/kernel/linux/linux-6.6/arch/sh/kernel/cpu/sh3/ |
H A D | serial-sh770x.c | 5 #include <cpu/serial.h>
|
H A D | serial-sh7710.c | 5 #include <cpu/serial.h>
|
H A D | serial-sh7720.c | 5 #include <cpu/serial.h>
|
/kernel/linux/linux-5.10/sound/usb/6fire/ |
H A D | comm.h | 25 u8 serial; /* urb serial */ member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | serial.h | 2 * include/linux/serial.h 12 #include <uapi/linux/serial.h>
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | test_lookup_key.c | 21 extern struct bpf_key *bpf_lookup_user_key(__u32 serial, __u64 flags) __ksym;
|
/kernel/linux/linux-6.6/sound/usb/6fire/ |
H A D | comm.h | 25 u8 serial; /* urb serial */ member
|
/third_party/eudev/src/scsi_id/ |
H A D | scsi_id.h | 29 * MAX_SERIAL_LEN: the maximum length of the serial number, including 46 char serial[MAX_SERIAL_LEN]; member
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl_cookie.h | 64 unsigned long MBEDTLS_PRIVATE(serial); /*!< serial number for expiration */
|
/third_party/mesa3d/src/glx/windows/ |
H A D | xwindowsdri.h | 33 unsigned long serial; /* # of last request processed by server */ member
|
/third_party/icu/icu4c/source/samples/ucnv/ |
H A D | flagcb.h | 50 uint32_t serial; /* minted from nextSerial */ member
|
/third_party/skia/third_party/externals/angle2/src/libANGLE/renderer/d3d/d3d9/ |
H A D | VertexDeclarationCache.h | 49 unsigned int serial; member
|
/third_party/skia/third_party/externals/icu/source/samples/ucnv/ |
H A D | flagcb.h | 50 uint32_t serial; /* minted from nextSerial */ member
|
/third_party/skia/third_party/externals/dawn/src/dawn_native/ |
H A D | RingBufferAllocator.h | 35 uint64_t Allocate(uint64_t allocationSize, ExecutionSerial serial); 59 0; // Size of the sub-alloc requests (in bytes) of the current serial.
|
/kernel/linux/linux-6.6/tools/testing/selftests/hid/tests/ |
H A D | test_wacom_generic.py | 109 Contains values used to identify a specific stylus, e.g. its serial 114 serial = attr.ib() variable in ToolID 124 reportdata.transducerserialnumber = self.serial & 0xFFFFFFFF 125 reportdata.serialhi = (self.serial >> 32) & 0xFFFFFFFF 642 toolid=ToolID(serial=1, tooltype=1), 699 toolid=ToolID(serial=1, tooltype=1), 787 toolid=ToolID(serial=1, tooltype=0x822),
|
/third_party/ffmpeg/libavcodec/ |
H A D | mediacodecdec_common.c | 260 if (!released && (ctx->delay_flush || buffer->serial == atomic_load(&ctx->serial))) { in mediacodec_buffer_release() 323 buffer->serial = atomic_load(&s->serial); in mediacodec_wrap_hw_buffer() 542 atomic_fetch_add(&s->serial, 1); in mediacodec_dec_flush_codec() 571 atomic_init(&s->serial, 1); in ff_mediacodec_dec_init()
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 56 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 68 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 selfsign=1 \ 75 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 83 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@ 197 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=13926223505202072808 selfsign=1 \ 213 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=13926223505202072808 request_file=test-ca2.req.sha256 selfsign=1 \ 335 $(MBEDTLS_CERT_WRITE) request_file=$< serial=4 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ 338 $(MBEDTLS_CERT_WRITE) request_file=$< serial=4 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA256 version=3 output_file=$@ 408 $(MBEDTLS_CERT_WRITE) subject_key=$< subject_name="C=NL, O=PolarSSL, CN=localhost" serial=17 \ 424 $(MBEDTLS_CERT_WRITE) request_file=cli2.req.sha256 serial [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | keyctl.c | 71 * If successful, the new key's serial number is returned, otherwise an error 138 ret = key_ref_to_ptr(key_ref)->serial; in SYSCALL_DEFINE5() 160 * one specified and the serial number of the key will be returned. 