HomeSort by relevance Sort by last modified time
    Searched defs:mk (Results 1 - 21 of 21) sorted by null

  /development/build/tools/
sdk_repo.mk 30 define mk-sdk-repo-pkg-1
51 define mk-sdk-repo-pkg-2
76 define mk-sdk-repo-pkg-3
92 define mk-sdk-repo-sources
111 $(eval $(call mk-sdk-repo-pkg-3,$(HOST_OS),$(MAIN_SDK_ZIP),support,extras/android))
119 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),tools))
120 $(eval $(call mk-sdk-repo-pkg-2,$(HOST_OS),$(MAIN_SDK_ZIP),build-tools))
121 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),platform-tools))
122 $(eval $(call mk-sdk-repo-pkg-1,$(HOST_OS),$(MAIN_SDK_ZIP),docs))
123 $(eval $(call mk-sdk-repo-pkg-2,$(HOST_OS),$(MAIN_SDK_ZIP),platforms)
    [all...]
  /external/valgrind/main/memcheck/tests/
leak-tree.c 26 Node* mk(void) function
39 // Building like this rather than "t = mk(mk(mk(NULL, NULL), ...)" seems to
41 t = mk(); // A
42 t->l = mk(); // B
43 t->r = mk(); // C (48(16d,32i)/1 definitely leaked from here)
44 t->l->l = mk(); // D (16/1 definitely leaked from here)
45 t->l->r = mk(); // E
46 t->r->l = mk(); //
    [all...]
leak-cycle.c 13 struct n *mk(struct n *l, struct n *r) function
26 a = mk(0,0);
27 b = mk(a,0);
28 c = mk(b,0);
leak-cases.c 48 Node* mk(Node* next) function
70 p1 = mk(NULL); // Case 1: 16/1 still reachable
72 p2 = mk(mk(NULL)); // Case 2: 16/1 still reachable
74 (void)mk(NULL); // Case 3: 16/1 definitely lost
76 (void)mk(mk(NULL)); // Case 4: 16/1 indirectly lost (counted again below!)
78 p5 = mk(NULL); // Case 5: 16/1 possibly lost (ok)
81 p6 = mk(mk(NULL)); // Case 6: 16/1 still reachabl
    [all...]
  /sdk/adtproductbuild/
Android.mk 22 include $(BUILD_SYSTEM)/base_rules.mk
97 define mk-adt-ide-2
135 # This is just a convenience wrapper that calls mk-adt-ide-2 and presets
140 define mk-adt-ide
141 $(call mk-adt-ide-2,$(1),$(2), \
151 $(eval $(call mk-adt-ide,linux.gtk,x86))
152 $(eval $(call mk-adt-ide,linux.gtk,x86_64))
153 $(eval $(call mk-adt-ide,macosx.cocoa,x86_64))
154 $(eval $(call mk-adt-ide,win32.win32,x86))
155 $(eval $(call mk-adt-ide,win32.win32,x86_64)
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyTest.java 48 checkKey mk = new checkKey(); local
49 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyTest.java 39 checkKey mk = new checkKey(); local
40 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
  /sdk/monitor/
Android.mk 13 include $(BUILD_SYSTEM)/base_rules.mk
18 define mk-rcp-monitor-atree-file
29 # The RCP monitor. It is referenced by build/target/products/sdk.mk
52 $(call mk-rcp-monitor-atree-file,linux.gtk,x86) ; \
53 $(call mk-rcp-monitor-atree-file,linux.gtk,x86_64) ; \
55 $(call mk-rcp-monitor-atree-file,macosx.cocoa,x86_64) ; \
57 $(call mk-rcp-monitor-atree-file,win32.win32,x86) ; \
58 $(call mk-rcp-monitor-atree-file,win32.win32,x86_64) ; \
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.h 58 char *reauth_id, u16 counter, const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
eap_server_pax.c 36 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
385 data->rand.e, data->mk, data->ck,
503 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
524 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
eap_server_sim.c 19 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
263 sm->identity_len, data->nonce_s, data->mk,
473 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN);
544 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation",
551 data->num_chal, (const u8 *) data->kc, data->mk);
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
597 data->mk);
665 data->counter + 1, data->mk);
    [all...]
eap_server_aka.c 21 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
123 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN);
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
564 data->mk, data->msk, data->emsk);
832 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation",
841 data->ck, data->mk);
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
1007 data->mk);
1121 data->mk);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 115 u8 mk[32], *pos, *data; local
153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString)
203 * MSK = GKDF-160 (MK, inputString)[0..63]
204 * EMSK = GKDF-160 (MK, inputString)[64..127]
205 * SK = GKDF-160 (MK, inputString)[128..143
    [all...]
eap_pwd_common.c 290 u8 mk[SHA256_MAC_LEN], *cruft; local
319 /* then compute MK = H(k | confirm-peer | confirm-server) */
332 eap_pwd_h_final(hash, mk);
334 /* stretch the mk with the session-id to get MSK | EMSK */
335 if (eap_pwd_kdf(mk, SHA256_MAC_LEN,
  /packages/apps/Email/src/org/apache/james/mime4j/field/address/parser/
JJTAddressListParserState.java 10 private int mk; // current mark field in class:JJTAddressListParserState
17 mk = 0;
33 mk = 0;
51 if (--sp < mk) {
52 mk = marks.pop().intValue();
65 return sp - mk;
70 while (sp > mk) {
73 mk = marks.pop().intValue();
78 marks.push(new Integer(mk));
79 mk = sp
    [all...]
  /external/v8/src/
fast-dtoa.cc 613 int mk; // -k local
621 &ten_mk, &mk);
647 // v == (double) (scaled_w * 10^-mk).
648 // Set decimal_exponent == -mk and pass it to DigitGen. If scaled_w is not an
655 *decimal_exponent = -mk + kappa;
672 int mk; // -k local
680 &ten_mk, &mk);
696 // We now have (double) (scaled_w * 10^-mk).
704 *decimal_exponent = -mk + kappa;
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 38 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
474 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
495 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
eap_sim.c 29 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
665 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK "
670 (const u8 *) data->kc, data->mk);
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
874 * used in MK derivation. */
891 data->nonce_s, data->mk, data->msk,
eap_aka.c 26 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
893 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK "
901 data->mk);
902 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
1114 * used in MK derivation. */
1141 data->nonce_s, data->mk,
    [all...]
  /external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/
MessageFormatTest.java 74 Locale mk = new Locale("mk", "MK"); local
77 mk);
79 assertTrue("Wrong locale1", format.getLocale().equals(mk));
81 .getDateInstance(DateFormat.DEFAULT, mk)));
83 .getCurrencyInstance(mk)));
85 .getIntegerInstance(mk)));
    [all...]
  /external/chromium/third_party/libjingle/source/talk/session/phone/
devicemanager.cc 406 CComPtr<IMoniker> mk; local
407 while (cam_enum->Next(1, &mk, NULL) == S_OK) {
409 if (SUCCEEDED(mk->BindToStorage(NULL, NULL,
427 mk = NULL;

Completed in 1526 milliseconds