/external/valgrind/main/coregrind/m_sigframe/ |
H A D | sigframe-amd64-darwin.c | 119 Addr rsp; local 126 rsp = sp_top_of_frame - sizeof(struct hacky_sigframe); 129 if (!extend(tst, rsp, sp_top_of_frame - rsp)) 132 vg_assert(VG_IS_16_ALIGNED(rsp)); 134 frame = (struct hacky_sigframe *) rsp; 158 vg_assert(rsp == (Addr)&frame->returnAddr); 159 VG_(set_SP)(tid, rsp); 195 Addr rsp; local 203 rsp [all...] |
H A D | sigframe-amd64-linux.c | 360 SC2(rsp,RSP); 449 Addr rsp = rsp_top_of_frame; local 454 rsp -= sizeof(*frame); 455 rsp = VG_ROUNDDN(rsp, 16); 456 frame = (struct rt_sigframe *)rsp; 458 if (!extend(tst, rsp, sizeof(*frame))) 463 rsp, offsetof(struct rt_sigframe, vg) ); 489 rsp, offsetof(struct rt_sigframe, vg) ); 493 return rsp; 506 Addr rsp; local 610 Addr rsp; local [all...] |
/external/kernel-headers/original/linux/ |
H A D | ipmi_smi.h | 74 unsigned char rsp[IPMI_MAX_MSG_LENGTH]; member in struct:ipmi_smi_msg
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 108 OCSP_RESPONSE *rsp = NULL; local 110 if (!(rsp = OCSP_RESPONSE_new())) goto err; 111 if (!(ASN1_ENUMERATED_set(rsp->responseStatus, status))) goto err; 112 if (!bs) return rsp; 113 if (!(rsp->responseBytes = OCSP_RESPBYTES_new())) goto err; 114 rsp->responseBytes->responseType = OBJ_nid2obj(NID_id_pkix_OCSP_basic); 115 if (!ASN1_item_pack(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBytes->response)) 117 return rsp; 119 if (rsp) OCSP_RESPONSE_free(rsp); 124 OCSP_basic_add1_status(OCSP_BASICRESP *rsp, OCSP_CERTID *cid, int status, int reason, ASN1_TIME *revtime, ASN1_TIME *thisupd, ASN1_TIME *nextupd) argument [all...] |
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | syswrap-amd64-linux.c | 81 " movq %rdi, %rsp\n" // set stack 119 void* tls_ptr at 8(%rsp) 157 " movq 8(%rsp), %r8\n" // syscall arg5: tls_ptr 201 ULong flags, Addr rsp, 237 If the clone call specifies a NULL rsp for the new thread, then 238 it actually gets a copy of the parent's rsp. 246 if (rsp != 0) 247 ctst->arch.vex.guest_RSP = rsp; 271 seg = VG_(am_find_nsegment)((Addr)rsp); 273 ctst->client_stack_highest_word = (Addr)VG_PGROUNDUP(rsp); 200 do_clone( ThreadId ptid, ULong flags, Addr rsp, Long* parent_tidptr, Long* child_tidptr, Addr tlsaddr ) argument [all...] |
/external/libnfc-nci/src/nfa/ee/ |
H A D | nfa_ee_main.c | 149 tNFC_NFCEE_MODE_SET_REVT rsp; local 180 * process the same as the host gets activate rsp */ 189 rsp.mode = NFA_EE_MD_ACTIVATE; 190 rsp.nfcee_id = p_cb->nfcee_id; 191 rsp.status = NFA_STATUS_OK; 192 ee_msg.p_data = &rsp;
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_main.c | 525 /* Send L2CAP connect rsp */ 1000 tGATTS_SRV_CHG_RSP rsp; local 1008 status = (*gatt_cb.cb_info.p_srv_chg_callback)(GATTS_SRV_CHG_CMD_READ_NUM_CLENTS, NULL, &rsp); 1010 if (status && rsp.num_clients) 1012 GATT_TRACE_DEBUG1("gatt_init_srv_chg num_srv_chg_clt_clients=%d", rsp.num_clients); 1013 num_clients = rsp.num_clients; 1018 if ((status = (*gatt_cb.cb_info.p_srv_chg_callback)(GATTS_SRV_CHG_CMD_READ_CLENT, &req, &rsp))) 1020 memcpy(&srv_chg_clt, &rsp.srv_chg ,sizeof(tGATTS_SRV_CHG));
|
/external/kernel-headers/original/asm-x86/ |
H A D | ptrace.h | 94 unsigned long rsp; member in struct:pt_regs 105 #define stack_pointer(regs) ((regs)->rsp)
|
H A D | sigcontext.h | 121 unsigned long rsp; member in struct:sigcontext
|
/external/v8/src/x64/ |
H A D | assembler-x64.h | 92 // rsp - stack pointer 186 const Register rsp = { kRegister_rsp_Code }; member in namespace:v8::internal
|
H A D | macro-assembler-x64.cc | 469 testq(rsp, Immediate(frame_alignment_mask)); 553 addq(rsp, Immediate(num_arguments * kPointerSize)); 627 // -- rsp[0] : return address 628 // -- rsp[8] : argument num_arguments - 1 630 // -- rsp[8 * num_arguments] : argument 0 (receiver) 830 subq(rsp, Immediate(kDoubleSize * XMMRegister::kNumRegisters)); 833 movsd(Operand(rsp, i * kDoubleSize), reg); 847 movsd(reg, Operand(rsp, i * kDoubleSize)); 849 addq(rsp, Immediate(kDoubleSize * XMMRegister::kNumRegisters)); 2298 addq(rsp, Immediat 2498 movq(ExternalOperand(handler_address), rsp); local 3298 movq(Operand(rbp, ExitFrameConstants::kSPOffset), rsp); local [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_hf.c | 801 static bt_status_t formatted_at_response(const char *rsp) argument 810 strncpy(ag_res.str, rsp, BTA_AG_AT_MAX_LEN);
