/dalvik/dx/src/com/android/dx/io/instructions/ |
SparseSwitchPayloadDecodedInstruction.java | 42 throw new IllegalArgumentException("keys/targets length mismatch");
|
/external/chromium_org/chrome/browser/first_run/ |
upgrade_util_win.h | 23 // newer chrome.exes as child processes resulting in a version mismatch.
|
/external/chromium_org/chrome/browser/prefs/tracked/ |
tracked_atomic_preference.h | 19 // entire value and it is entirely reset on mismatch. An optional delegate is
|
/external/chromium_org/net/dns/ |
notify_watcher_mac.cc | 59 // Ignoring |token| value to avoid possible endianness mismatch:
|
/external/clang/test/SemaCXX/ |
vtordisp-mode.cpp | 26 static_assert(sizeof(C) == 2 * 4 + 2 * 4 + 4 * VTORDISP_MODE, "size mismatch");
|
/external/clang/test/SemaObjC/ |
qualified-protocol-method-conflicts.m | 1 // RUN: %clang_cc1 -Woverriding-method-mismatch -fsyntax-only -verify -Wno-objc-root-class %s
|
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
SparseSwitchPayloadDecodedInstruction.java | 42 throw new IllegalArgumentException("keys/targets length mismatch");
|
/external/lldb/test/warnings/uuid/ |
main.cpp.template | 16 printf("Hello UUID Mismatch: %d\n", my_int); // Set breakpoint here.
|
/external/llvm/docs/CommandGuide/ |
llvm-profdata.rst | 29 mismatch between their data.
|
/external/llvm/test/CodeGen/X86/ |
tail-call-legality.ll | 3 ; This used to be classified as a tail call because of a mismatch in the
|
/external/openssl/crypto/ts/ |
ts_err.c | 140 {ERR_REASON(TS_R_MESSAGE_IMPRINT_MISMATCH),"message imprint mismatch"}, 141 {ERR_REASON(TS_R_NONCE_MISMATCH) ,"nonce mismatch"}, 148 {ERR_REASON(TS_R_POLICY_MISMATCH) ,"policy mismatch"}, 156 {ERR_REASON(TS_R_TSA_NAME_MISMATCH) ,"tsa name mismatch"},
|
/frameworks/rs/tests/cppallocation/ |
compute.cpp | 51 printf("Mismatch at location %d: %u\n", ct, buf[ct]);
|
/ndk/tests/device/hard-float/jni/ |
Android.mk | 35 # $NDK/ndk-build -B APP_ABI=armeabi-v7a APP_CFLAGS=-mhard-float APP_LDFLAGS=-Wl,--no-warn-mismatch 50 # Note that "--no-warn-mismatch" is needed for linker (except mclinker which check correctly) 60 LOCAL_LDFLAGS += -Wl,--no-warn-mismatch 93 LOCAL_LDFLAGS += -Wl,--no-warn-mismatch
|
/bionic/libc/upstream-openbsd/lib/libc/gen/ |
fnmatch.c | 106 const char * const mismatch = pattern; local 109 *ep = mismatch; 116 *ep = mismatch; 133 *ep = mismatch; 148 const char * const mismatch = *pattern; local 245 *pattern = mismatch; 294 const char *mismatch = NULL; local 376 mismatch = pattern; 446 * but slashes will mismatch, and are not consumed) 460 pattern = mismatch; [all...] |
/frameworks/base/test-runner/src/android/test/ |
MoreAsserts.java | 81 * element mismatch. 98 * element mismatch. 107 * specific element mismatch. 124 * specific element mismatch. 133 * specific element mismatch. 150 * specific element mismatch. 160 * specific element mismatch. 177 * specific element mismatch. 188 * On failure, message indicates first specific element mismatch. 209 * On failure, message indicates first specific element mismatch [all...] |
/external/antlr/antlr-3.4/runtime/C/src/ |
antlr3treeparser.c | 38 static void mismatch (pANTLR3_BASE_RECOGNIZER recognizer, ANTLR3_UINT32 ttype, pANTLR3_BITSET_LIST follow); 83 parser->rec->mismatch = mismatch; 169 /** Override for standard base recognizer mismatch function 174 mismatch (pANTLR3_BASE_RECOGNIZER recognizer, ANTLR3_UINT32 ttype, pANTLR3_BITSET_LIST follow) function
|
/external/ipsec-tools/src/racoon/ |
handler.c | 1155 "Reload: lifetime mismatch\n"); 1164 "Reload: lifebyte mismatch\n"); 1172 "Reload: PFS group mismatch\n"); 1186 "Reload: lifetime | pfs mismatch\n"); 1216 "Reload: encmode mismatch (%d / %d)\n", 1226 "Reload: enclen mismatch\n"); 1236 "Reload: enclen mismatch\n"); 1374 "Reload: Exchange type mismatch\n"); 1381 "Reload: DH mismatch\n"); 1391 "Reload: Authmethod mismatch\n") [all...] |
/external/openssl/crypto/evp/ |
evp_test.c | 186 fprintf(stderr,"Ciphertext length mismatch got %d expected %d\n", 193 fprintf(stderr,"Ciphertext mismatch\n"); 225 fprintf(stderr,"Plaintext length mismatch got %d expected %d\n", 232 fprintf(stderr,"Plaintext mismatch\n"); 301 fprintf(stderr,"Digest length mismatch, got %d expected %d\n",mdn,cn); 307 fprintf(stderr,"Digest mismatch\n");
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/port/ |
test.py | 214 tests.add_reftest('passes/mismatch.html', 'passes/mismatch-expected-mismatch.html', same_image=False) 217 tests.add_reftest('passes/phpreftest.php', 'passes/phpreftest-expected-mismatch.svg', same_image=False) 219 tests.add_reftest('failures/expected/mismatch.html', 'failures/expected/mismatch-expected-mismatch.html', same_image=True) 222 tests.add_reftest('failures/unexpected/mismatch.html', 'failures/unexpected/mismatch-expected-mismatch.html', same_image=True [all...] |
/device/generic/goldfish/libqemu/ |
test_guest_1.c | 87 fprintf(stderr, "Message size mismatch sent=%d received=%d\n", len, ret); 91 fprintf(stderr, "Message content mismatch!\n");
|
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
ParameterMetaDataTest.java | 80 assertEquals("Field " + fieldName + " value mismatch: ", 82 assertEquals("Field " + fieldName + " modifier mismatch: ",
|
ResultSetTest.java | 88 assertEquals("Field " + fieldName + " value mismatch: ", 90 assertEquals("Field " + fieldName + " modifier mismatch: ",
|
StatementTest.java | 78 assertEquals("Field " + fieldName + " value mismatch: ", 80 assertEquals("Field " + fieldName + " modifier mismatch: ",
|
/external/chromium_org/components/policy/core/common/ |
preg_parser_win_unittest.cc | 30 << "Key mismatch " << iter_key_a->first 46 << "Value mismatch "
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/reftests/ |
extract_reference_link_unittest.py | 44 <link rel="mismatch" href="red-box-notref.xht" /> 45 <link rel="mismatch" href="red-box-notref.xht" />
|