235 ret = key->serial; in SYSCALL_DEFINE4() 271 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_get_keyring_ID() 784 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_keyring_search() 1200 if (rka->target_key->serial != id) in keyctl_instantiate_key_common() 1362 if (rka->target_key->serial != id) in keyctl_reject_key() 1545 ret = authkey->serial; in keyctl_assume_authority() 1810 watch->id = key->serial; in keyctl_watch_key() [all...] |
/kernel/linux/linux-6.6/net/rxrpc/ |
H A D | ar-internal.h | 183 u32 serial; /* serial number of pkt sent to network */ member 517 rxrpc_serial_t tx_serial; /* Outgoing packet serial number counter */ 518 unsigned int hi_serial; /* highest serial number received */ 683 rxrpc_serial_t rx_serial; /* Highest serial received for this call */ 728 rxrpc_serial_t acks_highest_serial; /* Highest serial number ACK'd */ 831 * Allocate the next serial number on a connection. 0 must be skipped. 835 rxrpc_serial_t serial; in rxrpc_get_next_serial() local 837 serial = conn->tx_serial; in rxrpc_get_next_serial() 838 if (serial in rxrpc_get_next_serial() [all...] |
/kernel/linux/linux-6.6/security/keys/ |
H A D | keyctl.c | 71 * If successful, the new key's serial number is returned, otherwise an error 138 ret = key_ref_to_ptr(key_ref)->serial; in SYSCALL_DEFINE5() 160 * one specified and the serial number of the key will be returned. 235 ret = key->serial; in SYSCALL_DEFINE4() 271 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_get_keyring_ID() 784 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_keyring_search() 1200 if (rka->target_key->serial != id) in keyctl_instantiate_key_common() 1362 if (rka->target_key->serial != id) in keyctl_reject_key() 1545 ret = authkey->serial; in keyctl_assume_authority() 1810 watch->id = key->serial; in keyctl_watch_key() [all...] |
/third_party/libinput/src/ |
H A D | evdev-tablet.c | 901 tablet->current_tool.serial = e->value; in tablet_process_misc() 1134 uint32_t serial) in tablet_get_tool() 1140 if (serial) { in tablet_get_tool() 1144 if (type == t->type && serial == t->serial) { in tablet_get_tool() 1151 /* If we get a tool with a delayed serial number, we already created in tablet_get_tool() 1152 * a 0-serial number tool for it earlier. Re-use that, even though in tablet_get_tool() 1158 /* We can't guarantee that tools without serial numbers are in tablet_get_tool() 1162 * Same as above, but don't bother checking the serial number in tablet_get_tool() 1171 /* Didn't find the tool but we have a serial in tablet_get_tool() 1131 tablet_get_tool(struct tablet_dispatch *tablet, enum libinput_tablet_tool_type type, uint32_t tool_id, uint32_t serial) tablet_get_tool() argument [all...] |
/kernel/linux/linux-5.10/arch/arm/include/debug/ |
H A D | pl01x.S | 9 #include <linux/amba/serial.h>
|
/kernel/linux/linux-5.10/arch/sh/kernel/cpu/sh3/ |
H A D | serial-sh7720.c | 5 #include <cpu/serial.h>
|
/kernel/linux/linux-6.6/arch/mips/boot/compressed/ |
H A D | uart-16550.c | 3 * 16550 compatible uart based serial debug support for zboot 31 #error please define the serial port address for your own machine
|
/kernel/linux/linux-6.6/arch/arc/kernel/ |
H A D | devtree.c | 15 #include <asm/serial.h>
|