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | mca_api.h | 192 tMCA_RSP_EVT rsp; member in union:__anon1311
|
/external/qemu/hw/ |
H A D | bt-sdp.c | 136 uint8_t *rsp, const uint8_t *req, ssize_t len) 185 memcpy(rsp + len, &handle, 4); 193 rsp[0] = count >> 8; 194 rsp[1] = count & 0xff; 195 rsp[2] = (end - start) >> 8; 196 rsp[3] = (end - start) & 0xff; 199 rsp[len ++] = sizeof(int); 200 memcpy(rsp + len, &end, sizeof(int)); 203 rsp[len ++] = 0; 244 uint8_t *rsp, cons 135 sdp_svc_search(struct bt_l2cap_sdp_state_s *sdp, uint8_t *rsp, const uint8_t *req, ssize_t len) argument 243 sdp_attr_get(struct bt_l2cap_sdp_state_s *sdp, uint8_t *rsp, const uint8_t *req, ssize_t len) argument 370 sdp_svc_search_attr_get(struct bt_l2cap_sdp_state_s *sdp, uint8_t *rsp, const uint8_t *req, ssize_t len) argument 490 uint8_t rsp[MAX_PDU_OUT_SIZE - PDU_HEADER_SIZE], *sdu_out; local [all...] |
H A D | bt-l2cap.c | 504 uint8_t rsp[len]; local 507 data = memcpy(rsp, data, len); 678 flag, result, rsp, len);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | ctrl_iface.c | 232 char *rsp) 240 pos = os_strchr(rsp, '-'); 250 wpa_printf(MSG_DEBUG, "CTRL_IFACE: field=%s id=%d", rsp, id); 262 if (os_strcmp(rsp, "IDENTITY") == 0) { 269 } else if (os_strcmp(rsp, "PASSWORD") == 0) { 276 } else if (os_strcmp(rsp, "NEW_PASSWORD") == 0) { 283 } else if (os_strcmp(rsp, "PIN") == 0) { 289 } else if (os_strcmp(rsp, "OTP") == 0) { 296 } else if (os_strcmp(rsp, "PASSPHRASE") == 0) { 303 wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown field '%s'", rsp); 231 wpa_supplicant_ctrl_iface_ctrl_rsp(struct wpa_supplicant *wpa_s, char *rsp) argument [all...] |
/external/openssl/apps/ |
H A D | ocsp.c | 1284 OCSP_RESPONSE *rsp = NULL; local 1336 rv = OCSP_sendreq_nbio(&rsp, ctx); 1370 return rsp;
|
H A D | s_client.c | 2126 OCSP_RESPONSE *rsp; local 2134 rsp = d2i_OCSP_RESPONSE(NULL, &p, len); 2135 if (!rsp) 2142 OCSP_RESPONSE_print(arg, rsp, 0); 2144 OCSP_RESPONSE_free(rsp);
|
/external/qemu/android/config/linux-x86/asm/ |
H A D | kvm.h | 87 __u64 rsi, rdi, rsp, rbp; member in struct:kvm_regs
|
/external/qemu/android/config/linux-x86_64/asm/ |
H A D | kvm.h | 87 __u64 rsi, rdi, rsp, rbp; member in struct:kvm_regs
|
/external/qemu/target-i386/ |
H A D | svm.h | 196 uint64_t rsp; member in struct:vmcb_save_area
|
H A D | op_helper.c | 2352 target_ulong rsp; local 2354 rsp = ESP; 2355 PUSHQ(rsp, env->segs[R_CS].selector); 2356 PUSHQ(rsp, next_eip); 2358 ESP = rsp; 4979 stq_phys(env->vm_hsave + offsetof(struct vmcb, save.rsp), ESP); 5036 ESP = ldq_phys(env->vm_vmcb + offsetof(struct vmcb, save.rsp)); 5349 stq_phys(env->vm_vmcb + offsetof(struct vmcb, save.rsp), ESP); 5391 ESP = ldq_phys(env->vm_hsave + offsetof(struct vmcb, save.rsp));
|
/external/valgrind/main/VEX/priv/ |
H A D | host_amd64_isel.c | 304 /* Advance/retreat %rsp by n. */ 672 ldmxcsr 0(%rsp) 673 addq $8, %rsp 686 /* movq $DEFAULT_FPUCW, -8(%rsp) 715 addq $8, %rsp 747 movq %rrm2, -8(%rsp) 3463 AMD64AMode* rsp = AMD64AMode_IR(0, hregAMD64_RSP()); local 3468 addInstr(env, AMD64Instr_SseLdSt(True/*load*/, 16, dst, rsp)); 3686 /* subq $112, %rsp -- make a space*/ 3688 /* leaq 48(%rsp), [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 975 char *rsp) 982 pos = os_strchr(rsp, '-'); 992 wpa_printf(MSG_DEBUG, "CTRL_IFACE: field=%s id=%d", rsp, id); 1003 return wpa_supplicant_ctrl_iface_ctrl_rsp_handle(wpa_s, ssid, rsp, 974 wpa_supplicant_ctrl_iface_ctrl_rsp(struct wpa_supplicant *wpa_s, char *rsp) argument
|
/external/valgrind/main/include/vki/ |
H A D | vki-amd64-linux.h | 209 unsigned long rsp; member in struct:vki_sigcontext 491 unsigned long rsp,ss; member in struct:vki_user_regs_struct
|