/bionic/libc/stdio/ |
putchar.c | 43 FILE *so = stdout; local 45 return (putc_unlocked(c, so)); 56 FILE *so = stdout; local 58 return (putc(c, so));
|
/external/libgsm/src/ |
code.c | 62 word so[160]; local 64 Gsm_Preprocess (S, s, so); 65 Gsm_LPC_Analysis (S, so, LARc); 66 Gsm_Short_Term_Analysis_Filter (S, LARc, so); 71 so+k*40, /* d [0..39] IN */
|
/external/qemu/slirp/ |
tcp_timer.c | 49 register struct socket *so; local 54 so = tcb.so_next; 55 if (so) 56 for (; so != &tcb; so = so->so_next) 57 if ((tp = (struct tcpcb *)so->so_tcpcb) && 170 * keep retransmitting it, it'll keep eating the zeroes, so we keep 174 * So, if we were gonna drop the connection from too many retransmits, 208 * so we'll take the next rtt measurement as our srtt [all...] |
debug.c | 19 /* Carry over one item from main.c so that the tty's restored. 80 * a buffer, depending on "type", so that the stats can be sent over 300 struct socket *so; local 307 for (so = tcb.so_next; so != &tcb; so = so->so_next) { 309 n = sprintf(buff, "tcp[%s]", so->so_tcpcb?tcpstates[so->so_tcpcb->t_state]:"NONE"); 314 buff, so->s [all...] |
ip_icmp.c | 116 struct socket *so; local 118 if ((so = socreate()) == NULL) goto freeit; 119 if(udp_attach(so) == -1) { 122 sofree(so); 126 so->so_m = m; 127 so->so_faddr = ip->ip_dst; 128 so->so_fport = htons(7); 129 so->so_laddr = ip->ip_src; 130 so->so_lport = htons(9); 131 so->so_iptos = ip->ip_tos [all...] |
tcp_output.c | 69 register struct socket *so = tp->t_socket; local 128 if (off < so->so_snd.sb_cc) 137 len = min(so->so_snd.sb_cc, win) - off; 161 if (SEQ_LT(tp->snd_nxt + len, tp->snd_una + so->so_snd.sb_cc)) 164 win = sbspace(&so->so_rcv); 180 len + off >= so->so_snd.sb_cc) 208 if (2 * adv >= (long) so->so_rcv.sb_datalen) 223 * and we have not yet done so, or we're retransmitting the FIN, 252 if (so->so_snd.sb_cc && tp->t_timer[TCPT_REXMT] == 0 && 361 sbcopy(&so->so_snd, off, (int) len, mtod(m, caddr_t) + hdrlen) [all...] |
socket.c | 15 static void sofcantrcvmore(struct socket *so); 16 static void sofcantsendmore(struct socket *so); 30 struct socket *so; local 32 for (so = head->so_next; so != head; so = so->so_next) { 33 if (so->so_lport == lport && 34 so->so_laddr.s_addr == laddr.s_addr && 35 so->so_faddr.s_addr == faddr.s_addr & 54 struct socket *so; local 598 struct socket *so; local [all...] |
misc.c | 161 fork_exec(struct socket *so, const char *ex, int do_pty) 248 fork_exec(struct socket *so, const char *ex, int do_pty) 265 DEBUG_ARG("so = %lx", (long)so); 376 so->s = master; 386 so->s = accept(s, (struct sockaddr *)&addr, &addrlen); 387 } while (so->s < 0 && errno == EINTR); 390 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int)); 392 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int)); 394 fd_nonblock(so->s) 639 struct socket *so; local [all...] |
tcp_input.c | 65 * when segments are out of order (so fast retransmit can work). 68 #define TCP_REASS(tp, ti, m, so, flags) {\ 80 if (so->so_emu) { \ 81 if (tcp_emu((so),(m))) sbappend((so), (m)); \ 83 sbappend((so), (m)); \ 84 /* sorwakeup(so); */ \ 91 #define TCP_REASS(tp, ti, m, so, flags) { \ 100 if (so->so_emu) { \ 101 if (tcp_emu((so),(m))) sbappend(so, (m)); 120 struct socket *so = tp->t_socket; local 242 struct socket *so = NULL; local 1699 struct socket *so = tp->t_socket; local [all...] |
