HomeSort by relevance Sort by last modified time
    Searched refs:stk (Results 1 - 24 of 24) sorted by null

  /external/valgrind/main/memcheck/tests/
sigaltstack.c 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local
23 sigstk.ss_sp = stk;
  /packages/apps/Stk/src/com/android/stk/
StkDigitsKeyListener.java 17 package com.android.stk;
StkLauncherActivity.java 17 package com.android.stk;
BootCompletedReceiver.java 17 package com.android.stk;
StkApp.java 17 package com.android.stk;
24 * Top-level Application class for STK app.
41 public static final String TAG = "STK App";
StkAppInstaller.java 17 package com.android.stk;
48 // check that STK app package is known to the PackageManager
49 ComponentName cName = new ComponentName("com.android.stk",
50 "com.android.stk.StkLauncherActivity");
58 CatLog.d("StkAppInstaller", "Could not change STK app state");
StkCmdReceiver.java 17 package com.android.stk;
27 * Receiver class to get STK intents, broadcasted by telephony layer.
47 .getParcelableExtra("STK CMD"));
StkMenuAdapter.java 17 package com.android.stk;
32 * Icon list view adapter to show the list of STK items.
TonePlayer.java 17 package com.android.stk;
33 // Map STK tone ids to the system tone ids.
ToneDialog.java 17 package com.android.stk;
StkDialogActivity.java 17 package com.android.stk;
StkMenuActivity.java 17 package com.android.stk;
39 * ListActivity used for displaying STK menus. These can be SET UP MENU and
StkInputActivity.java 17 package com.android.stk;
StkAppService.java 17 package com.android.stk;
55 * application's launch and user input from STK UI elements.
113 private static final String PACKAGE_NAME = "com.android.stk";
153 Thread serviceThread = new Thread(null, this, "Stk App Service");
  /external/qemu/memcheck/
memcheck_proc_management.c 633 uint32_t stk; local
634 for (stk = 0;
635 stk < leaked_alloc.call_stack_count && stk < max_stack;
636 stk++) {
639 leaked_alloc.call_stack[stk]);
645 leaked_alloc.call_stack[stk]);
647 stk, leaked_alloc.call_stack[stk], rel,
649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk],
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 55 /* TODO: time out SMK and any STK that was generated using this SMK */
304 * 8.5.1.4 Station to station (STK) key hierarchy
375 "RSN: Failed to get random data for INonce (STK)");
379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
438 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
660 /* TODO: abort SMK/STK handshake and remove all related keys */
675 struct wpa_ptk *stk; local
679 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from
    [all...]
peerkey.h 39 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 56 /* TODO: time out SMK and any STK that was generated using this SMK */
305 * 8.5.1.4 Station to station (STK) key hierarchy
376 "RSN: Failed to get random data for INonce (STK)");
380 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
384 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
439 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
441 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
663 /* TODO: abort SMK/STK handshake and remove all related keys */
678 struct wpa_ptk *stk; local
682 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from
    [all...]
peerkey.h 39 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
  /external/webkit/Tools/android/flex-2.5.4a/
dfa.c 253 static int did_stk_init = false, *stk; local
275 stk = reallocate_integer_array( stk, current_max_dfa_size ); \
282 stk[stkend] = state; \
305 stk = allocate_integer_array( current_max_dfa_size );
328 ns = stk[stkpos];
352 if ( IS_MARKED(stk[stkpos]) )
353 UNMARK_STATE(stk[stkpos])
  /dalvik/tools/dmtracedump/
CreateTestTrace.c 200 dataRecord **stk; local
201 stk = (dataRecord **) malloc(sizeof(dataRecord *) * maxFrames);
202 callStack[threadId].frames = stk;
  /external/wpa_supplicant/
wpa.c 875 * STK = PRF-X(SMK, "Peer key expansion",
1031 * wpa_sm_stkstart - Send EAPOL-Key Request for STK handshake (STK M1)
1036 * Send an EAPOL-Key Request to the current authenticator to start STK
1059 wpa_printf(MSG_DEBUG, "RSN: Current AP does not support STK");
2713 struct wpa_ptk *stk; local
    [all...]
wpa_i.h 67 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
  /prebuilt/common/ant/
ant.jar 

Completed in 337 milliseconds