/external/openssl/crypto/dsa/ |
dsa_locl.h | 60 int *counter_ret, unsigned long *h_ret, BN_GENCB *cb);
|
dsa_depr.c | 92 BN_GENCB cb; local 97 BN_GENCB_set_old(&cb, callback, cb_arg); 100 counter_ret, h_ret, &cb))
|
/ndk/sources/cxx-stl/llvm-libc++/test/strings/basic.string/string.iterators/ |
begin.pass.cpp | 24 typename S::const_iterator cb = cs.begin(); local 29 assert(b == cb);
|
rbegin.pass.cpp | 24 typename S::const_reverse_iterator cb = cs.rbegin(); local 29 assert(b == cb);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/pulse/ |
subscribe.h | 57 pa_operation* pa_context_subscribe(pa_context *c, pa_subscription_mask_t m, pa_context_success_cb_t cb, void *userdata); 60 void pa_context_set_subscribe_callback(pa_context *c, pa_context_subscribe_cb_t cb, void *userdata);
|
context.h | 179 void pa_context_set_state_callback(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 203 pa_operation* pa_context_drain(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 208 pa_operation* pa_context_exit_daemon(pa_context *c, pa_context_success_cb_t cb, void *userdata); 211 pa_operation* pa_context_set_default_sink(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 214 pa_operation* pa_context_set_default_source(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 220 pa_operation* pa_context_set_name(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/pulse/ |
subscribe.h | 57 pa_operation* pa_context_subscribe(pa_context *c, pa_subscription_mask_t m, pa_context_success_cb_t cb, void *userdata); 60 void pa_context_set_subscribe_callback(pa_context *c, pa_context_subscribe_cb_t cb, void *userdata);
|
context.h | 179 void pa_context_set_state_callback(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 203 pa_operation* pa_context_drain(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 208 pa_operation* pa_context_exit_daemon(pa_context *c, pa_context_success_cb_t cb, void *userdata); 211 pa_operation* pa_context_set_default_sink(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 214 pa_operation* pa_context_set_default_source(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 220 pa_operation* pa_context_set_name(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/pulse/ |
subscribe.h | 57 pa_operation* pa_context_subscribe(pa_context *c, pa_subscription_mask_t m, pa_context_success_cb_t cb, void *userdata); 60 void pa_context_set_subscribe_callback(pa_context *c, pa_context_subscribe_cb_t cb, void *userdata);
|
context.h | 179 void pa_context_set_state_callback(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 203 pa_operation* pa_context_drain(pa_context *c, pa_context_notify_cb_t cb, void *userdata); 208 pa_operation* pa_context_exit_daemon(pa_context *c, pa_context_success_cb_t cb, void *userdata); 211 pa_operation* pa_context_set_default_sink(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 214 pa_operation* pa_context_set_default_source(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata); 220 pa_operation* pa_context_set_name(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata);
|
/external/openssl/crypto/pem/ |
pem_all.c | 176 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, 180 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); 186 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, 190 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); 200 pem_password_cb *cb, void *u) 211 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 217 PEM_STRING_RSA,bp,x,enc,kstr,klen,cb,u); 223 pem_password_cb *cb, void *u) 235 ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u); 241 PEM_STRING_RSA,fp,x,enc,kstr,klen,cb,u) [all...] |
/external/iptables/extensions/ |
libipt_ecn.c | 39 static void ecn_parse(struct xt_option_call *cb) 41 struct ipt_ecn_info *einfo = cb->data; 43 xtables_option_parse(cb); 44 switch (cb->entry->id) { 47 if (cb->invert) 52 if (cb->invert) 56 if (cb->invert) 59 einfo->ip_ect = cb->val.u8; 64 static void ecn_check(struct xt_fcheck_call *cb) 66 if (cb->xflags == 0 [all...] |
libipt_realm.c | 42 static void realm_parse(struct xt_option_call *cb) 44 struct ipt_realm_info *realminfo = cb->data; 48 xtables_option_parse(cb); 49 realminfo->id = strtoul(cb->arg, &end, 0); 50 if (end != cb->arg && (*end == '/' || *end == '\0')) { 55 if (*end != '\0' || end == cb->arg) 57 "Bad realm value \"%s\"", cb->arg); 59 id = xtables_lmap_name2id(realms, cb->arg); 62 "Realm \"%s\" not found", cb->arg); 66 if (cb->invert [all...] |
libxt_ipvs.c | 66 static void ipvs_mt_parse(struct xt_option_call *cb) 68 struct xt_ipvs_mtinfo *data = cb->data; 70 xtables_option_parse(cb); 71 switch (cb->entry->id) { 73 data->l4proto = cb->val.protocol; 76 memcpy(&data->vaddr, &cb->val.haddr, sizeof(cb->val.haddr)); 77 memcpy(&data->vmask, &cb->val.hmask, sizeof(cb->val.hmask)); 80 if (strcasecmp(cb->arg, "ORIGINAL") == 0) [all...] |