tcp_subr.c | 67 struct socket *so = tp->t_socket; local 74 n->ti_src = so->so_faddr; 75 n->ti_dst = so->so_laddr; 76 n->ti_sport = so->so_fport; 77 n->ti_dport = so->so_lport; 133 * ti points into m so the next line is just making 179 tcp_newtcpcb(struct socket *so) 192 tp->t_socket = so; 195 * Init srtt to TCPTV_SRTTBASE (0), so we can tell that we have no 196 * rtt estimate. Set rttvar so that srtt + 2 * rttvar give 256 struct socket *so = tp->t_socket; local 433 struct socket *so; local [all...] |
udp.c | 50 static u_int8_t udp_tos(struct socket *so); 51 static void udp_emu(struct socket *so, struct mbuf *m); 82 struct socket *so; local 168 so = udp_last_so; 169 if (so->so_lport != uh->uh_sport || 170 so->so_laddr.s_addr != ip->ip_src.s_addr) { 178 so = tmp; 183 so = NULL; 186 udp_last_so = so; 190 if (so == NULL) 633 struct socket *so; local [all...] |
/external/qemu/slirp-android/ |
tcp_timer.c | 49 register struct socket *so; local 54 so = tcb.so_next; 55 if (so) 56 for (; so != &tcb; so = so->so_next) 57 if ((tp = (struct tcpcb *)so->so_tcpcb) && 170 * keep retransmitting it, it'll keep eating the zeroes, so we keep 174 * So, if we were gonna drop the connection from too many retransmits, 208 * so we'll take the next rtt measurement as our srtt [all...] |
ip_icmp.c | 117 struct socket *so; local 122 if ((so = socreate()) == NULL) goto freeit; 123 if(udp_attach(so) == -1) { 126 sofree(so); 130 so->so_m = m; 131 so->so_faddr_ip = ip_geth(ip->ip_dst); 132 so->so_faddr_port = 7; 133 so->so_laddr_ip = ip_geth(ip->ip_src); 134 so->so_laddr_port = 9; 135 so->so_iptos = ip->ip_tos [all...] |
tcp_output.c | 69 register struct socket *so = tp->t_socket; local 128 if (off < so->so_snd.sb_cc) 137 len = min(so->so_snd.sb_cc, win) - off; 161 if (SEQ_LT(tp->snd_nxt + len, tp->snd_una + so->so_snd.sb_cc)) 164 win = sbspace(&so->so_rcv); 180 len + off >= so->so_snd.sb_cc) 208 if (2 * adv >= (long) so->so_rcv.sb_datalen) 223 * and we have not yet done so, or we're retransmitting the FIN, 252 if (so->so_snd.sb_cc && tp->t_timer[TCPT_REXMT] == 0 && 361 sbcopy(&so->so_snd, off, (int) len, mtod(m, caddr_t) + hdrlen) [all...] |
/packages/apps/Email/src/com/android/email/activity/setup/ |
SpinnerOption.java | 28 SpinnerOption so = (SpinnerOption)spinner.getItemAtPosition(i); local 29 if (so.value.equals(value)) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); local 51 assertEquals("SHA1withDSA", so.getAlgorithm()); 52 assertEquals(prop, so.getObject()); 54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig)); 56 assertNotNull("signature is null", so.getSignature());
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 62 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); local 64 assertEquals("SHA1withDSA", so.getAlgorithm()); 65 assertEquals(prop, so.getObject()); 67 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig)); 69 assertNotNull("signature is null", so.getSignature());
|
/external/ipsec-tools/src/libipsec/ |
test-policy.c | 155 int so; local 171 if ((so = socket(family, SOCK_DGRAM, 0)) < 0) 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 181 close(so); 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) { 189 close(so); 202 close(so); 211 close (so); 225 int so; local 242 if ((so = pfkey_open()) < 0 [all...] |
