/external/svox/pico/lib/ |
D | picosa.c | 246 sa_subobj_t * sa; in saInitialize() local 259 sa = (sa_subobj_t *) this->subObj; in saInitialize() 263 sa->procState = SA_STEPSTATE_COLLECT; in saInitialize() 265 sa->inspaceok = TRUE; in saInitialize() 266 sa->needsmoreitems = TRUE; in saInitialize() 268 sa->headxBottom = 0; in saInitialize() 269 sa->headxLen = 0; in saInitialize() 270 sa->cbuf1BufSize = PICOSA_MAXSIZE_CBUF; in saInitialize() 271 sa->cbuf2BufSize = PICOSA_MAXSIZE_CBUF; in saInitialize() 272 sa->cbuf1Len = 0; in saInitialize() [all …]
|
/external/icu4c/data/curr/ |
D | rof.txt | 16 "heleri sa Falme za Kiarabu", 20 "heleri sa Angola", 24 "heleri sa Australia", 28 "heleri sa Bahareni", 32 "heleri sa Burundi", 36 "heleri sa Botswana", 40 "heleri sa Kanada", 44 "heleri sa Kongo", 48 "heleri sa Uswisi", 52 "heleri sa China", [all …]
|
/external/chromium/third_party/icu/source/common/ |
D | uchar.c | 821 uhst_addPropertyStarts(const USetAdder *sa, UErrorCode *pErrorCode) { in uhst_addPropertyStarts() argument 846 sa->add(sa->set, 0x1100); in uhst_addPropertyStarts() 852 sa->add(sa->set, c); in uhst_addPropertyStarts() 856 sa->add(sa->set, 0x1160); in uhst_addPropertyStarts() 862 sa->add(sa->set, c); in uhst_addPropertyStarts() 866 sa->add(sa->set, 0x11a8); in uhst_addPropertyStarts() 872 sa->add(sa->set, c); in uhst_addPropertyStarts() 878 sa->add(sa->set, c); in uhst_addPropertyStarts() 879 sa->add(sa->set, c+1); in uhst_addPropertyStarts() 881 sa->add(sa->set, c); in uhst_addPropertyStarts() [all …]
|
/external/icu4c/common/ |
D | uchar.c | 773 const USetAdder *sa=(const USetAdder *)context; in _enumPropertyStartsRange() local 774 sa->add(sa->set, start); in _enumPropertyStartsRange() 778 #define USET_ADD_CP_AND_NEXT(sa, cp) sa->add(sa->set, cp); sa->add(sa->set, cp+1) argument 781 uchar_addPropertyStarts(const USetAdder *sa, UErrorCode *pErrorCode) { in uchar_addPropertyStarts() argument 794 utrie2_enum(&propsTrie, NULL, _enumPropertyStartsRange, sa); in uchar_addPropertyStarts() 799 USET_ADD_CP_AND_NEXT(sa, TAB); in uchar_addPropertyStarts() 802 sa->add(sa->set, CR+1); /* range TAB..CR */ in uchar_addPropertyStarts() 803 sa->add(sa->set, 0x1c); in uchar_addPropertyStarts() 804 sa->add(sa->set, 0x1f+1); in uchar_addPropertyStarts() 805 USET_ADD_CP_AND_NEXT(sa, NL); in uchar_addPropertyStarts() [all …]
|
/external/bluetooth/bluez/compat/ |
D | dund.c | 103 struct sockaddr_rc sa; in do_listen() local 134 sa.rc_family = AF_BLUETOOTH; in do_listen() 135 sa.rc_channel = channel; in do_listen() 136 sa.rc_bdaddr = src_addr; in do_listen() 138 if (bind(sk, (struct sockaddr *) &sa, sizeof(sa))) { in do_listen() 162 socklen_t alen = sizeof(sa); in do_listen() 167 nsk = accept(sk, (struct sockaddr *) &sa, &alen); in do_listen() 194 ba2str(&sa.rc_bdaddr, ba); in do_listen() 221 struct sockaddr_rc sa; in create_connection() local 245 sa.rc_family = AF_BLUETOOTH; in create_connection() [all …]
