/external/valgrind/main/memcheck/tests/ |
sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local 23 sigstk.ss_sp = stk;
|
/packages/apps/Stk/src/com/android/stk/ |
StkDigitsKeyListener.java | 17 package com.android.stk;
|
StkLauncherActivity.java | 17 package com.android.stk;
|
StkMenuAdapter.java | 17 package com.android.stk; 32 * Icon list view adapter to show the list of STK items.
|
BootCompletedReceiver.java | 17 package com.android.stk;
|
StkApp.java | 17 package com.android.stk; 24 * Top-level Application class for STK app. 45 public static final String TAG = "STK App";
|
StkAppInstaller.java | 17 package com.android.stk; 48 // check that STK app package is known to the PackageManager 49 ComponentName cName = new ComponentName("com.android.stk", 50 "com.android.stk.StkLauncherActivity"); 58 CatLog.d("StkAppInstaller", "Could not change STK app state");
|
StkCmdReceiver.java | 17 package com.android.stk; 27 * Receiver class to get STK intents, broadcasted by telephony layer. 47 .getParcelableExtra("STK CMD"));
|
TonePlayer.java | 17 package com.android.stk; 33 // Map STK tone ids to the system tone ids.
|
ToneDialog.java | 17 package com.android.stk;
|
StkDialogActivity.java | 17 package com.android.stk;
|
StkMenuActivity.java | 17 package com.android.stk; 39 * ListActivity used for displaying STK menus. These can be SET UP MENU and
|
StkInputActivity.java | 17 package com.android.stk;
|
StkAppService.java | 17 package com.android.stk; 61 * application's launch and user input from STK UI elements. 124 private static final String PACKAGE_NAME = "com.android.stk"; 150 Thread serviceThread = new Thread(null, this, "Stk App Service"); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 33 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
peerkey.c | 50 /* TODO: time out SMK and any STK that was generated using this SMK */ 293 * 8.5.1.4 Station to station (STK) key hierarchy 364 "RSN: Failed to get random data for INonce (STK)"); 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 649 /* TODO: abort SMK/STK handshake and remove all related keys */ 664 struct wpa_ptk *stk; local 668 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from [all...] |
/external/chromium_org/third_party/re2/re2/ |
nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nstk++] = AddState(ip->out()) [all...] |
regexp.cc | 408 vector<Regexp*> stk; local 424 stk.push_back(a2); 425 stk.push_back(b2); 439 // stk.push_back(a2); 440 // stk.push_back(b2); 448 int n = stk.size(); 452 a = stk[n-2]; 453 b = stk[n-1]; 454 stk.resize(n-2);
|
parse.cc | 716 Regexp* stk[4]; local 719 if (d < arraysize(stk)) 720 stk[d++] = re; 749 re = stk[d]; [all...] |
/external/qemu/memcheck/ |
memcheck_proc_management.c | 633 uint32_t stk; local 634 for (stk = 0; 635 stk < leaked_alloc.call_stack_count && stk < max_stack; 636 stk++) { 639 leaked_alloc.call_stack[stk]); 645 leaked_alloc.call_stack[stk]); 647 stk, leaked_alloc.call_stack[stk], rel, 649 if (memcheck_get_address_info(leaked_alloc.call_stack[stk], [all...] |
/external/regex-re2/re2/ |
nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nstk++] = AddState(ip->out()) [all...] |
regexp.cc | 408 vector<Regexp*> stk; local 424 stk.push_back(a2); 425 stk.push_back(b2); 439 // stk.push_back(a2); 440 // stk.push_back(b2); 448 int n = stk.size(); 452 a = stk[n-2]; 453 b = stk[n-1]; 454 stk.resize(n-2);
|
parse.cc | 716 Regexp* stk[4]; local 719 if (d < arraysize(stk)) 720 stk[d++] = re; 749 re = stk[d]; [all...] |
/dalvik/tools/dmtracedump/ |
CreateTestTrace.c | 200 dataRecord **stk; local 201 stk = (dataRecord **) malloc(sizeof(dataRecord *) * maxFrames); 202 callStack[threadId].frames = stk;
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/re2c/ |
code.c | 637 State **top, **stk; member in struct:SCC 649 s->top = s->stk = malloc(sizeof(State*)*size); 655 s->top = s->stk = malloc(sizeof(State*)*size); 661 free(s->stk); 666 free(s->stk); 674 k = ++s->top - s->stk;
|