Searched defs:mk (Results 1 - 25 of 46) sorted by relevance

12

/external/chromium_org/v8/test/mjsunit/regress/
H A Dregress-115100.js31 function mk() { return Object.create(null); } function
33 foo(mk());
34 foo(mk());
36 foo(mk());
H A Dregress-crbug-240032.js31 function mk() { function
34 assertInstanceof(mk(), Function);
35 assertInstanceof(mk(), Function);
39 o.func = mk();
/external/valgrind/main/memcheck/tests/
H A Dleak-tree.c26 Node* mk(void) function
39 // Building like this rather than "t = mk(mk(mk(NULL, NULL), ...)" seems to
41 t = mk(); // A
42 t->l = mk(); // B
43 t->r = mk(); // C (48(16d,32i)/1 definitely leaked from here)
44 t->l->l = mk(); // D (16/1 definitely leaked from here)
45 t->l->r = mk(); // E
46 t->r->l = mk(); //
[all...]
H A Dleak-cycle.c13 struct n *mk(struct n *l, struct n *r) function
26 a = mk(0,0);
27 b = mk(a,0);
28 c = mk(b,0);
H A Dleak-cases.c48 Node* mk(Node* next) function
70 p1 = mk(NULL); // Case 1: 16/1 still reachable
72 p2 = mk(mk(NULL)); // Case 2: 16/1 still reachable
74 (void)mk(NULL); // Case 3: 16/1 definitely lost
76 (void)mk(mk(NULL)); // Case 4: 16/1 indirectly lost (counted again below!)
78 p5 = mk(NULL); // Case 5: 16/1 possibly lost (ok)
81 p6 = mk(mk(NUL
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h58 char *reauth_id, u16 counter, const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
H A Deap_server_pax.c36 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
390 data->rand.e, data->mk, data->ck,
508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h58 char *reauth_id, u16 counter, const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
H A Deap_server_pax.c36 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
390 data->rand.e, data->mk, data->ck,
508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h58 char *reauth_id, u16 counter, const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
H A Deap_server_pax.c36 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
390 data->rand.e, data->mk, data->ck,
508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pax_common.c121 * @mk: Buffer for the derived Master Key
127 u8 *mk, u8 *ck, u8 *ick)
131 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) ||
132 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key",
134 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key",
139 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_gpsk_common.c115 u8 mk[32], *pos, *data; local
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
H A Deap_pwd_common.c292 u8 mk[SHA256_MAC_LEN], *cruft; local
333 eap_pwd_h_final(hash, mk);
335 /* stretch the mk with the session-id to get MSK | EMSK */
336 if (eap_pwd_kdf(mk, SHA256_MAC_LEN,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pax_common.c121 * @mk: Buffer for the derived Master Key
127 u8 *mk, u8 *ck, u8 *ick)
131 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) ||
132 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key",
134 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key",
139 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_gpsk_common.c115 u8 mk[32], *pos, *data; local
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
H A Deap_pwd_common.c292 u8 mk[SHA256_MAC_LEN], *cruft; local
333 eap_pwd_h_final(hash, mk);
335 /* stretch the mk with the session-id to get MSK | EMSK */
336 if (eap_pwd_kdf(mk, SHA256_MAC_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pax_common.c121 * @mk: Buffer for the derived Master Key
127 u8 *mk, u8 *ck, u8 *ick)
131 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) ||
132 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key",
134 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key",
139 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_gpsk_common.c115 u8 mk[32], *pos, *data; local
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
H A Deap_pwd_common.c292 u8 mk[SHA256_MAC_LEN], *cruft; local
333 eap_pwd_h_final(hash, mk);
335 /* stretch the mk with the session-id to get MSK | EMSK */
336 if (eap_pwd_kdf(mk, SHA256_MAC_LEN,
/external/chromium_org/third_party/libjingle/source/talk/media/devices/
H A Dwin32devicemanager.cc189 CComPtr<IMoniker> mk; local
190 while (cam_enum->Next(1, &mk, NULL) == S_OK) {
193 MaybeLogitechDeviceReset(mk);
196 if (SUCCEEDED(mk->BindToStorage(NULL, NULL,
212 mk = NULL;
/external/chromium_org/v8/src/
H A Dfast-dtoa.cc590 int mk; // -k local
598 &ten_mk, &mk);
624 // v == (double) (scaled_w * 10^-mk).
625 // Set decimal_exponent == -mk and pass it to DigitGen. If scaled_w is not an
632 *decimal_exponent = -mk + kappa;
649 int mk; // -k local
657 &ten_mk, &mk);
673 // We now have (double) (scaled_w * 10^-mk).
681 *decimal_exponent = -mk + kappa;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pax.c38 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
474 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
495 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pax.c38 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
474 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
495 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pax.c38 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
474 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
495 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,

Completed in 1751 milliseconds

12