/external/valgrind/main/memcheck/tests/ |
H A D | sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local 23 sigstk.ss_sp = stk;
|
/external/qemu/memcheck/ |
H A D | memcheck_proc_management.c | 633 uint32_t stk; local 634 for (stk = 0; 635 stk < leaked_alloc.call_stack_count && stk < max_stack; 636 stk++) { 639 leaked_alloc.call_stack[stk]); 645 leaked_alloc.call_stack[stk]); 647 stk, leaked_alloc.call_stack[stk], rel, 649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 664 struct wpa_ptk *stk; local 697 stk = &peerkey->tstk; 701 (u8 *) stk, sizeof(*stk), 704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 724 stk)) { [all...] |
H A D | peerkey.h | 33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 664 struct wpa_ptk *stk; local 697 stk = &peerkey->tstk; 701 (u8 *) stk, sizeof(*stk), 704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 724 stk)) { [all...] |
H A D | peerkey.h | 33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 664 struct wpa_ptk *stk; local 697 stk = &peerkey->tstk; 701 (u8 *) stk, sizeof(*stk), 704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 724 stk)) { [all...] |
H A D | peerkey.h | 33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/external/chromium_org/third_party/re2/re2/ |
H A D | nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nst [all...] |
H A D | regexp.cc | 408 vector<Regexp*> stk; local 424 stk.push_back(a2); 425 stk.push_back(b2); 439 // stk.push_back(a2); 440 // stk.push_back(b2); 448 int n = stk.size(); 452 a = stk[n-2]; 453 b = stk[n-1]; 454 stk.resize(n-2);
|
H A D | dfa.cc | 817 int* stk = astack_; local 820 stk[nstk++] = id; 823 id = stk[--nstk]; 855 stk[nstk++] = ip->out(); 866 stk[nstk++] = ip->out1(); 869 stk[nstk++] = Mark; 870 stk[nstk++] = ip->out(); 875 stk[nstk++] = ip->out();
|
H A D | parse.cc | 716 Regexp* stk[4]; local 719 if (d < arraysize(stk)) 720 stk[d++] = re; 749 re = stk[d];
|
/external/regex-re2/re2/ |
H A D | nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nst [all...] |
H A D | regexp.cc | 408 vector<Regexp*> stk; local 424 stk.push_back(a2); 425 stk.push_back(b2); 439 // stk.push_back(a2); 440 // stk.push_back(b2); 448 int n = stk.size(); 452 a = stk[n-2]; 453 b = stk[n-1]; 454 stk.resize(n-2);
|
H A D | dfa.cc | 815 int* stk = astack_; local 818 stk[nstk++] = id; 821 id = stk[--nstk]; 853 stk[nstk++] = ip->out(); 864 stk[nstk++] = ip->out1(); 867 stk[nstk++] = Mark; 868 stk[nstk++] = ip->out(); 873 stk[nstk++] = ip->out();
|
H A D | parse.cc | 716 Regexp* stk[4]; local 719 if (d < arraysize(stk)) 720 stk[d++] = re; 749 re = stk[d];
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble_int.h | 276 extern void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk); 280 extern BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
|
H A D | btm_ble.c | 1256 BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) argument 1273 if (btsnd_hcic_ble_start_enc(p_rec->hci_handle, dummy_rand, 0, stk)) 1404 void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) argument 1423 btsnd_hcic_ble_ltk_req_reply(btm_cb.enc_handle, stk);
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_rtl.h | 55 u64 stk : 31; // on word boundary 61 void Init(uptr siz, u32 tid, u32 stk) { argument 65 raw[0] |= (u64)stk << (1 + 44); 66 raw[1] |= (u64)stk >> (64 - 44 - 1); 69 DCHECK_EQ(StackId(), stk); local 583 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset);
|
H A D | tsan_rtl_report.cc | 388 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset) { argument 452 stk->Init(stack.data(), pos);
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/re2c/ |
H A D | code.c | 637 State **top, **stk; member in struct:SCC 649 s->top = s->stk = malloc(sizeof(State*)*size); 655 s->top = s->stk = malloc(sizeof(State*)*size); 661 free(s->stk); 666 free(s->stk); 674 k = ++s->top - s->stk;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |