/external/iproute2/tc/ |
em_cmp.c | 150 fprintf(stderr, "CMP header size mismatch\n");
|
em_u32.c | 158 fprintf(stderr, "U32 header size mismatch\n");
|
/external/ipsec-tools/src/racoon/ |
isakmp_newg.c | 184 "HASH mismatch.\n");
|
/external/libxml2/include/libxml/ |
xmlversion.h | 21 * your library and includes mismatch
|
/external/llvm/include/llvm/ |
CallingConv.h | 30 /// tolerate certain amounts of prototype mismatch.
|
/external/llvm/lib/Analysis/ |
ProfileInfoLoader.cpp | 101 // endianness mismatch. Byteswap all words read from the profiling
|
/external/llvm/lib/CodeGen/ |
RegAllocPBQP.cpp | 321 assert(costMat.getRows() == vr1Allowed.size() + 1 && "Matrix height mismatch."); 322 assert(costMat.getCols() == vr2Allowed.size() + 1 && "Matrix width mismatch."); 432 assert(costMat.getRows() == vr1Allowed.size() + 1 && "Size mismatch."); 433 assert(costMat.getCols() == vr2Allowed.size() + 1 && "Size mismatch.");
|
/external/openssl/crypto/bio/ |
bio_err.c | 131 {ERR_REASON(BIO_R_TAG_MISMATCH) ,"tag mismatch"},
|
/external/strace/ |
PORTING | 34 gross mismatch, write a whole new event loop.
|
/external/tcpdump/ |
print-pflog.c | 64 { 10, "10(state-mismatch)" },
|
/external/valgrind/main/ |
README_PACKAGERS | 71 This isn't so helpful. Although you can tell there is a mismatch,
|
/external/valgrind/main/docs/html/ |
dist.authors.html | 51 Dirk?Mueller?contributed?the?malloc/free?mismatch?checking<br>
|
/external/webkit/Source/JavaScriptCore/wtf/wince/ |
FastMallocWinCE.h | 134 // Handle a detected alloc/free mismatch. By default this calls CRASH().
|
/external/webkit/Tools/DumpRenderTree/ |
PixelDumpSupport.cpp | 62 // Check the computed hash against the expected one and dump image on mismatch
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/port/ |
test_files.py | 111 filename.endswith('-expected-mismatch.html')):
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/ |
run_webkit_tests_unittest.py | 572 tests_run = get_tests_run(['passes/mismatch.html'], tests_included=True, flatten_batches=True, 574 self.assertEquals(['passes/mismatch.html', 'passes/mismatch-expected-mismatch.html'], tests_run)
|
/external/webkit/Tools/Scripts/webkitpy/tool/commands/data/rebaselineserver/ |
index.html | 103 <h3>Checksum mismatch</h3>
|
/external/webkit/Tools/WebKitTestRunner/cg/ |
TestInvocationCG.cpp | 138 // Check the computed hash against the expected one and dump image on mismatch
|
/external/webp/include/webp/ |
decode_vp8.h | 122 // Returns false in case of version mismatch. Upon such failure, no other
|
/external/webp/src/enc/ |
config.c | 26 return 0; // caller/system version mismatch!
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 508 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange " 596 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest " 660 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone " 852 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 509 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange " 597 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest " 661 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone " 853 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/zlib/examples/ |
zpipe.c | 171 fputs("zlib version mismatch!\n", stderr);
|
/frameworks/base/core/java/android/net/http/ |
SslError.java | 40 * Hostname mismatch
|
/frameworks/base/libs/rs/ |
rsProgram.cpp | 125 LOGE("Attempt to bind alloc at slot %u, on shader id %u, but types mismatch",
|