|
D | fakehid.c | 288 struct sigaction sa; in epox_presenter() local 309 memset(&sa, 0, sizeof(sa)); in epox_presenter() 310 sa.sa_flags = SA_NOCLDSTOP; in epox_presenter() 311 sa.sa_handler = SIG_IGN; in epox_presenter() 312 sigaction(SIGCHLD, &sa, NULL); in epox_presenter() 313 sigaction(SIGPIPE, &sa, NULL); in epox_presenter() 315 sa.sa_handler = sig_term; in epox_presenter() 316 sigaction(SIGTERM, &sa, NULL); in epox_presenter() 317 sigaction(SIGINT, &sa, NULL); in epox_presenter() 319 sa.sa_handler = sig_hup; in epox_presenter() [all …]
|
D | pand.c | 129 struct sigaction sa; in run_script() local 146 memset(&sa, 0, sizeof(sa)); in run_script() 147 sa.sa_handler = SIG_DFL; in run_script() 148 sigaction(SIGCHLD, &sa, NULL); in run_script() 149 sigaction(SIGPIPE, &sa, NULL); in run_script() 629 struct sigaction sa; in main() local 772 memset(&sa, 0, sizeof(sa)); in main() 773 sa.sa_flags = SA_NOCLDSTOP; in main() 774 sa.sa_handler = SIG_IGN; in main() 775 sigaction(SIGCHLD, &sa, NULL); in main() [all …]
|
/external/skia/src/core/ |
D | SkXfermode.cpp | 425 unsigned sa = SkGetPackedA32(src); in srcatop_modeproc() local 427 unsigned isa = 255 - sa; in srcatop_modeproc() 440 unsigned sa = SkGetPackedA32(src); in dstatop_modeproc() local 444 return SkPackARGB32(sa, in dstatop_modeproc() 446 SkAlphaMulAlpha(sa, SkGetPackedR32(dst)), in dstatop_modeproc() 448 SkAlphaMulAlpha(sa, SkGetPackedG32(dst)), in dstatop_modeproc() 450 SkAlphaMulAlpha(sa, SkGetPackedB32(dst))); in dstatop_modeproc() 455 unsigned sa = SkGetPackedA32(src); in xor_modeproc() local 457 unsigned isa = 255 - sa; in xor_modeproc() 460 return SkPackARGB32(sa + da - (SkAlphaMulAlpha(sa, da) << 1), in xor_modeproc() [all …]
|
D | SkBlitter_A8.cpp | 84 unsigned sa = SkAlphaMul(srcA, SkAlpha255To256(aa)); in blitAntiH() local 85 unsigned scale = 256 - sa; in blitAntiH() 89 device[i] = SkToU8(sa + SkAlphaMul(device[i], scale)); in blitAntiH() 119 static inline void blend_8_pixels(U8CPU bw, uint8_t dst[], U8CPU sa, unsigned dst_scale) in blend_8_pixels() argument 121 if (bw & 0x80) dst[0] = SkToU8(sa + SkAlphaMul(dst[0], dst_scale)); in blend_8_pixels() 122 if (bw & 0x40) dst[1] = SkToU8(sa + SkAlphaMul(dst[1], dst_scale)); in blend_8_pixels() 123 if (bw & 0x20) dst[2] = SkToU8(sa + SkAlphaMul(dst[2], dst_scale)); in blend_8_pixels() 124 if (bw & 0x10) dst[3] = SkToU8(sa + SkAlphaMul(dst[3], dst_scale)); in blend_8_pixels() 125 if (bw & 0x08) dst[4] = SkToU8(sa + SkAlphaMul(dst[4], dst_scale)); in blend_8_pixels() 126 if (bw & 0x04) dst[5] = SkToU8(sa + SkAlphaMul(dst[5], dst_scale)); in blend_8_pixels() [all …]
|
/external/tcpdump/ |
