 *received) 304 if(!is_legal(received->p1.gx, ctx)) 310 if(!is_legal(received->p2.gx, ctx)) 317 if(!verify_zkp(&received->p1, ctx->p.g, ctx)) 324 if(!verify_zkp(&received->p2, ctx->p.g, ctx)) 331 if(BN_is_one(received->p2.gx)) 338 BN_copy(ctx->p.gxc, received->p1.gx); 339 BN_copy(ctx->p.gxd, received->p2.gx); 414 int JPAKE_STEP2_process(JPAKE_CTX *ctx, const JPAKE_STEP2 *received) 430 if(verify_zkp(received, t1, ctx) [all...] |
/external/chromium/net/spdy/ |
spdy_stream.h | 62 // Called when the SYN_STREAM, SYN_REPLY, or HEADERS frames are received. 72 // Called when data is received. 99 // If it already received SYN_REPLY or data, OnResponseReceived() or 171 // has been received for this stream. Returns a status code. 174 // Called by the SpdySession when late-bound headers are received for a 178 // Called by the SpdySession when response data has been received for this 181 // |buffer| contains the data received. The stream must copy any data 183 // |length| is the number of bytes received or an error. 273 // first created, and the pushed data is replayed. Any data received during 321 // Data received before delegate is attached [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_hybi.py | 179 unmask_receive: unmask received frames. When received unmasked 192 received = receive_bytes(2) 194 first_byte = ord(received[0]) 201 second_byte = ord(received[1]) 212 'Mask bit on the received frame did\'nt match masking ' 213 'configuration for received frames') 436 # Holds body of received fragments. 515 'Received a termination frame but fragmentation ' 519 'Received an intermediate frame but [all...] |
/external/libnfc-nxp/src/ |
phLlcNfc_DataTypes.h | 109 DEFINED : then check for the NR frame received from PN544 in the I frame is 112 COMMENTED : dont check the N(R) frame received from the PN544 117 DEFINED : then if an I frame is received and the 121 COMMENTED : then if an I frame is received and the 131 DEFINED : then if the received NS = (expected NR - 1) then instead of REJ 177 COMMENTED : immediately ACK the received I frame 350 is received from PN544 */ 361 /* LLC has received a I frame for the re-sent I frames, so an S 364 /* LLC has received a I frame for the re-sent I frames, so an S 376 /* For any of the above sent frames, the response shall be received */ [all...] |
phLlcNfc_Interface.c | 268 /* ACK is sent, so reset the response received count */ 414 be sent to upper layer only after the ACK is received for the 441 /* S frame is only sent when ever a I frame is received from 442 the PN544 in the read response callback, so the received I 492 is received from the PN544 */ 540 this resent I frame, an I frame received from PN544. 556 this resent I frame, an I frame received from PN544. 634 PH_LLCNFC_DEBUG("Error status received : 0x%x\n", pCompInfo->status); 656 3. Depending on the received frame type, process the received [all...] |
/external/mtpd/ |
l2tp.c | 224 * this packet if it is their next one and they received our last one. */ 422 * from being closed even if we received unexpected messages. */ 429 log_print(DEBUG, "Received SCCRP (remote_tunnel = %d) -> " 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 447 log_print(DEBUG, "Received ICRP (remote_session = %d) -> " 455 log_print(DEBUG, "Received ICRP without assigned session"); 462 log_print(DEBUG, "Received STOPCCN"); 469 log_print(DEBUG, "Received CDN (local_session = %d)", 485 log_print(DEBUG, "Received %s -> Sending ICRQ (local_session = " 496 log_print(DEBUG, "Received ACK") [all...] |
/external/webkit/Source/WebKit/win/Interfaces/ |
IWebDocument.idl | 60 @abstract Called when the corresponding data source has received data. 200 @abstract Called when the data source has received data. 201 @param data The data that the data source has received. 202 @param dataSource The data source that has received data. 209 @abstract Called when the data source has received an error. 210 @param error The error that the data source has received. 211 @param dataSource The data source that has received the error.
