Searched refs:stk (Results 1 - 22 of 22) sorted by relevance

/external/valgrind/main/memcheck/tests/
H A Dsigaltstack.c21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local
23 sigstk.ss_sp = stk;
/external/qemu/memcheck/
H A Dmemcheck_proc_management.c633 uint32_t stk; local
634 for (stk = 0;
635 stk < leaked_alloc.call_stack_count && stk < max_stack;
636 stk++) {
639 leaked_alloc.call_stack[stk]);
645 leaked_alloc.call_stack[stk]);
647 stk, leaked_alloc.call_stack[stk], rel,
649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk],
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
664 struct wpa_ptk *stk; local
697 stk = &peerkey->tstk;
701 (u8 *) stk, sizeof(*stk),
704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
724 stk)) {
[all...]
H A Dpeerkey.h33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
664 struct wpa_ptk *stk; local
697 stk = &peerkey->tstk;
701 (u8 *) stk, sizeof(*stk),
704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
724 stk)) {
[all...]
H A Dpeerkey.h33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
664 struct wpa_ptk *stk; local
697 stk = &peerkey->tstk;
701 (u8 *) stk, sizeof(*stk),
704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
724 stk)) {
[all...]
H A Dpeerkey.h33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
/external/chromium_org/third_party/re2/re2/
H A Dnfa.cc194 // pushing at most two entries on stk.
197 AddState* stk = astack_; local
198 stk[nstk++] = AddState(id0);
202 const AddState& a = stk[--nstk];
242 stk[nstk++] = AddState(ip->out1());
243 stk[nstk++] = AddState(ip->out());
248 stk[nstk++] = AddState(ip->out());
255 stk[nstk++] = AddState(0, capture[j], j);
260 stk[nstk++] = AddState(ip->out());
278 stk[nst
[all...]
H A Dregexp.cc408 vector<Regexp*> stk; local
424 stk.push_back(a2);
425 stk.push_back(b2);
439 // stk.push_back(a2);
440 // stk.push_back(b2);
448 int n = stk.size();
452 a = stk[n-2];
453 b = stk[n-1];
454 stk.resize(n-2);
H A Ddfa.cc817 int* stk = astack_; local
820 stk[nstk++] = id;
823 id = stk[--nstk];
855 stk[nstk++] = ip->out();
866 stk[nstk++] = ip->out1();
869 stk[nstk++] = Mark;
870 stk[nstk++] = ip->out();
875 stk[nstk++] = ip->out();
H A Dparse.cc716 Regexp* stk[4]; local
719 if (d < arraysize(stk))
720 stk[d++] = re;
749 re = stk[d];
/external/regex-re2/re2/
H A Dnfa.cc194 // pushing at most two entries on stk.
197 AddState* stk = astack_; local
198 stk[nstk++] = AddState(id0);
202 const AddState& a = stk[--nstk];
242 stk[nstk++] = AddState(ip->out1());
243 stk[nstk++] = AddState(ip->out());
248 stk[nstk++] = AddState(ip->out());
255 stk[nstk++] = AddState(0, capture[j], j);
260 stk[nstk++] = AddState(ip->out());
278 stk[nst
[all...]
H A Dregexp.cc408 vector<Regexp*> stk; local
424 stk.push_back(a2);
425 stk.push_back(b2);
439 // stk.push_back(a2);
440 // stk.push_back(b2);
448 int n = stk.size();
452 a = stk[n-2];
453 b = stk[n-1];
454 stk.resize(n-2);
H A Ddfa.cc815 int* stk = astack_; local
818 stk[nstk++] = id;
821 id = stk[--nstk];
853 stk[nstk++] = ip->out();
864 stk[nstk++] = ip->out1();
867 stk[nstk++] = Mark;
868 stk[nstk++] = ip->out();
873 stk[nstk++] = ip->out();
H A Dparse.cc716 Regexp* stk[4]; local
719 if (d < arraysize(stk))
720 stk[d++] = re;
749 re = stk[d];
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_ble_int.h276 extern void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
280 extern BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
H A Dbtm_ble.c1256 BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) argument
1273 if (btsnd_hcic_ble_start_enc(p_rec->hci_handle, dummy_rand, 0, stk))
1404 void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) argument
1423 btsnd_hcic_ble_ltk_req_reply(btm_cb.enc_handle, stk);
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_rtl.h55 u64 stk : 31; // on word boundary
61 void Init(uptr siz, u32 tid, u32 stk) { argument
65 raw[0] |= (u64)stk << (1 + 44);
66 raw[1] |= (u64)stk >> (64 - 44 - 1);
69 DCHECK_EQ(StackId(), stk); local
583 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset);
H A Dtsan_rtl_report.cc388 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset) { argument
452 stk->Init(stack.data(), pos);
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/re2c/
H A Dcode.c637 State **top, **stk; member in struct:SCC
649 s->top = s->stk = malloc(sizeof(State*)*size);
655 s->top = s->stk = malloc(sizeof(State*)*size);
661 free(s->stk);
666 free(s->stk);
674 k = ++s->top - s->stk;
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
H A Dant.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ...

Completed in 267 milliseconds