/external/valgrind/main/memcheck/tests/ |
sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local 23 sigstk.ss_sp = stk;
|
/packages/apps/Stk/src/com/android/stk/ |
StkDigitsKeyListener.java | 17 package com.android.stk;
|
StkMenuAdapter.java | 17 package com.android.stk; 32 * Icon list view adapter to show the list of STK items.
|
BootCompletedReceiver.java | 17 package com.android.stk;
|
StkApp.java | 17 package com.android.stk; 24 * Top-level Application class for STK app. 45 public static final String TAG = "STK App";
|
StkAppInstaller.java | 17 package com.android.stk; 34 private static final String STK_MAIN_ACTIVITY = "com.android.stk.StkMain"; 60 ComponentName cName = new ComponentName("com.android.stk", STK_MAIN_ACTIVITY); 76 CatLog.d(LOG_TAG, "Could not change STK app state");
|
TonePlayer.java | 17 package com.android.stk; 33 // Map STK tone ids to the system tone ids.
|
StkCmdReceiver.java | 17 package com.android.stk; 30 * Receiver class to get STK intents, broadcasted by telephony layer.
|
StkMain.java | 17 package com.android.stk; 44 private static final String PACKAGE_NAME = "com.android.stk"; 60 //launch stk menu activity for the SIM. 90 CatLog.d(LOG_TAG, "do not show stk list menu.");
|
StkLauncherActivity.java | 17 package com.android.stk; 92 CatLog.d(LOG_TAG, "launch stk menu id: " + item.id); 128 CatLog.d(LOG_TAG, "resume to show multiple stk list."); 192 CatLog.d(LOG_TAG, "No stk menu item add.");
|
ToneDialog.java | 17 package com.android.stk;
|
/external/chromium_org/net/quic/ |
quic_crypto_client_stream_test.cc | 151 // Ensure cached STK is different to what we send in the handshake. 156 unsigned char stk[] = { 'x', 's', 't', 'k' }; local 177 server_config_update.SetValue(kSourceAddressTokenTag, stk); 184 // Make sure that the STK and SCFG are cached correctly.
|
/external/libunwind/tests/ |
Gtest-bt.c | 212 stack_t stk; local 233 stk.ss_sp = malloc (SIG_STACK_SIZE); 234 if (!stk.ss_sp) 236 stk.ss_size = SIG_STACK_SIZE; 237 stk.ss_flags = 0; 238 if (sigaltstack (&stk, NULL) < 0) 257 stk.ss_flags = SS_DISABLE; 258 sigaltstack (&stk, NULL); 259 free (stk.ss_sp);
|
Gtest-trace.c | 226 stack_t stk; local 247 stk.ss_sp = malloc (SIG_STACK_SIZE); 248 if (!stk.ss_sp) 250 stk.ss_size = SIG_STACK_SIZE; 251 stk.ss_flags = 0; 252 if (sigaltstack (&stk, NULL) < 0) 272 stk.ss_flags = SS_DISABLE; 273 sigaltstack (&stk, NULL); 274 free (stk.ss_sp);
|
/external/pdfium/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/ |
tgt.c | 263 opj_tgt_node_t *stk[31]; local 268 stkptr = stk; 296 if (stkptr == stk) 303 opj_tgt_node_t *stk[31]; local 308 stkptr = stk; 330 if (stkptr == stk) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 32 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
peerkey.c | 50 /* TODO: time out SMK and any STK that was generated using this SMK */ 293 * 8.5.1.4 Station to station (STK) key hierarchy 364 "RSN: Failed to get random data for INonce (STK)"); 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 646 /* TODO: abort SMK/STK handshake and remove all related keys */ 661 struct wpa_ptk *stk; local 665 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_deadlock_detector1.cc | 94 m->stk = cb->Unwind(); 142 rep->loop[i].stk[0] = stk_to; 143 rep->loop[i].stk[1] = stk_from; 149 u32 stk = 0; local 151 stk = cb->Unwind(); 152 // Printf("T%p MutexLock: %zx stk %u\n", lt, m->id, stk); 153 if (dd.onFirstLock(<->dd, m->id, stk)) 155 if (dd.onLockFast(<->dd, m->id, stk)) 163 dd.addEdges(<->dd, m->id, stk ? stk : cb->Unwind(), cb->UniqueTid()) [all...] |
sanitizer_deadlock_detector_interface.h | 38 u32 stk; // creation stack member in struct:__sanitizer::DDMutex 60 u32 stk[2]; // stack ids for the edge member in struct:__sanitizer::DDReport::__anon24238
|
sanitizer_deadlock_detector.h | 58 bool addLock(uptr lock_id, uptr current_epoch, u32 stk) { 59 // Printf("addLock: %zx %zx stk %u\n", lock_id, current_epoch, stk); 70 LockWithContext l = {lock_id_short, stk}; 102 return all_locks_with_contexts_[i].stk; 121 u32 stk; member in struct:__sanitizer::DeadlockDetectorTLS::LockWithContext 213 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { 216 dtls->addLock(cur_idx, current_epoch_, stk); 240 uptr addEdges(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk, 250 dtls->findLockContext(added_edges[i]), stk, 303 dtls->addLock(nodeToIndexUnchecked(node), nodeToEpoch(node), stk); local 338 dtls->addLock(nodeToIndexUnchecked(node), nodeToEpoch(node), stk); local [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_defs.h | 182 u32 stk; member in struct:__tsan::MBlock
|
tsan_rtl_mutex.cc | 479 u32 stk = r->loop[i].stk[j]; local 480 if (stk) { 481 const uptr *trace = StackDepotGet(stk, &size);
|
/external/chromium_org/third_party/re2/re2/ |
nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nstk++] = AddState(ip->out()) [all...] |
/external/regex-re2/re2/ |
nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nstk++] = AddState(ip->out()) [all...] |
/dalvik/tools/dmtracedump/ |
CreateTestTrace.c | 200 dataRecord **stk; local 201 stk = (dataRecord **) malloc(sizeof(dataRecord *) * maxFrames); 202 callStack[threadId].frames = stk;
|