/external/libselinux/src/ |
sestatus.c | 48 * read_sequence 59 static inline uint32_t read_sequence(struct selinux_status_t *status) function 104 curr_seqno = read_sequence(selinux_status); 150 seqno = read_sequence(selinux_status); 154 } while (seqno != read_sequence(selinux_status)); 187 seqno = read_sequence(selinux_status); 191 } while (seqno != read_sequence(selinux_status)); 218 seqno = read_sequence(selinux_status); 222 } while (seqno != read_sequence(selinux_status));
|
/external/chromium_org/remoting/protocol/ |
message_decoder_unittest.cc | 48 void SimulateReadSequence(const int read_sequence[], int sequence_size) { 68 int read = std::min(size - pos, read_sequence[pos % sequence_size]);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl2.h | 206 unsigned long read_sequence; member in struct:ssl2_state_st
|
ssl3.h | 410 unsigned char read_sequence[8]; member in struct:ssl3_state_st
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_enc.c | 167 seq=s->s2->read_sequence;
|
ssl2.h | 206 unsigned long read_sequence; member in struct:ssl2_state_st
|
d1_pkt.c | 200 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 601 memcpy(&(s->s3->read_sequence[2]), p, 6); [all...] |
t1_enc.c | 610 memset(is_read ? s->s3->read_sequence : s->s3->write_sequence, 0, 8); 833 seq = send ? s->s3->write_sequence : s->s3->read_sequence; 1013 seq = send?s->s3->write_sequence:s->s3->read_sequence; [all...] |
s3_enc.c | 278 memset(&(s->s3->read_sequence[0]),0,8); 733 seq= &(ssl->s3->read_sequence[0]);
|
s2_pkt.c | 279 INC32(s->s2->read_sequence); /* expect next number */
|
s3_both.c | 300 * ssl->s3->read_sequence zero
|
ssl3.h | 410 unsigned char read_sequence[8]; member in struct:ssl3_state_st
|
/external/openssl/include/openssl/ |
ssl2.h | 206 unsigned long read_sequence; member in struct:ssl2_state_st
|
ssl3.h | 410 unsigned char read_sequence[8]; member in struct:ssl3_state_st
|
/external/openssl/ssl/ |
s2_enc.c | 167 seq=s->s2->read_sequence;
|
ssl2.h | 206 unsigned long read_sequence; member in struct:ssl2_state_st
|
d1_pkt.c | 200 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 601 memcpy(&(s->s3->read_sequence[2]), p, 6); [all...] |
t1_enc.c | 407 memset(&(s->s3->read_sequence[0]),0,8); 756 seq = send?s->s3->write_sequence:s->s3->read_sequence; 968 seq= &(ssl->s3->read_sequence[0]); [all...] |
s3_enc.c | 278 memset(&(s->s3->read_sequence[0]),0,8); 727 seq= &(ssl->s3->read_sequence[0]);
|
s2_pkt.c | 279 INC32(s->s2->read_sequence); /* expect next number */
|
s3_both.c | 300 * ssl->s3->read_sequence zero
|
ssl3.h | 410 unsigned char read_sequence[8]; member in struct:ssl3_state_st
|
/external/blktrace/ |
blkparse.c | 228 unsigned long read_sequence; member in struct:trace 269 static unsigned long read_sequence; variable [all...] |
/external/chromium_org/third_party/openssl/openssl/patches/ |
tls1_change_cipher_state_rewrite.patch | 157 - memset(&(s->s3->read_sequence[0]),0,8); 479 + memset(is_read ? s->s3->read_sequence : s->s3->write_sequence, 0, 8);
|
aead_ssl_support.patch | 585 + seq = send ? s->s3->write_sequence : s->s3->read_sequence;
|