/external/compiler-rt/lib/tsan/unit_tests/ |
H A D | tsan_suppressions_test.cc | 30 Suppression *supp = supp0; local 31 EXPECT_EQ(supp->type, SuppressionRace); 32 EXPECT_EQ(0, strcmp(supp->templ, "quz")); 33 supp = supp->next; 34 EXPECT_EQ(supp->type, SuppressionRace); 35 EXPECT_EQ(0, strcmp(supp->templ, "baz")); 36 supp = supp->next; 37 EXPECT_EQ(supp 55 Suppression *supp = supp0; local 72 Suppression *supp = supp0; local 90 Suppression *supp = supp0; local [all...] |
/external/valgrind/unittest/ |
H A D | run_output_tests.sh | 9 if [ -f output_tests/${TEST}.supp ]; then 10 SUPP=--suppressions=output_tests/${TEST}.supp
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_suppressions.cc | 83 Suppression *SuppressionParse(const char* supp) { argument 85 const char *line = supp; 133 char *supp = ReadFile(flags()->suppressions); local 134 g_suppressions = SuppressionParse(supp); 152 for (Suppression *supp = g_suppressions; supp; supp = supp->next) { 153 if (stype == supp->type && 154 (SuppressionMatch(supp [all...] |
H A D | tsan_suppressions.h | 38 Suppression *SuppressionParse(const char* supp);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_wpa.c | 44 struct wpa_sm *supp; member in struct:wpa 149 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]); 150 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]); 207 wpa->supp = wpa_sm_init(ctx); 208 if (wpa->supp == NULL) { 213 wpa_sm_set_own_addr(wpa->supp, wpa->supp_addr); 214 wpa_sm_set_param(wpa->supp, WPA_PARAM_RSN_ENABLED, 1); 215 wpa_sm_set_param(wpa->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN); 216 wpa_sm_set_param(wpa->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); 217 wpa_sm_set_param(wpa->supp, WPA_PARAM_GROU [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 38 struct wpa_sm *supp; member in struct:wpa 135 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]); 136 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]); 186 wpa->supp = wpa_sm_init(ctx); 187 if (wpa->supp == NULL) { 192 wpa_sm_set_own_addr(wpa->supp, wpa->supp_addr); 193 wpa_sm_set_param(wpa->supp, WPA_PARAM_RSN_ENABLED, 1); 194 wpa_sm_set_param(wpa->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN); 195 wpa_sm_set_param(wpa->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); 196 wpa_sm_set_param(wpa->supp, WPA_PARAM_GROU [all...] |
/external/valgrind/tsan/ |
H A D | suppressions.cc | 78 bool ParseSuppressionToolsLine(Suppression* supp, string line); 165 bool Parser::ParseSuppressionToolsLine(Suppression* supp, string line) { argument 174 supp->tools.insert(s1.substr(0, idx2)); 177 supp->tools.insert(s1); 178 supp->warning_name = s2; 287 bool Parser::NextSuppression(Suppression* supp) { argument 297 supp->name = line; 301 if (!ParseSuppressionToolsLine(supp, line)) 307 supp->extra = line; 316 supp 339 Suppression supp; local [all...] |
H A D | thread_sanitizer.cc | 6042 string supp = "{\n"; 6043 supp += " <Put your suppression name here>\n"; 6044 supp += string(" ThreadSanitizer:") + report->ReportName() + "\n"; 6048 supp += " obj:" + objects[i] + "\n"; 6050 supp += " fun:" + funcs_demangled[i] + "\n"; 6056 supp += "}"; 6058 supp.c_str());
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 36 wpa_sm_deinit(peer->supp); 107 return wpa_sm_set_ap_rsn_ie(peer->supp, 196 peer->supp = wpa_sm_init(ctx); 197 if (peer->supp == NULL) { 202 wpa_sm_set_own_addr(peer->supp, own_addr); 203 wpa_sm_set_param(peer->supp, WPA_PARAM_RSN_ENABLED, 1); 204 wpa_sm_set_param(peer->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN); 205 wpa_sm_set_param(peer->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); 206 wpa_sm_set_param(peer->supp, WPA_PARAM_GROUP, WPA_CIPHER_CCMP); 207 wpa_sm_set_param(peer->supp, WPA_PARAM_KEY_MGM 600 int supp; local [all...] |
H A D | ibss_rsn.h | 20 struct wpa_sm *supp; member in struct:ibss_rsn_peer
|
/external/valgrind/main/coregrind/ |
H A D | m_errormgr.c | 131 Supp* supp; member in struct:_Error 649 err->supp = NULL; 762 if (p->supp != NULL) { 764 p->supp->count++; 829 p->supp = is_suppressible_error(&err); 835 if (p->supp == NULL) { 845 p->supp->count++; 981 if (p->supp != NULL) continue; 1045 if (err->supp != NULL) 1220 Supp* supp; local [all...] |
/external/openssl/crypto/des/ |
H A D | makefile.bc | 33 ofb64ede.obj supp.obj
|
/external/valgrind/main/drd/ |
H A D | drd_error.c | 511 static Bool drd_is_recognized_suppression(Char* const name, Supp* const supp) argument 546 VG_(set_supp_kind)(supp, skind); 559 SizeT* nBufp, Supp* supp) 568 static Bool drd_error_matches_suppression(Error* const e, Supp* const supp) argument 570 return VG_(get_supp_kind)(supp) == VG_(get_error_kind)(e); 558 drd_read_extra_suppression_info(Int fd, Char** bufpp, SizeT* nBufp, Supp* supp) argument
|
/external/icu4c/test/cintltst/ |
H A D | custrtst.c | 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 866 first!=u_strchr32(s+1, supp) || 867 first!=u_memchr32(s+1, supp, 9) || 873 last!=u_strrchr32(s+1, supp) || 874 last!=u_memrchr32(s+1, supp, 9) || 886 NULL!=u_memchr32(s+1, supp, 1) || 889 NULL!=u_memrchr32(s+1, supp, 1) || 892 NULL!=u_memrchr32(s+2, supp, 1) ||
|
/external/e2fsprogs/debugfs/ |
H A D | debugfs.c | 2034 static int find_supp_feature(__u32 *supp, int feature_type, char *name) argument 2048 if (!(supp[compat] & feature_mask)) 2054 if (supp[compat] & feature_mask) { 2075 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local 2083 ret = find_supp_feature(supp, E2P_FS_FEATURE, argv[1]); 2094 ret = find_supp_feature(supp, E2P_FS_FEATURE, NULL);
|
/external/valgrind/main/ |
H A D | Android.mk | 636 LOCAL_MODULE := default.supp 640 LOCAL_SRC_FILES := bionic.supp
|