D | print-esp.c | 83 struct sa_list *sa, int sa_def) in esp_print_addsa() argument 93 *nsa = *sa; in esp_print_addsa() 349 struct sa_list *sa = NULL; in esp_print() local 419 for (sa = ndo->ndo_sa_list_head; sa != NULL; sa = sa->next) { in esp_print() 420 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&sa->daddr; in esp_print() 421 if (sa->spi == ntohl(esp->esp_spi) && in esp_print() 437 for (sa = ndo->ndo_sa_list_head; sa != NULL; sa = sa->next) { in esp_print() 438 struct sockaddr_in *sin = (struct sockaddr_in *)&sa->daddr; in esp_print() 439 if (sa->spi == ntohl(esp->esp_spi) && in esp_print() 453 if (sa == NULL) in esp_print() [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | pfkey_dump.c | 260 struct sockaddr *sa; local 306 sa = (void *)(m_saddr + 1); 308 printf("%s[%s]", str_ipaddr(sa), str_ipport(sa)); 310 printf("%s", str_ipaddr(sa)); 322 sa = (void *)(m_daddr + 1); 324 printf("%s[%s]", str_ipaddr(sa), str_ipport(sa)); 326 printf("%s", str_ipaddr(sa)); 499 struct sockaddr *sa; local 535 sa = (void *)(m_saddr + 1); 536 switch (sa->sa_family) { [all …]
|
/external/openssl/crypto/bio/ |
D | bss_dgram.c | 112 struct sockaddr sa; member 289 struct sockaddr sa; in dgram_read() member 295 } sa; in dgram_read() local 297 sa.len.s=0; in dgram_read() 298 sa.len.i=sizeof(sa.peer); in dgram_read() 303 memset(&sa.peer, 0x00, sizeof(sa.peer)); in dgram_read() 305 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); in dgram_read() 306 if (sizeof(sa.len.i)!=sizeof(sa.len.s) && sa.len.i==0) in dgram_read() 308 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); in dgram_read() 309 sa.len.i = (int)sa.len.s; in dgram_read() [all …]
|
D | b_sock.c | 603 struct sockaddr sa; in BIO_get_accept_socket() member 711 s=socket(server.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL); in BIO_get_accept_socket() 729 if (bind(s,&server.sa,addrlen) == -1) in BIO_get_accept_socket() 747 if (client.sa.sa_family == AF_INET6) in BIO_get_accept_socket() 754 if (client.sa.sa_family == AF_INET) in BIO_get_accept_socket() 760 cs=socket(client.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL); in BIO_get_accept_socket() 764 ii=connect(cs,&client.sa,addrlen); in BIO_get_accept_socket() 831 struct sockaddr sa; in BIO_accept() member 837 } sa; in BIO_accept() local 839 sa.len.s=0; in BIO_accept() [all …]
|
/external/bluetooth/bluez/tracer/ |
D | main.c | 85 struct sigaction sa; in main() local 123 memset(&sa, 0, sizeof(sa)); in main() 124 sa.sa_flags = SA_NOCLDSTOP; in main() 125 sa.sa_handler = sig_term; in main() 126 sigaction(SIGTERM, &sa, NULL); in main() 127 sigaction(SIGINT, &sa, NULL); in main() 129 sa.sa_handler = sig_debug; in main() 130 sigaction(SIGUSR2, &sa, NULL); in main() 132 sa.sa_handler = SIG_IGN; in main() 133 sigaction(SIGPIPE, &sa, NULL); in main()
|
/external/ipsec-tools/src/racoon/ |
