HomeSort by relevance Sort by last modified time
    Searched defs:supp (Results 1 - 11 of 11) sorted by null

  /external/compiler-rt/lib/tsan/tests/unit/
tsan_suppressions_test.cc 30 Suppression *supp = supp0; local
31 EXPECT_EQ(supp->type, SuppressionRace);
32 EXPECT_EQ(0, strcmp(supp->templ, "quz"));
33 supp = supp->next;
34 EXPECT_EQ(supp->type, SuppressionRace);
35 EXPECT_EQ(0, strcmp(supp->templ, "baz"));
36 supp = supp->next;
37 EXPECT_EQ(supp->type, SuppressionRace)
55 Suppression *supp = supp0; local
72 Suppression *supp = supp0; local
90 Suppression *supp = supp0; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.h 20 struct wpa_sm *supp; member in struct:ibss_rsn_peer
ibss_rsn.c 36 wpa_sm_deinit(peer->supp);
61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
77 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
105 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
107 return wpa_sm_set_ap_rsn_ie(peer->supp,
123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
126 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
127 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
136 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d
600 int supp; local
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_suppressions.cc 90 Suppression *SuppressionParse(Suppression *head, const char* supp) {
91 const char *line = supp;
139 const char *supp = ReadFile(flags()->suppressions); local
140 g_suppressions = SuppressionParse(0, supp);
142 supp = __tsan_default_suppressions();
143 g_suppressions = SuppressionParse(g_suppressions, supp);
162 for (Suppression *supp = g_suppressions; supp; supp = supp->next)
    [all...]
tsan_rtl_report.cc 510 FiredSuppression supp = {srep.GetReport()->typ, suppress_pc}; local
511 ctx->fired_suppressions.PushBack(supp);
565 FiredSuppression supp = {rep->typ, frame->pc}; local
566 CTX()->fired_suppressions.PushBack(supp);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 38 struct wpa_sm *supp; member in struct:wpa
51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
135 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]);
136 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]);
145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len)
    [all...]
  /external/icu4c/i18n/
ucol_elm.cpp 770 UChar32 supp = U16_GET_SUPPLEMENTARY(c, 0xdc00); local
771 UChar32 suppLimit = supp + 0x400;
772 while (supp < suppLimit) {
773 fcd |= nfcImpl->getFCD16FromNormData(supp++);
    [all...]
  /external/icu4c/test/cintltst/
custrtst.c 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local
866 first!=u_strchr32(s+1, supp) ||
867 first!=u_memchr32(s+1, supp, 9) ||
873 last!=u_strrchr32(s+1, supp) ||
874 last!=u_memrchr32(s+1, supp, 9) ||
    [all...]
  /external/valgrind/main/coregrind/
m_errormgr.c 77 static Supp* suppressions = NULL;
96 static Supp* is_suppressible_error ( Error* err );
134 Supp* supp; member in struct:_Error
241 SuppKind VG_(get_supp_kind) ( Supp* su )
246 Char* VG_(get_supp_string) ( Supp* su )
251 void* VG_(get_supp_extra) ( Supp* su )
257 void VG_(set_supp_kind) ( Supp* su, SuppKind skind )
262 void VG_(set_supp_string) ( Supp* su, Char* string )
267 void VG_(set_supp_extra) ( Supp* su, void* extra
1209 Supp* supp; local
    [all...]
  /external/e2fsprogs/debugfs/
debugfs.c 2075 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local
    [all...]
  /prebuilts/tools/common/netbeans-visual/
org-openide-util.jar 

Completed in 265 milliseconds