Home
last modified time | relevance | path

Searched refs:stk (Results 1 – 13 of 13) sorted by relevance

/external/qemu/memcheck/
Dmemcheck_proc_management.c633 uint32_t stk; in memcheck_exit() local
634 for (stk = 0; in memcheck_exit()
635 stk < leaked_alloc.call_stack_count && stk < max_stack; in memcheck_exit()
636 stk++) { in memcheck_exit()
639 leaked_alloc.call_stack[stk]); in memcheck_exit()
645 leaked_alloc.call_stack[stk]); in memcheck_exit()
647 stk, leaked_alloc.call_stack[stk], rel, in memcheck_exit()
649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], in memcheck_exit()
663 stk, leaked_alloc.call_stack[stk]); in memcheck_exit()
/external/wpa_supplicant_8/src/rsn_supp/
Dpeerkey.c429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4()
664 struct wpa_ptk *stk; in wpa_supplicant_process_stk_1_of_4() local
697 stk = &peerkey->tstk; in wpa_supplicant_process_stk_1_of_4()
701 (u8 *) stk, sizeof(*stk), in wpa_supplicant_process_stk_1_of_4()
704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4()
705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_stk_1_of_4()
706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_stk_1_of_4()
724 stk)) { in wpa_supplicant_process_stk_1_of_4()
867 NULL, 0, &peerkey->stk)) in wpa_supplicant_process_stk_3_of_4()
870 _key = (u8 *) peerkey->stk.tk1; in wpa_supplicant_process_stk_3_of_4()
[all …]
Dpeerkey.h33 struct wpa_ptk stk, tstk; member
/external/regex-re2/re2/
Dnfa.cc197 AddState* stk = astack_; in AddToThreadq() local
198 stk[nstk++] = AddState(id0); in AddToThreadq()
202 const AddState& a = stk[--nstk]; in AddToThreadq()
242 stk[nstk++] = AddState(ip->out1()); in AddToThreadq()
243 stk[nstk++] = AddState(ip->out()); in AddToThreadq()
248 stk[nstk++] = AddState(ip->out()); in AddToThreadq()
255 stk[nstk++] = AddState(0, capture[j], j); in AddToThreadq()
260 stk[nstk++] = AddState(ip->out()); in AddToThreadq()
278 stk[nstk++] = AddState(ip->out()); in AddToThreadq()
Dregexp.cc408 vector<Regexp*> stk; in Equal() local
424 stk.push_back(a2); in Equal()
425 stk.push_back(b2); in Equal()
448 int n = stk.size(); in Equal()
452 a = stk[n-2]; in Equal()
453 b = stk[n-1]; in Equal()
454 stk.resize(n-2); in Equal()
Ddfa.cc815 int* stk = astack_; in AddToQueue() local
818 stk[nstk++] = id; in AddToQueue()
821 id = stk[--nstk]; in AddToQueue()
853 stk[nstk++] = ip->out(); in AddToQueue()
864 stk[nstk++] = ip->out1(); in AddToQueue()
867 stk[nstk++] = Mark; in AddToQueue()
868 stk[nstk++] = ip->out(); in AddToQueue()
873 stk[nstk++] = ip->out(); in AddToQueue()
Dparse.cc716 Regexp* stk[4]; in RemoveLeadingString() local
719 if (d < arraysize(stk)) in RemoveLeadingString()
720 stk[d++] = re; in RemoveLeadingString()
749 re = stk[d]; in RemoveLeadingString()
/external/valgrind/main/memcheck/tests/
Dsigaltstack.c21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, in main() local
23 sigstk.ss_sp = stk; in main()
/external/webkit/Tools/android/flex-2.5.4a/
Ddfa.c253 static int did_stk_init = false, *stk; local
275 stk = reallocate_integer_array( stk, current_max_dfa_size ); \
282 stk[stkend] = state; \
305 stk = allocate_integer_array( current_max_dfa_size );
328 ns = stk[stkpos];
352 if ( IS_MARKED(stk[stkpos]) )
353 UNMARK_STATE(stk[stkpos])
/external/compiler-rt/lib/tsan/rtl/
Dtsan_rtl.h59 void Init(uptr siz, u32 tid, u32 stk) { in Init()
63 raw[0] |= (u64)stk << (1 + 44); in Init()
64 raw[1] |= (u64)stk >> (64 - 44 - 1); in Init()
67 DCHECK_EQ(StackId(), stk); in Init()
573 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset);
Dtsan_rtl_report.cc372 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset) { in RestoreStack() argument
443 stk->Init(stack.data(), pos); in RestoreStack()
/external/bluetooth/bluedroid/stack/btm/
Dbtm_ble_int.h266 extern void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
270 extern BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk);
Dbtm_ble.c1184 BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) in btm_ble_start_encrypt() argument
1202 if (!btsnd_hcic_ble_start_enc(p_rec->hci_handle, dummy_rand, 0, stk)) in btm_ble_start_encrypt()
1328 void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk) in btm_ble_ltk_request_reply() argument
1347 btsnd_hcic_ble_ltk_req_reply(btm_cb.enc_handle, stk); in btm_ble_ltk_request_reply()