/external/iproute2/tc/ |
D | q_hfsc.c | 149 struct tc_service_curve rsc, fsc, usc; in hfsc_parse_class_opt() local 153 memset(&rsc, 0, sizeof(rsc)); in hfsc_parse_class_opt() 161 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { in hfsc_parse_class_opt() 175 if (hfsc_get_sc(&argc, &argv, &rsc) < 0) { in hfsc_parse_class_opt() 179 memcpy(&fsc, &rsc, sizeof(fsc)); in hfsc_parse_class_opt() 216 addattr_l(n, 1024, TCA_HFSC_RSC, &rsc, sizeof(rsc)); in hfsc_parse_class_opt() 241 struct tc_service_curve *rsc = NULL, *fsc = NULL, *usc = NULL; in hfsc_print_class_opt() local 249 if (RTA_PAYLOAD(tb[TCA_HFSC_RSC]) < sizeof(*rsc)) in hfsc_print_class_opt() 252 rsc = RTA_DATA(tb[TCA_HFSC_RSC]); in hfsc_print_class_opt() 268 if (rsc != NULL && fsc != NULL && in hfsc_print_class_opt() [all …]
|
/external/llvm/test/MC/ARM/ |
D | basic-arm-instructions.s | 2045 rsc r4, r5, #0xf000 2046 rsc r4, r5, $0xf000 2047 rsc r4, r5, 0xf000 2048 rsc r7, r8, #(0xff << 16) 2049 rsc r7, r8, #-2147483638 2050 rsc r7, r8, #42, #2 2051 rsc r7, r8, #40, #2 2052 rsc r7, r8, $40, $2 2053 rsc r7, r8, 40, 2 2054 rsc r7, r8, (2 * 20), (1 << 1) [all …]
|
/external/libunwind/src/ia64/ |
D | Ginstall_cursor.S | 64 mov.m r10 = ar.rsc // (ar.rsc: ~ 12 cycle latency) 242 mov.m ar.rsc = r11 // put RSE into enforced lazy mode 262 mov.m ar.rsc = r11 // 14 cycles latency to loadrs 289 mov.m ar.rsc = r10 // restore original ar.rsc 299 .next: mov.m ar.rsc = r10 // restore original ar.rsc
|
D | getcontext.S | 55 mov.m rRSC = ar.rsc // M2, 12 cyc. 110 mov.m ar.rsc = rTMP // put RSE into lazy mode // M2, ? cycles 164 mov.m ar.rsc = rRSC // restore RSE mode // M2
|
/external/libutf/ |
D | README | 2 Please send comments to rsc@swtch.com.
|
D | Makefile | 101 scp *.rpm rsc@amsterdam.lcs.mit.edu:public_html/software 117 scp *.tgz rsc@amsterdam.lcs.mit.edu:public_html/software
|
D | NOTICE | 18 to Russ Cox <rsc@swtch.com>.
|
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/text/ |
D | SpoofCheckerTest.java | 93 SpoofChecker rsc = null; in TestOpenFromSourceRules() local 101 … rsc = new SpoofChecker.Builder().setData(confusables, confusablesWholeScript).build(); in TestOpenFromSourceRules() 109 if (rsc == null) { in TestOpenFromSourceRules() 114 checkSkeleton(rsc, "TestOpenFromSourceRules"); in TestOpenFromSourceRules() 117 rsc.failsChecks("Hello", result); in TestOpenFromSourceRules() 122 assertTrue("Checker built from rules equals default", defaultChecker.equals(rsc)); in TestOpenFromSourceRules() 126 assertFalse("", optionChecker.equals(rsc)); in TestOpenFromSourceRules()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 814 u8 key_buf[32], rsc[6]; in wpa_supplicant_process_stk_3_of_4() local 869 os_memset(rsc, 0, 6); in wpa_supplicant_process_stk_3_of_4() 871 rsc, sizeof(rsc), _key, key_len) < 0) { in wpa_supplicant_process_stk_3_of_4() 886 u8 rsc[6]; in wpa_supplicant_process_stk_4_of_4() local 891 os_memset(rsc, 0, 6); in wpa_supplicant_process_stk_4_of_4() 893 rsc, sizeof(rsc), peerkey->stk.tk, in wpa_supplicant_process_stk_4_of_4()
