/external/compiler-rt/lib/tsan/tests/unit/ |
tsan_suppressions_test.cc | 30 Suppression *supp = supp0; local 31 EXPECT_EQ(supp->type, SuppressionRace); 32 EXPECT_EQ(0, strcmp(supp->templ, "quz")); 33 supp = supp->next; 34 EXPECT_EQ(supp->type, SuppressionRace); 35 EXPECT_EQ(0, strcmp(supp->templ, "baz")); 36 supp = supp->next; 37 EXPECT_EQ(supp->type, SuppressionRace) 55 Suppression *supp = supp0; local 72 Suppression *supp = supp0; local 90 Suppression *supp = supp0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.h | 20 struct wpa_sm *supp; member in struct:ibss_rsn_peer
|
ibss_rsn.c | 36 wpa_sm_deinit(peer->supp); 61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 77 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 105 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 107 return wpa_sm_set_ap_rsn_ie(peer->supp, 123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 126 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 127 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 136 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d 600 int supp; local [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_suppressions.cc | 90 Suppression *SuppressionParse(Suppression *head, const char* supp) { 91 const char *line = supp; 139 const char *supp = ReadFile(flags()->suppressions); local 140 g_suppressions = SuppressionParse(0, supp); 142 supp = __tsan_default_suppressions(); 143 g_suppressions = SuppressionParse(g_suppressions, supp); 162 for (Suppression *supp = g_suppressions; supp; supp = supp->next) [all...] |
tsan_rtl_report.cc | 510 FiredSuppression supp = {srep.GetReport()->typ, suppress_pc}; local 511 ctx->fired_suppressions.PushBack(supp); 565 FiredSuppression supp = {rep->typ, frame->pc}; local 566 CTX()->fired_suppressions.PushBack(supp);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 38 struct wpa_sm *supp; member in struct:wpa 51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 135 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]); 136 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]); 145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len) [all...] |
/external/icu4c/i18n/ |
ucol_elm.cpp | 770 UChar32 supp = U16_GET_SUPPLEMENTARY(c, 0xdc00); local 771 UChar32 suppLimit = supp + 0x400; 772 while (supp < suppLimit) { 773 fcd |= nfcImpl->getFCD16FromNormData(supp++); [all...] |
/external/icu4c/test/cintltst/ |
custrtst.c | 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 866 first!=u_strchr32(s+1, supp) || 867 first!=u_memchr32(s+1, supp, 9) || 873 last!=u_strrchr32(s+1, supp) || 874 last!=u_memrchr32(s+1, supp, 9) || [all...] |
/external/valgrind/main/coregrind/ |
m_errormgr.c | 77 static Supp* suppressions = NULL; 96 static Supp* is_suppressible_error ( Error* err ); 134 Supp* supp; member in struct:_Error 241 SuppKind VG_(get_supp_kind) ( Supp* su ) 246 Char* VG_(get_supp_string) ( Supp* su ) 251 void* VG_(get_supp_extra) ( Supp* su ) 257 void VG_(set_supp_kind) ( Supp* su, SuppKind skind ) 262 void VG_(set_supp_string) ( Supp* su, Char* string ) 267 void VG_(set_supp_extra) ( Supp* su, void* extra 1209 Supp* supp; local [all...] |
/external/e2fsprogs/debugfs/ |
debugfs.c | 2075 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local [all...] |
/prebuilts/tools/common/netbeans-visual/ |
org-openide-util.jar | |