Searched refs:stk (Results 1 – 6 of 6) sorted by relevance
/external/qemu/memcheck/ |
D | memcheck_proc_management.c | 638 uint32_t stk; in memcheck_exit() local 639 for (stk = 0; in memcheck_exit() 640 stk < leaked_alloc.call_stack_count && stk < max_stack; in memcheck_exit() 641 stk++) { in memcheck_exit() 644 leaked_alloc.call_stack[stk]); in memcheck_exit() 650 leaked_alloc.call_stack[stk]); in memcheck_exit() 652 stk, leaked_alloc.call_stack[stk], rel, in memcheck_exit() 654 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], in memcheck_exit() 668 stk, leaked_alloc.call_stack[stk]); in memcheck_exit()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | peerkey.c | 440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 675 struct wpa_ptk *stk; in wpa_supplicant_process_stk_1_of_4() local 708 stk = &peerkey->tstk; in wpa_supplicant_process_stk_1_of_4() 712 (u8 *) stk, sizeof(*stk), in wpa_supplicant_process_stk_1_of_4() 715 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 716 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 717 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_stk_1_of_4() 735 stk)) { in wpa_supplicant_process_stk_1_of_4() 878 NULL, 0, &peerkey->stk)) in wpa_supplicant_process_stk_3_of_4() 881 _key = (u8 *) peerkey->stk.tk1; in wpa_supplicant_process_stk_3_of_4() [all …]
|
D | peerkey.h | 39 struct wpa_ptk stk, tstk; member
|
/external/webkit/WebKitTools/android/flex-2.5.4a/ |
D | dfa.c | 253 static int did_stk_init = false, *stk; local 275 stk = reallocate_integer_array( stk, current_max_dfa_size ); \ 282 stk[stkend] = state; \ 305 stk = allocate_integer_array( current_max_dfa_size ); 328 ns = stk[stkpos]; 352 if ( IS_MARKED(stk[stkpos]) ) 353 UNMARK_STATE(stk[stkpos])
|
/external/wpa_supplicant/ |
D | wpa.c | 2500 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 2713 struct wpa_ptk *stk; in wpa_supplicant_process_stk_1_of_4() local 2746 stk = &peerkey->tstk; in wpa_supplicant_process_stk_1_of_4() 2750 (u8 *) stk, sizeof(*stk)); in wpa_supplicant_process_stk_1_of_4() 2752 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 2753 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 2754 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_stk_1_of_4() 2772 stk)) { in wpa_supplicant_process_stk_1_of_4() 2915 NULL, 0, &peerkey->stk)) in wpa_supplicant_process_stk_3_of_4() 2918 _key = (u8 *) peerkey->stk.tk1; in wpa_supplicant_process_stk_3_of_4() [all …]
|
D | wpa_i.h | 67 struct wpa_ptk stk, tstk; member
|