/external/qemu/memcheck/ |
D | memcheck_proc_management.c | 633 uint32_t stk; in memcheck_exit() local 634 for (stk = 0; in memcheck_exit() 635 stk < leaked_alloc.call_stack_count && stk < max_stack; in memcheck_exit() 636 stk++) { in memcheck_exit() 639 leaked_alloc.call_stack[stk]); in memcheck_exit() 645 leaked_alloc.call_stack[stk]); in memcheck_exit() 647 stk, leaked_alloc.call_stack[stk], rel, in memcheck_exit() 649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], in memcheck_exit() 663 stk, leaked_alloc.call_stack[stk]); in memcheck_exit()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | peerkey.c | 440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 675 struct wpa_ptk *stk; in wpa_supplicant_process_stk_1_of_4() local 708 stk = &peerkey->tstk; in wpa_supplicant_process_stk_1_of_4() 712 (u8 *) stk, sizeof(*stk), in wpa_supplicant_process_stk_1_of_4() 715 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 716 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 717 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_stk_1_of_4() 735 stk)) { in wpa_supplicant_process_stk_1_of_4() 878 NULL, 0, &peerkey->stk)) in wpa_supplicant_process_stk_3_of_4() 881 _key = (u8 *) peerkey->stk.tk1; in wpa_supplicant_process_stk_3_of_4() [all …]
|
D | peerkey.h | 39 struct wpa_ptk stk, tstk; member
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 435 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 675 struct wpa_ptk *stk; in wpa_supplicant_process_stk_1_of_4() local 708 stk = &peerkey->tstk; in wpa_supplicant_process_stk_1_of_4() 712 (u8 *) stk, sizeof(*stk), in wpa_supplicant_process_stk_1_of_4() 715 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 716 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4() 717 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_stk_1_of_4() 735 stk)) { in wpa_supplicant_process_stk_1_of_4() 878 NULL, 0, &peerkey->stk)) in wpa_supplicant_process_stk_3_of_4() 881 _key = (u8 *) peerkey->stk.tk1; in wpa_supplicant_process_stk_3_of_4() [all …]
|
D | peerkey.h | 33 struct wpa_ptk stk, tstk; member
|
/external/regex-re2/re2/ |
D | nfa.cc | 197 AddState* stk = astack_; in AddToThreadq() local 198 stk[nstk++] = AddState(id0); in AddToThreadq() 202 const AddState& a = stk[--nstk]; in AddToThreadq() 242 stk[nstk++] = AddState(ip->out1()); in AddToThreadq() 243 stk[nstk++] = AddState(ip->out()); in AddToThreadq() 248 stk[nstk++] = AddState(ip->out()); in AddToThreadq() 255 stk[nstk++] = AddState(0, capture[j], j); in AddToThreadq() 260 stk[nstk++] = AddState(ip->out()); in AddToThreadq() 278 stk[nstk++] = AddState(ip->out()); in AddToThreadq()
|
D | regexp.cc | 397 vector<Regexp*> stk; in Equal() local 413 stk.push_back(a2); in Equal() 414 stk.push_back(b2); in Equal() 437 int n = stk.size(); in Equal() 441 a = stk[n-2]; in Equal() 442 b = stk[n-1]; in Equal() 443 stk.resize(n-2); in Equal()
|
D | dfa.cc | 788 int* stk = astack_; in AddToQueue() local 791 stk[nstk++] = id; in AddToQueue() 794 id = stk[--nstk]; in AddToQueue() 826 stk[nstk++] = ip->out(); in AddToQueue() 837 stk[nstk++] = ip->out1(); in AddToQueue() 840 stk[nstk++] = Mark; in AddToQueue() 841 stk[nstk++] = ip->out(); in AddToQueue() 846 stk[nstk++] = ip->out(); in AddToQueue()
|
D | parse.cc | 717 Regexp* stk[4]; in RemoveLeadingString() local 720 if (d < arraysize(stk)) in RemoveLeadingString() 721 stk[d++] = re; in RemoveLeadingString() 750 re = stk[d]; in RemoveLeadingString()
|
/external/valgrind/main/memcheck/tests/ |
D | sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, in main() local 23 sigstk.ss_sp = stk; in main()
|
/external/webkit/Tools/android/flex-2.5.4a/ |
D | dfa.c | 253 static int did_stk_init = false, *stk; local 275 stk = reallocate_integer_array( stk, current_max_dfa_size ); \ 282 stk[stkend] = state; \ 305 stk = allocate_integer_array( current_max_dfa_size ); 328 ns = stk[stkpos]; 352 if ( IS_MARKED(stk[stkpos]) ) 353 UNMARK_STATE(stk[stkpos])
|
/external/bluetooth/bluedroid/stack/btm/ |
D | btm_ble_int.h | 240 extern void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk); 244 extern BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
|
D | btm_ble.c | 1084 BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) in btm_ble_start_encrypt() argument 1102 if (!btsnd_hcic_ble_start_enc(p_rec->hci_handle, dummy_rand, 0, stk)) in btm_ble_start_encrypt() 1217 void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) in btm_ble_ltk_request_reply() argument 1236 btsnd_hcic_ble_ltk_req_reply(btm_cb.enc_handle, stk); in btm_ble_ltk_request_reply()
|
/external/compiler-rt/lib/tsan/rtl/ |
D | tsan_rtl_report.cc | 251 void RestoreStack(int tid, const u64 epoch, StackTrace *stk) { in RestoreStack() argument 301 stk->Init(stack.data(), pos); in RestoreStack()
|
D | tsan_rtl.h | 425 void RestoreStack(int tid, const u64 epoch, StackTrace *stk);
|