/development/build/tools/ |
sdk_repo.mk | 30 define mk-sdk-repo-pkg-1 51 define mk-sdk-repo-pkg-2 76 define mk-sdk-repo-pkg-3 92 define mk-sdk-repo-sources 111 $(eval $(call mk-sdk-repo-pkg-3,$(HOST_OS),$(MAIN_SDK_ZIP),support,extras/android)) 119 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),tools)) 120 $(eval $(call mk-sdk-repo-pkg-2,$(HOST_OS),$(MAIN_SDK_ZIP),build-tools)) 121 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),platform-tools)) 122 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),docs)) 123 $(eval $(call mk-sdk-repo-pkg-2,$(HOST_OS),$(MAIN_SDK_ZIP),platforms) [all...] |
/external/valgrind/main/memcheck/tests/ |
leak-tree.c | 26 Node* mk(void) function 39 // Building like this rather than "t = mk(mk(mk(NULL, NULL), ...)" seems to 41 t = mk(); // A 42 t->l = mk(); // B 43 t->r = mk(); // C (48(16d,32i)/1 definitely leaked from here) 44 t->l->l = mk(); // D (16/1 definitely leaked from here) 45 t->l->r = mk(); // E 46 t->r->l = mk(); // [all...] |
leak-cycle.c | 13 struct n *mk(struct n *l, struct n *r) function 26 a = mk(0,0); 27 b = mk(a,0); 28 c = mk(b,0);
|
leak-cases.c | 48 Node* mk(Node* next) function 70 p1 = mk(NULL); // Case 1: 16/1 still reachable 72 p2 = mk(mk(NULL)); // Case 2: 16/1 still reachable 74 (void)mk(NULL); // Case 3: 16/1 definitely lost 76 (void)mk(mk(NULL)); // Case 4: 16/1 indirectly lost (counted again below!) 78 p5 = mk(NULL); // Case 5: 16/1 possibly lost (ok) 81 p6 = mk(mk(NULL)); // Case 6: 16/1 still reachabl [all...] |
/sdk/adtproductbuild/ |
Android.mk | 22 include $(BUILD_SYSTEM)/base_rules.mk 97 define mk-adt-ide-2 135 # This is just a convenience wrapper that calls mk-adt-ide-2 and presets 140 define mk-adt-ide 141 $(call mk-adt-ide-2,$(1),$(2), \ 151 $(eval $(call mk-adt-ide,linux.gtk,x86)) 152 $(eval $(call mk-adt-ide,linux.gtk,x86_64)) 153 $(eval $(call mk-adt-ide,macosx.cocoa,x86_64)) 154 $(eval $(call mk-adt-ide,win32.win32,x86)) 155 $(eval $(call mk-adt-ide,win32.win32,x86_64) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyTest.java | 48 checkKey mk = new checkKey(); local 49 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyTest.java | 39 checkKey mk = new checkKey(); local 40 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
|
/sdk/monitor/ |
Android.mk | 13 include $(BUILD_SYSTEM)/base_rules.mk 18 define mk-rcp-monitor-atree-file 29 # The RCP monitor. It is referenced by build/target/products/sdk.mk 52 $(call mk-rcp-monitor-atree-file,linux.gtk,x86) ; \ 53 $(call mk-rcp-monitor-atree-file,linux.gtk,x86_64) ; \ 55 $(call mk-rcp-monitor-atree-file,macosx.cocoa,x86_64) ; \ 57 $(call mk-rcp-monitor-atree-file,win32.win32,x86) ; \ 58 $(call mk-rcp-monitor-atree-file,win32.win32,x86_64) ; \
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 58 char *reauth_id, u16 counter, const u8 *mk); 72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
|
eap_server_pax.c | 36 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 385 data->rand.e, data->mk, data->ck, 503 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 524 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
eap_server_sim.c | 19 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 263 sm->identity_len, data->nonce_s, data->mk, 473 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); 544 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation", 551 data->num_chal, (const u8 *) data->kc, data->mk); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 597 data->mk); 665 data->counter + 1, data->mk); [all...] |
eap_server_aka.c | 21 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 123 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); 560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 564 data->mk, data->msk, data->emsk); 832 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation", 841 data->ck, data->mk); 842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 1007 data->mk); 1121 data->mk); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 115 u8 mk[32], *pos, *data; local 153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString) 203 * MSK = GKDF-160 (MK, inputString)[0..63] 204 * EMSK = GKDF-160 (MK, inputString)[64..127] 205 * SK = GKDF-160 (MK, inputString)[128..143 [all...] |
eap_pwd_common.c | 290 u8 mk[SHA256_MAC_LEN], *cruft; local 319 /* then compute MK = H(k | confirm-peer | confirm-server) */ 332 eap_pwd_h_final(hash, mk); 334 /* stretch the mk with the session-id to get MSK | EMSK */ 335 if (eap_pwd_kdf(mk, SHA256_MAC_LEN,
|
/packages/apps/Email/src/org/apache/james/mime4j/field/address/parser/ |
JJTAddressListParserState.java | 10 private int mk; // current mark field in class:JJTAddressListParserState 17 mk = 0; 33 mk = 0; 51 if (--sp < mk) { 52 mk = marks.pop().intValue(); 65 return sp - mk; 70 while (sp > mk) { 73 mk = marks.pop().intValue(); 78 marks.push(new Integer(mk)); 79 mk = sp [all...] |
/external/v8/src/ |
fast-dtoa.cc | 613 int mk; // -k local 621 &ten_mk, &mk); 647 // v == (double) (scaled_w * 10^-mk). 648 // Set decimal_exponent == -mk and pass it to DigitGen. If scaled_w is not an 655 *decimal_exponent = -mk + kappa; 672 int mk; // -k local 680 &ten_mk, &mk); 696 // We now have (double) (scaled_w * 10^-mk). 704 *decimal_exponent = -mk + kappa;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 38 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 474 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 495 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
eap_sim.c | 29 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 665 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK " 670 (const u8 *) data->kc, data->mk); 671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 874 * used in MK derivation. */ 891 data->nonce_s, data->mk, data->msk,
|
eap_aka.c | 26 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 893 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK " 901 data->mk); 902 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 1114 * used in MK derivation. */ 1141 data->nonce_s, data->mk, [all...] |
/external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/ |
MessageFormatTest.java | 74 Locale mk = new Locale("mk", "MK"); local 77 mk); 79 assertTrue("Wrong locale1", format.getLocale().equals(mk)); 81 .getDateInstance(DateFormat.DEFAULT, mk))); 83 .getCurrencyInstance(mk))); 85 .getIntegerInstance(mk))); [all...] |
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
devicemanager.cc | 406 CComPtr<IMoniker> mk; local 407 while (cam_enum->Next(1, &mk, NULL) == S_OK) { 409 if (SUCCEEDED(mk->BindToStorage(NULL, NULL, 427 mk = NULL;
|