D | ipsec_doi.c | 179 ipsecdoi_checkph1proposal(sa, iph1) in ipsecdoi_checkph1proposal() argument 180 vchar_t *sa; in ipsecdoi_checkph1proposal() 187 pair = get_proppair(sa, IPSECDOI_TYPE_PH1); 214 struct isakmpsa *sa, tsa; local 233 if ((sa = get_ph1approvalx(p, 267 if (sa->dhgrp) { 268 if (sa->dhgrp->prime && sa->dhgrp->gen1) { 274 oakley_dhgrp_free(sa->dhgrp); 275 sa->dhgrp=NULL; 278 if (oakley_setdhgroup(sa->dh_group, &sa->dhgrp) == -1) { [all …]
|
/external/clearsilver/util/ |
D | neo_server.c | 90 struct sigaction sa; in ignore_pipe() local 93 memset(&sa, 0, sizeof(struct sigaction)); in ignore_pipe() 95 sa.sa_handler = SIG_IGN; in ignore_pipe() 96 sigemptyset(&sa.sa_mask); in ignore_pipe() 97 sa.sa_flags = SA_RESTART; in ignore_pipe() 98 sigaction(SIGPIPE, &sa, NULL); in ignore_pipe() 113 struct sigaction sa; in setup_term() local 116 memset(&sa, 0, sizeof(struct sigaction)); in setup_term() 118 sa.sa_handler = sig_term; in setup_term() 119 sigemptyset(&sa.sa_mask); in setup_term() [all …]
|
/external/bluetooth/hcidump/src/ |
D | csrsniff.c | 156 struct sigaction sa; in main() local 249 memset(&sa, 0, sizeof(sa)); in main() 250 sa.sa_flags = SA_NOCLDSTOP; in main() 251 sa.sa_handler = SIG_IGN; in main() 252 sigaction(SIGCHLD, &sa, NULL); in main() 253 sigaction(SIGPIPE, &sa, NULL); in main() 255 sa.sa_handler = sig_term; in main() 256 sigaction(SIGTERM, &sa, NULL); in main() 257 sigaction(SIGINT, &sa, NULL); in main() 259 sa.sa_handler = sig_hup; in main() [all …]
|
/external/bluetooth/bluez/tools/ |
D | ppporc.c | 209 struct sigaction sa; in main() local 246 memset(&sa, 0, sizeof(sa)); in main() 247 sa.sa_flags = SA_NOCLDSTOP; in main() 248 sa.sa_handler = SIG_IGN; in main() 249 sigaction(SIGCHLD, &sa, NULL); in main() 250 sigaction(SIGPIPE, &sa, NULL); in main() 252 sa.sa_handler = sig_term; in main() 253 sigaction(SIGTERM, &sa, NULL); in main() 254 sigaction(SIGINT, &sa, NULL); in main() 256 sa.sa_handler = sig_hup; in main() [all …]
|
D | main.c | 322 struct sigaction sa; in cmd_connect() local 438 memset(&sa, 0, sizeof(sa)); in cmd_connect() 439 sa.sa_flags = SA_NOCLDSTOP; in cmd_connect() 440 sa.sa_handler = SIG_IGN; in cmd_connect() 441 sigaction(SIGCHLD, &sa, NULL); in cmd_connect() 442 sigaction(SIGPIPE, &sa, NULL); in cmd_connect() 444 sa.sa_handler = sig_term; in cmd_connect() 445 sigaction(SIGTERM, &sa, NULL); in cmd_connect() 446 sigaction(SIGINT, &sa, NULL); in cmd_connect() 448 sa.sa_handler = sig_hup; in cmd_connect() [all …]
|
D | hciattach.c | 369 struct sigaction sa; in bcsp() local 388 memset(&sa, 0, sizeof(sa)); in bcsp() 389 sa.sa_flags = SA_NOCLDSTOP; in bcsp() 390 sa.sa_handler = bcsp_tshy_sig_alarm; in bcsp() 391 sigaction(SIGALRM, &sa, NULL); in bcsp() 435 sa.sa_handler = bcsp_tconf_sig_alarm; in bcsp() 436 sigaction(SIGALRM, &sa, NULL); in bcsp() 1196 struct sigaction sa; in main() local 1306 memset(&sa, 0, sizeof(sa)); in main() 1307 sa.sa_flags = SA_NOCLDSTOP; in main() [all …]
|