|
D | tdls.c | 191 u8 rsc[6]; in wpa_tdls_set_key() local 194 os_memset(rsc, 0, 6); in wpa_tdls_set_key() 212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key()
|
/external/icu/icu4c/source/test/cintltst/ |
D | spooftest.c | 141 USpoofChecker *rsc; in TestUSpoofCAPI() local 165 rsc = uspoof_openFromSource(confusables, confusablesLength, in TestUSpoofCAPI() 173 uspoof_close(rsc); in TestUSpoofCAPI()
|
/external/llvm/test/MC/Disassembler/ARM/ |
D | basic-arm-instructions.txt | 1339 # CHECK: rsc r4, r5, #61440 1340 # CHECK: rsc r7, r8, #-2147483638 1341 # CHECK: rsc r7, r8, #40, #2 1342 # CHECK: rsc r4, r5, r6 1343 # CHECK: rsc r4, r5, r6, lsl #5 1345 # CHECK: rsc r4, r5, r6, lsr #5 1346 # CHECK: rsc r4, r5, r6, asr #5 1347 # CHECK: rsc r4, r5, r6, ror #5 1348 # CHECK: rsc r6, r7, r8, lsl r9 1349 # CHECK: rsc r6, r7, r8, lsr r9 [all …]
|
/external/llvm/test/CodeGen/ARM/ |
D | carry.ll | 44 ; CHECK: rsc r
|
/external/regex-re2/ |
D | CONTRIBUTORS | 32 Russ Cox <rsc@swtch.com>
|
D | ucs2.diff | 12 Change 12780686 by rsc@rsc-re2 on 2009/09/16 15:30:15
|
D | Makefile | 17 ARFLAGS=rsc
|
/external/protobuf/gtest/ |
D | CONTRIBUTORS | 29 Russ Cox <rsc@google.com>
|
/external/google-breakpad/src/testing/gtest/ |
D | CONTRIBUTORS | 30 Russ Cox <rsc@google.com>
|
/external/libvpx/libvpx/third_party/googletest/src/ |
D | CONTRIBUTORS | 30 Russ Cox <rsc@google.com>
|
/external/gtest/ |
D | CONTRIBUTORS | 30 Russ Cox <rsc@google.com>
|
/external/libunwind/tests/ |
D | ia64-test-rbs-asm.S | 113 mov ar.rsc = r2;; \ 177 mov ar.rsc = 0 // put RSE into enforced lazy mode
|
D | ia64-test-stack-asm.S | 136 mov ar.rsc = 0 // put RSE into enforced lazy mode
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 2115 u8 rsc[WPA_KEY_RSC_LEN]; in ieee80211w_kde_add() local 2124 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0) in ieee80211w_kde_add() 2127 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add() 2162 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; in SM_STATE() local 2181 os_memset(rsc, 0, WPA_KEY_RSC_LEN); in SM_STATE() 2182 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); in SM_STATE() 2212 _rsc = rsc; in SM_STATE() 2511 u8 rsc[WPA_KEY_RSC_LEN]; in SM_STATE() local 2531 os_memset(rsc, 0, WPA_KEY_RSC_LEN); in SM_STATE() 2533 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); in SM_STATE() [all …]
|
/external/v8/test/cctest/ |
D | test-disasm-arm.cc | 166 COMPARE(rsc(r7, r8, Operand(ip, LSL, r0)), in TEST() 168 COMPARE(rsc(r7, r8, Operand(ip, LSL, r1)), in TEST() 170 COMPARE(rsc(r7, r8, Operand(ip), SetCC), in TEST() 172 COMPARE(rsc(r7, r8, Operand(ip, LSL, r3), SetCC, ls), in TEST()
|
/external/icu/icu4c/source/i18n/ |
D | rbnf.cpp | 135 int32_t rsc = getNumberOfRuleSets(); in operator ==() local 136 if (rsc == rhs->getNumberOfRuleSets()) { in operator ==() 137 for (int i = 0; i < rsc; ++i) { in operator ==() 151 for (int j = 0; j < rsc; ++j) { in operator ==()
|