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
radiotap.h | 92 * MPDU arrived at the MAC. For received frames, only. 157 * Properties of transmitted and received frames. See flags 167 * Properties of received frames. See flags defined below. 215 #define IEEE80211_RADIOTAP_F_CFP 0x01 /* sent/received 218 #define IEEE80211_RADIOTAP_F_SHORTPRE 0x02 /* sent/received 222 #define IEEE80211_RADIOTAP_F_WEP 0x04 /* sent/received 225 #define IEEE80211_RADIOTAP_F_FRAG 0x08 /* sent/received
|
/external/wpa_supplicant_8/src/utils/ |
radiotap.h | 92 * MPDU arrived at the MAC. For received frames, only. 157 * Properties of transmitted and received frames. See flags 167 * Properties of received frames. See flags defined below. 215 #define IEEE80211_RADIOTAP_F_CFP 0x01 /* sent/received 218 #define IEEE80211_RADIOTAP_F_SHORTPRE 0x02 /* sent/received 222 #define IEEE80211_RADIOTAP_F_WEP 0x04 /* sent/received 225 #define IEEE80211_RADIOTAP_F_FRAG 0x08 /* sent/received
|
/hardware/ti/omap3/omx/system/src/openmax_il/common/inc/ |
TIDspOmx.h | 17 * You should have received a copy of the GNU Lesser General Public 37 * You should have received a copy of the GNU Lesser General Public 57 * You should have received a copy of the GNU Lesser General Public 77 * You should have received a copy of the GNU Lesser General Public 97 * You should have received a copy of the GNU Lesser General Public 117 * You should have received a copy of the GNU Lesser General Public 137 * You should have received a copy of the GNU Lesser General Public 157 * You should have received a copy of the GNU Lesser General Public 177 * You should have received a copy of the GNU Lesser General Public 197 * You should have received a copy of the GNU Lesser General Publi [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_ctrl.h | 35 /** EAP-Request/Notification received */ 37 /** EAP authentication started (EAP-Request/Identity received) */ 49 /** EAP authentication failed (EAP-Failure received) */ 79 /** A new credential received */ 80 #define WPS_EVENT_CRED_RECEIVED "WPS-CRED-RECEIVED " 81 /** M2D received */ 133 #define P2P_EVENT_INVITATION_RECEIVED "P2P-INVITATION-RECEIVED " 210 * This function is used to send commands to wpa_supplicant/hostapd. Received 213 * for the reply. If unsolicited messages are received, the blocking time may 217 * unsolicited messages received while waiting for the command response. Thes [all...] |
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
ScanCncnApp.c | 146 TRACE0(pScanCncn->hReport, REPORT_SEVERITY_INFORMATION , "scanCncnApp_SetParam: received OS scan request when OS scans are disabled, quitting...\n"); 162 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_ERROR , "scanCncnApp_SetParam: received OS scan request when client %d is currently running!\n", pScanCncn->eCurrentRunningAppScanClient); 223 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_INFORMATION , "scanCncnApp_GetParam: received request of type %d\n", pParam->paramType); 266 * \param status - the scan result status (scan complete, result received etc.) 267 * \param frameInfo - a pointer to the structure holding all frame related info (in case a frame was received) 292 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_INFORMATION , "scanCncn_AppScanResultCB, received scan complete with status :%d\n", status); 318 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_INFORMATION , "scanCncn_AppScanResultCB, received scan complete with status :%d\n", status); 348 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_INFORMATION , "scanCncn_AppScanResultCB, received scan complete with status :%d\n", status); 374 TRACE1(pScanCncn->hReport, REPORT_SEVERITY_ERROR , "scanCncn_AppScanResultCB, received erroneuos scan result with status :%d\n", status);
|
/packages/apps/Bluetooth/res/values-en-rGB/ |
strings.xml | 45 <string name="notification_received" msgid="3324588019186687985">"Bluetooth share: Received <xliff:g id="FILE">%1$s</xliff:g>"</string> 46 <string name="notification_received_fail" msgid="3619350997285714746">"Bluetooth share: File <xliff:g id="FILE">%1$s</xliff:g> not received"</string> 59 <string name="download_fail_line1" msgid="3846450148862894552">"File not received"</string> 63 <string name="download_succ_line5" msgid="4509944688281573595">"File received"</string> 81 <string name="bt_toast_1" msgid="972182708034353383">"The file will be received. Check progress in the Notifications panel."</string> 82 <string name="bt_toast_2" msgid="8602553334099066582">"The file can\'t be received."</string> 103 <string name="btopp_live_folder" msgid="7967791481444474554">"Bluetooth received"</string> 104 <string name="download_success" msgid="7036160438766730871">"<xliff:g id="FILE_SIZE">%1$s</xliff:g> Received complete."</string> 111 <string name="inbound_noti_title" msgid="4143352641953027595">"Bluetooth share: Received files"</string>
|
/external/iproute2/man/man3/ |
libnetlink.3 | 91 callback checks if the received message is wanted. It gets the source 103 Only one message bundle is received. Unless there is no message 114 cookie as arguments. It will get called for all received messages. 115 Only one message bundle is received. Unless there is no message 126 for parsing. The file contains raw data as received from a rtnetlink socket.
|
/external/ppp/pppd/ |
fsm.h | 73 u_char seen_ack; /* Have received valid Ack/Nak/Rej to Req */ 79 int rnakloops; /* Number of naks received */ 110 void (*protreject) /* Called when Protocol-Reject received */ 114 int (*extcode) /* Called when unknown code received */ 130 #define ACKRCVD 7 /* We've received a Config Ack */
|
/external/webkit/Tools/android/flex-2.5.4a/MISC/Borland.old/ |
Turbo-C | 0 Received: from 128.84.254.220 by ee.lbl.gov for <vern@ee.lbl.gov> (8.6.8.1/1.43r) 3 Received: from CLOYD.CS.CORNELL.EDU by thialfi.cs.cornell.edu (5.67/I-1.99E) 5 Received: from iraun1.ira.uka.de by cloyd.cs.cornell.edu (5.67/I-1.99D) 7 Received: from t500i2.telematik.informatik. (actually t500i2.telematik.informatik.uni-karlsruhe.de) 9 Received: by t500i2.telematik.informatik.uni-karlsruhe.de (5.57/Ultrix3.0-C)
|