/external/valgrind/main/memcheck/tests/ |
sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local 23 sigstk.ss_sp = stk;
|
/packages/apps/Stk/src/com/android/stk/ |
StkDigitsKeyListener.java | 17 package com.android.stk;
|
StkLauncherActivity.java | 17 package com.android.stk;
|
BootCompletedReceiver.java | 17 package com.android.stk;
|
StkApp.java | 17 package com.android.stk; 24 * Top-level Application class for STK app. 41 public static final String TAG = "STK App";
|
StkAppInstaller.java | 17 package com.android.stk; 48 // check that STK app package is known to the PackageManager 49 ComponentName cName = new ComponentName("com.android.stk", 50 "com.android.stk.StkLauncherActivity"); 58 CatLog.d("StkAppInstaller", "Could not change STK app state");
|
StkCmdReceiver.java | 17 package com.android.stk; 27 * Receiver class to get STK intents, broadcasted by telephony layer. 47 .getParcelableExtra("STK CMD"));
|
StkMenuAdapter.java | 17 package com.android.stk; 32 * Icon list view adapter to show the list of STK items.
|
TonePlayer.java | 17 package com.android.stk; 33 // Map STK tone ids to the system tone ids.
|
ToneDialog.java | 17 package com.android.stk;
|
StkDialogActivity.java | 17 package com.android.stk;
|
StkMenuActivity.java | 17 package com.android.stk; 39 * ListActivity used for displaying STK menus. These can be SET UP MENU and
|
StkInputActivity.java | 17 package com.android.stk;
|
StkAppService.java | 17 package com.android.stk; 55 * application's launch and user input from STK UI elements. 113 private static final String PACKAGE_NAME = "com.android.stk"; 153 Thread serviceThread = new Thread(null, this, "Stk App Service");
|
/external/qemu/memcheck/ |
memcheck_proc_management.c | 633 uint32_t stk; local 634 for (stk = 0; 635 stk < leaked_alloc.call_stack_count && stk < max_stack; 636 stk++) { 639 leaked_alloc.call_stack[stk]); 645 leaked_alloc.call_stack[stk]); 647 stk, leaked_alloc.call_stack[stk], rel, 649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 55 /* TODO: time out SMK and any STK that was generated using this SMK */ 304 * 8.5.1.4 Station to station (STK) key hierarchy 375 "RSN: Failed to get random data for INonce (STK)"); 379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 438 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 660 /* TODO: abort SMK/STK handshake and remove all related keys */ 675 struct wpa_ptk *stk; local 679 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from [all...] |
peerkey.h | 39 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 56 /* TODO: time out SMK and any STK that was generated using this SMK */ 305 * 8.5.1.4 Station to station (STK) key hierarchy 376 "RSN: Failed to get random data for INonce (STK)"); 380 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 384 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 439 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 441 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 663 /* TODO: abort SMK/STK handshake and remove all related keys */ 678 struct wpa_ptk *stk; local 682 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from [all...] |
peerkey.h | 39 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/external/webkit/Tools/android/flex-2.5.4a/ |
dfa.c | 253 static int did_stk_init = false, *stk; local 275 stk = reallocate_integer_array( stk, current_max_dfa_size ); \ 282 stk[stkend] = state; \ 305 stk = allocate_integer_array( current_max_dfa_size ); 328 ns = stk[stkpos]; 352 if ( IS_MARKED(stk[stkpos]) ) 353 UNMARK_STATE(stk[stkpos])
|
/dalvik/tools/dmtracedump/ |
CreateTestTrace.c | 200 dataRecord **stk; local 201 stk = (dataRecord **) malloc(sizeof(dataRecord *) * maxFrames); 202 callStack[threadId].frames = stk;
|
/external/wpa_supplicant/ |
wpa.c | 875 * STK = PRF-X(SMK, "Peer key expansion", 1031 * wpa_sm_stkstart - Send EAPOL-Key Request for STK handshake (STK M1) 1036 * Send an EAPOL-Key Request to the current authenticator to start STK 1059 wpa_printf(MSG_DEBUG, "RSN: Current AP does not support STK"); 2713 struct wpa_ptk *stk; local [all...] |
wpa_i.h | 67 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
/prebuilt/common/ant/ |
ant.jar | |