/external/webkit/WebCore/websockets/ |
WebSocketHandshake.cpp | 471 m_context->addMessage(ConsoleDestination, JSMessageSource, LogMessageType, ErrorMessageLevel, "Error during WebSocket handshake: origin mismatch: " + clientOrigin() + " != " + m_wsOrigin, 0, clientOrigin()); 475 m_context->addMessage(ConsoleDestination, JSMessageSource, LogMessageType, ErrorMessageLevel, "Error during WebSocket handshake: location mismatch: " + clientLocation() + " != " + m_wsLocation, 0, clientOrigin()); 479 m_context->addMessage(ConsoleDestination, JSMessageSource, LogMessageType, ErrorMessageLevel, "Error during WebSocket handshake: protocol mismatch: " + m_clientProtocol + " != " + m_wsProtocol, 0, clientOrigin());
|
/prebuilt/linux-x86/toolchain/i686-unknown-linux-gnu-4.2.1/bin/ |
i686-unknown-linux-gnu-gcov | |
/external/webkit/WebKitTools/Scripts/webkitpy/layout_tests/layout_package/ |
test_expectations.py | 232 TEXT: ('text diff mismatch', 233 'text diff mismatch'), 234 IMAGE: ('image mismatch', 'image mismatch'), 235 IMAGE_PLUS_TEXT: ('image and text mismatch', 236 'image and text mismatch'), [all...] |
/external/icu4c/i18n/ |
rbt_rule.h | 256 * degree of match may be mismatch, a partial match, or a full 257 * match. A mismatch means at least one character of the text
|
strmatch.cpp | 119 // We've reached the context limit without a mismatch and
|
/external/openssl/crypto/asn1/ |
asn1_err.c | 216 {ERR_REASON(ASN1_R_EXPLICIT_LENGTH_MISMATCH),"explicit length mismatch"}, 273 {ERR_REASON(ASN1_R_SEQUENCE_LENGTH_MISMATCH),"sequence length mismatch"},
|
/frameworks/base/libs/utils/ |
ZipUtils.cpp | 127 LOGW("Size mismatch on inflated file (%ld vs %ld)\n", 239 LOGW("Size mismatch on inflated file (%ld vs %ld)\n",
|
/sdk/ddms/libs/ddmuilib/src/com/android/ddmuilib/log/event/ |
DisplayGraph.java | 195 // just ignore this descriptor if there's a type mismatch 241 // just ignore this descriptor if there's a type mismatch
|
/cts/tools/vm-tests/src/dot/junit/format/f1/ |
Test_f1.java | 156 * @title header and map section mismatch
|
/dalvik/dx/src/com/android/dx/dex/file/ |
EncodedMethod.java | 175 "code vs. access_flags mismatch");
|
/external/bluetooth/bluez/src/ |
plugin.c | 66 error("Version mismatch for %s", desc->name);
|
/external/bluetooth/bluez/tools/ |
hciattach_st.c | 186 fprintf(stderr, "Sequence number mismatch\n");
|
/external/bluetooth/glib/tests/ |
file-test.c | 167 g_assert (strcmp (text, contents) == 0 && "content mismatch");
|
/external/dhcpcd/ |
bpf.c | 84 logger(LOG_ERR, "BPF version mismatch - recompile " PACKAGE);
|
/external/iproute2/tc/ |
em_cmp.c | 150 fprintf(stderr, "CMP header size mismatch\n");
|
em_u32.c | 158 fprintf(stderr, "U32 header size mismatch\n");
|
/external/ipsec-tools/src/racoon/ |
isakmp_newg.c | 184 "HASH mismatch.\n");
|
/external/libxml2/include/libxml/ |
xmlversion.h | 21 * your library and includes mismatch
|
/external/opencore/protocols/sdp/parser/src/ |
sdpparser.cpp | 439 PVMF_SDP_PARSER_LOGERROR((0, "SDP_Parser::parseSDP - Payload Mismatch in fmtp line")); 467 PVMF_SDP_PARSER_LOGERROR((0, "SDP_Parser::parseSDP - Payload Mismatch in a=framesize: line")); 513 PVMF_SDP_PARSER_LOGERROR((0, "SDP_Parser::parseSDP - Mismatch between number of payloads and rtpmap lines")); 532 PVMF_SDP_PARSER_LOGERROR((0, "SDP_Parser::parseSDP - Mismatch between number of payloads and rtpmap lines")); [all...] |
/external/openssl/crypto/bio/ |
bio_err.c | 131 {ERR_REASON(BIO_R_TAG_MISMATCH) ,"tag mismatch"},
|
/external/openssl/crypto/rsa/ |
rsa_err.c | 121 {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) ,"algorithm mismatch"},
|
/external/strace/ |
PORTING | 34 gross mismatch, write a whole new event loop.
|
/external/tcpdump/ |
print-pflog.c | 64 { 10, "10(state-mismatch)" },
|
/external/webkit/JavaScriptCore/wtf/wince/ |
FastMallocWince.h | 134 // Handle a detected alloc/free mismatch. By default this calls CRASH().
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 508 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange " 596 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest " 660 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone " 852 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|