/external/tcpdump/missing/ |
D | getnameinfo.c | 100 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) in getnameinfo() argument 101 const struct sockaddr *sa; in getnameinfo() 120 if (sa == NULL) 124 if (sa->sa_len != salen) 128 family = sa->sa_family; 140 port = ((struct sockinet *)sa)->si_port; /* network byte order */ 141 addr = (char *)sa + afd->a_off; 169 switch (sa->sa_family) { 172 ntohl(((struct sockaddr_in *)sa)->sin_addr.s_addr); 183 sin6 = (struct sockaddr_in6 *)sa; [all …]
|
/external/webkit/WebKit/win/ |
D | MarshallingHelpers.cpp | 160 SAFEARRAY* sa = ::SafeArrayCreateVectorEx(VT_BSTR, 0, (ULONG) size, 0); in stringArrayToSafeArray() local 165 ::SafeArrayPutElement(sa, &count, bstr); in stringArrayToSafeArray() 169 return sa; in stringArrayToSafeArray() 176 SAFEARRAY* sa = ::SafeArrayCreateVectorEx(VT_I4, 0, (ULONG) size, 0); in intArrayToSafeArray() local 181 ::SafeArrayPutElement(sa, &count, &number); in intArrayToSafeArray() 184 return sa; in intArrayToSafeArray() 189 SAFEARRAY* sa = ::SafeArrayCreateVectorEx(VT_I4, 0, 4, 0); in intRectToSafeArray() local 194 ::SafeArrayPutElement(sa, &count, &value); in intRectToSafeArray() 198 ::SafeArrayPutElement(sa, &count, &value); in intRectToSafeArray() 202 ::SafeArrayPutElement(sa, &count, &value); in intRectToSafeArray() [all …]
|
/external/dropbear/libtommath/ |
D | bn_mp_sub.c | 22 int sa, sb, res; in mp_sub() local 24 sa = a->sign; in mp_sub() 27 if (sa != sb) { in mp_sub() 32 c->sign = sa; in mp_sub() 41 c->sign = sa; in mp_sub() 47 c->sign = (sa == MP_ZPOS) ? MP_NEG : MP_ZPOS; in mp_sub()
|
/external/bluetooth/glib/po/ |
D | tl.po | 48 msgstr "Walang mahanap na talaksang susi sa mga dir ng datos" 96 msgstr "Pagsalin mula sa character set '%s' patungong '%s' ay hindi suportado" 107 msgstr "Hindi tanggap na byte sequence sa conversion input" 118 msgstr "Hindi kumpletong karakter sequence sa dulo ng input" 123 msgstr "Hindi maka-balik '%s' sa codeset '%s'" 162 msgstr "Error sa pagbukas ng directory '%s': %s" 172 msgstr "Error sa pagbasa ng talaksang '%s': %s" 204 "Bigo ang papalit ng pangalan ng talaksang '%s' sa '%s': bigo ang g_rename(): " 216 "Bigo ang pagbukas ng talaksang '%s' para sa pagsusulat: bigo ang fdopen(): %s" 221 msgstr "Bigo sa pagsusulat ng talaksang '%s': bigo ang fwrite(): %s" [all …]
|
/external/dhcpcd/ |
D | if-bsd.c | 54 # define SA_SIZE(sa) \ argument 55 ( (!(sa) || ((struct sockaddr *)(sa))->sa_len == 0) ? \ 57 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(long) - 1) ) ) 69 struct sockaddr *sa; in if_address() member 80 _s.sa = &_var; \ in if_address() 107 struct sockaddr sa; in if_route() member 125 l = SA_SIZE(&(_su.sa)); \ in if_route() 184 p = su.sa.sa_len + (char *)&su; in if_route() 185 for (su.sa.sa_len = 0; p > (char *)&su;) in if_route() 187 su.sa.sa_len = 1 + p - (char *)&su; in if_route()
|