libpfkey.h | 68 int so; /* socket */ member in struct:pfkey_send_sa_args
|
/external/ipsec-tools/src/racoon/ |
kmpstat.c | 95 static int so; variable 108 so = socket(AF_UNIX, SOCK_STREAM, 0); 109 if (so < 0) 112 if (connect(so, (struct sockaddr *)&name, sizeof(name)) < 0) { 113 (void)close(so); 126 if ((len = send(so, combuf->v, combuf->l, 0)) == -1) { 128 (void)close(so); 149 if ((len = recv(so, &h, sizeof(h), MSG_PEEK)) == -1) 168 if ((len = recv(so, p, h.ac_len, 0)) < 0) {
|
/external/openssl/crypto/pkcs7/ |
example.c | 22 ASN1_TYPE *so; local 24 so=PKCS7_get_signed_attribute(si,NID_pkcs9_signingTime); 25 if (so->type == V_ASN1_UTCTIME) 26 return so->value.utctime; 49 ASN1_TYPE *so; local 57 so=PKCS7_get_signed_attribute(si,signed_string_nid); 58 if (so != NULL) 60 if (so->type == V_ASN1_OCTET_STRING) 62 os=so->value.octet_string; 117 ASN1_TYPE *so; local 182 ASN1_TYPE *so; local 211 ASN1_TYPE *so; local 281 ASN1_TYPE *so; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 72 SealedObject so = new SealedObject(secret, new NullCipher()); local 75 oos.writeObject(so); 86 + "by getAlgorithm() method of initial object", so 112 SealedObject so = new SealedObject(secret, cipher); local 126 * SealedObject(SealedObject so) method testing. Tests if the 162 SealedObject so = new SealedObject(secret, cipher); local 165 + "in cipher.", algorithm, so.getAlgorithm()); 184 Mock_SealedObject so = new Mock_SealedObject(secret, cipher); local 187 + "original object.", secret, so.getObject(key)); 191 .equals(so.get_encodedParams(), cipher.getParameters( 228 SealedObject so = new SealedObject(secret, cipher); local 273 SealedObject so = new SealedObject(secret, cipher); local [all...] |
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 52 SealedObject so = new SealedObject(secret, new NullCipher()); local 55 oos.writeObject(so); 66 + "by getAlgorithm() method of initial object", so 85 * SealedObject(SealedObject so) method testing. Tests if the 121 SealedObject so = new SealedObject(secret, cipher); local 124 + "in cipher.", algorithm, so.getAlgorithm()); 143 SealedObject so = new SealedObject(secret, cipher); local 146 + "original object.", secret, so.getObject(key)); 150 .equals(so.encodedParams, cipher.getParameters().getEncoded())); 178 SealedObject so = new SealedObject(secret, cipher) local 217 SealedObject so = new SealedObject(secret, cipher); local [all...] |
/packages/apps/Email/tests/src/com/android/email/activity/setup/ |
AccountSetupOptionsTests.java | 154 SpinnerOption so = (SpinnerOption) sa.getItem(i); local 155 if (so != null && ((Integer)so.value).intValue() == value) {
|
/external/qemu/android/ |
adb-server.c | 90 int so; member in struct:AdbServer 185 D("Connecting ADB host %p(so=%d) with ADB guest %p(o=%p)", 201 D("Disconnecting ADB host %p(so=%d) from ADB guest %p(o=%p)", 207 D("Disconnecting ADB host %p(so=%d)", adb_host, adb_host->host_so); 229 D("Error while reading from ADB host %p(so=%d). Error: %s", 235 D("%s %d bytes received from ADB host %p(so=%d): %s", 366 assert(adb_srv->so == fd); 398 D("Pend ADB host %p(so=%d)", adb_host, adb_host->host_so); 431 _adb_server.so = socket_loopback_server(port, SOCKET_STREAM); 432 if (_adb_server.so < 0) [all...] |