libxt_NFQUEUE.c | 55 static void NFQUEUE_parse(struct xt_option_call *cb) 57 xtables_option_parse(cb); 58 if (cb->entry->id == O_QUEUE_BALANCE) 63 static void NFQUEUE_parse_v1(struct xt_option_call *cb) 65 struct xt_NFQ_info_v1 *info = cb->data; 66 const uint16_t *r = cb->val.u16_range; 68 xtables_option_parse(cb); 69 switch (cb->entry->id) { 71 if (cb->nvals != 2) 73 "Bad range \"%s\"", cb->arg) [all...] |
libxt_DSCP.c | 53 static void DSCP_parse(struct xt_option_call *cb) 55 struct xt_DSCP_info *dinfo = cb->data; 57 xtables_option_parse(cb); 58 switch (cb->entry->id) { 60 dinfo->dscp = class_to_dscp(cb->arg); 65 static void DSCP_check(struct xt_fcheck_call *cb) 67 if (cb->xflags == 0)
|
libxt_conntrack.c | 294 static void conntrack_parse(struct xt_option_call *cb) 296 struct xt_conntrack_info *sinfo = cb->data; 298 xtables_option_parse(cb); 299 switch (cb->entry->id) { 301 parse_states(cb->arg, sinfo); 302 if (cb->invert) 306 if (cb->invert) 308 sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum = cb->val.protocol; 318 if (cb->invert) 320 sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip = cb->val.haddr.ip [all...] |
libxt_physdev.c | 39 static void physdev_parse(struct xt_option_call *cb) 41 struct xt_physdev_info *info = cb->data; 43 xtables_option_parse(cb); 44 switch (cb->entry->id) { 46 xtables_parse_interface(cb->arg, info->physindev, 48 if (cb->invert) 53 xtables_parse_interface(cb->arg, info->physoutdev, 55 if (cb->invert) 61 if (cb->invert) 66 if (cb->invert [all...] |
libxt_statistic.c | 46 static void statistic_parse(struct xt_option_call *cb) 48 struct xt_statistic_info *info = cb->data; 50 if (cb->invert) 53 xtables_option_parse(cb); 54 switch (cb->entry->id) { 56 if (strcmp(cb->arg, "random") == 0) 58 else if (strcmp(cb->arg, "nth") == 0) 62 cb->arg); 65 info->u.random.probability = lround(0x80000000 * cb->val.dbl); 73 static void statistic_check(struct xt_fcheck_call *cb) [all...] |
libxt_CLASSIFY.c | 35 static void CLASSIFY_parse(struct xt_option_call *cb) 37 struct xt_classify_target_info *clinfo = cb->data; 39 xtables_option_parse(cb); 40 if (CLASSIFY_string_to_priority(cb->arg, &clinfo->priority)) 42 "Bad class value \"%s\"", cb->arg);
|
libxt_quota.c | 44 static void quota_parse(struct xt_option_call *cb) 46 struct xt_quota_info *info = cb->data; 48 xtables_option_parse(cb); 49 if (cb->invert) 51 info->quota = cb->val.u64;
|
libxt_tos.c | 56 static void tos_mt_parse_v0(struct xt_option_call *cb) 58 struct ipt_tos_info *info = cb->data; 60 xtables_option_parse(cb); 61 if (cb->val.tos_mask != 0xFF) 65 info->tos = cb->val.tos_value; 66 if (cb->invert) 70 static void tos_mt_parse(struct xt_option_call *cb) 72 struct xt_tos_match_info *info = cb->data; 74 xtables_option_parse(cb); 75 info->tos_value = cb->val.tos_value [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
dhdu_nl80211.c | 81 dhd_nli->cb = nl_cb_alloc(NL_CB_DEBUG); 82 if (dhd_nli->cb == NULL) 85 nl_socket_set_cb(dhd_nli->nl, dhd_nli->cb); 89 nl_cb_put(dhd_nli->cb); 97 nl_cb_put(dhd_nli->cb); 121 nl_cb_err(dhd_nli->cb, NL_CB_CUSTOM, dhd_nl_error_handler, &err); 122 nl_cb_set(dhd_nli->cb, NL_CB_ACK, NL_CB_CUSTOM, 124 nl_cb_set(dhd_nli->cb, NL_CB_FINISH, NL_CB_CUSTOM, 126 nl_cb_set(dhd_nli->cb, NL_CB_VALID, NL_CB_CUSTOM, 129 nl_recvmsgs(dhd_nli->nl, dhd_nli->cb); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings_helper_unittest.cc | 112 MockSignedSettingsHelperCallback cb; local 131 EXPECT_CALL(cb, OnWhitelistCompleted(SignedSettings::SUCCESS, _)) 134 EXPECT_CALL(cb, OnCheckWhitelistCompleted(SignedSettings::SUCCESS, _)) 139 EXPECT_CALL(cb, OnUnwhitelistCompleted(SignedSettings::SUCCESS, _)) 144 EXPECT_CALL(cb, OnStorePropertyCompleted(SignedSettings::SUCCESS, _, _)) 147 EXPECT_CALL(cb, OnRetrievePropertyCompleted(SignedSettings::SUCCESS, _, _)) 151 SignedSettingsHelper::Get()->StartWhitelistOp(fake_email_, true, &cb); 152 SignedSettingsHelper::Get()->StartCheckWhitelistOp(fake_email_, &cb); 153 SignedSettingsHelper::Get()->StartWhitelistOp(fake_email_, false, &cb); 155 &cb); 162 MockSignedSettingsHelperCallback cb; local [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_quarantine.h | 38 // void *cb.Allocate(uptr size); 39 // void cb.Deallocate(void *ptr); 55 void Put(Cache *c, Callback cb, Node *ptr, uptr size) { 56 c->Enqueue(cb, ptr, size); 58 Drain(c, cb); 61 void NOINLINE Drain(Cache *c, Callback cb) { 67 Recycle(cb); 82 void NOINLINE Recycle(Callback cb) { 92 DoRecycle(&tmp, cb); 95 void NOINLINE DoRecycle(Cache *c, Callback cb) { [all...] |