/external/valgrind/main/helgrind/tests/ |
H A D | tc22_exit_w_lock.c | 19 return NULL; 29 return NULL; 39 r= pthread_create(&child2, NULL, child_fn2, NULL); assert(!r); 42 r= pthread_create(&child1, NULL, child_fn1, NULL); assert(!r); 43 r= pthread_join(child1, NULL); assert(!r);
|
/external/webkit/Source/ThirdParty/ANGLE/src/libGLESv2/ |
H A D | Buffer.cpp | 22 mContents = NULL; 26 mVertexBuffer = NULL; 27 mIndexBuffer = NULL; 42 mContents = NULL; 51 if (data != NULL && size > 0) 100 mVertexBuffer = NULL; 103 mIndexBuffer = NULL;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 23 /* No need for private data. However, must return non-NULL to indicate 44 if (pos == NULL) { 46 return NULL; 59 if (password == NULL) { 63 return NULL; 74 if (resp == NULL) 75 return NULL; 96 if (eap == NULL)
|
H A D | eap_gpsk.c | 90 if (password == NULL) { 92 return NULL; 96 if (data == NULL) 97 return NULL; 103 if (data->id_peer == NULL) { 105 return NULL; 112 if (data->psk == NULL) { 114 return NULL; 140 return NULL; 146 return NULL; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | ip_addr.c | 23 if (buflen == 0 || addr == NULL) 24 return NULL; 33 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) 44 if (a == NULL && b == NULL) 46 if (a == NULL || b == NULL)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 17 /* No need for private data. However, must return non-NULL to indicate 38 if (pos == NULL) { 40 return NULL; 53 if (password == NULL) { 57 return NULL; 68 if (resp == NULL) 69 return NULL; 90 if (eap == NULL)
|
H A D | eap_gpsk.c | 85 if (password == NULL) { 87 return NULL; 91 if (data == NULL) 92 return NULL; 98 if (data->id_peer == NULL) { 100 return NULL; 107 if (data->psk == NULL) { 109 return NULL; 135 return NULL; 141 return NULL; [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password_test.c | 25 if (data == NULL) 26 return NULL; 53 if (pos == NULL) 54 return NULL; 65 if (buf == NULL) 66 return NULL; 81 return NULL;
|
H A D | ip_addr.c | 17 if (buflen == 0 || addr == NULL) 18 return NULL; 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) 38 if (a == NULL && b == NULL) 40 if (a == NULL || b == NULL)
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 17 /* No need for private data. However, must return non-NULL to indicate 38 if (pos == NULL) { 40 return NULL; 53 if (password == NULL) { 57 return NULL; 68 if (resp == NULL) 69 return NULL; 90 if (eap == NULL)
|
H A D | eap_gpsk.c | 85 if (password == NULL) { 87 return NULL; 91 if (data == NULL) 92 return NULL; 98 if (data->id_peer == NULL) { 100 return NULL; 107 if (data->psk == NULL) { 109 return NULL; 135 return NULL; 141 return NULL; [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password_test.c | 25 if (data == NULL) 26 return NULL; 53 if (pos == NULL) 54 return NULL; 65 if (buf == NULL) 66 return NULL; 81 return NULL;
|
H A D | ip_addr.c | 17 if (buflen == 0 || addr == NULL) 18 return NULL; 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) 38 if (a == NULL && b == NULL) 40 if (a == NULL || b == NULL)
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_common.c | 123 dbus_watch_set_data(watch, priv, NULL); 144 dbus_watch_set_data(watch, NULL, NULL); 173 dbus_timeout_set_data(timeout, priv, NULL); 183 dbus_timeout_set_data(timeout, NULL, NULL); 241 priv, NULL) || 245 NULL)) { 254 priv, NULL); 292 priv->con, NULL); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | nfc_pw_token.c | 23 if (buf == NULL) 41 struct wpabuf *buf = NULL, *ndef = NULL; 46 random_init(NULL); 50 if (wpa_s.conf == NULL) 54 if (buf == NULL) 58 if (ndef == NULL)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 17 /* No need for private data. However, must return non-NULL to indicate 38 if (pos == NULL) { 40 return NULL; 53 if (password == NULL) { 57 return NULL; 68 if (resp == NULL) 69 return NULL; 90 if (eap == NULL)
|
H A D | eap_gpsk.c | 85 if (password == NULL) { 87 return NULL; 91 if (data == NULL) 92 return NULL; 98 if (data->id_peer == NULL) { 100 return NULL; 107 if (data->psk == NULL) { 109 return NULL; 135 return NULL; 141 return NULL; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password_test.c | 25 if (data == NULL) 26 return NULL; 53 if (pos == NULL) 54 return NULL; 65 if (buf == NULL) 66 return NULL; 81 return NULL;
|
H A D | ip_addr.c | 17 if (buflen == 0 || addr == NULL) 18 return NULL; 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) 38 if (a == NULL && b == NULL) 40 if (a == NULL || b == NULL)
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 153 plog(LLV_ERROR, LOCATION, NULL, "Unexpected short packet\n"); 161 plog(LLV_ERROR, LOCATION, NULL, 170 if (iph1->mode_cfg->ivm == NULL || 177 if (dmsg == NULL) { 178 plog(LLV_ERROR, LOCATION, NULL, 183 plog(LLV_DEBUG, LOCATION, NULL, "MODE_CFG packet\n"); 195 plog(LLV_WARNING, LOCATION, NULL, 202 plog(LLV_WARNING, LOCATION, NULL, 207 plog(LLV_DEBUG, LOCATION, NULL, "Seen payload %d\n", np); 221 if ((payload = vmalloc(plen)) == NULL) { [all...] |
/external/icu4c/i18n/ |
H A D | tznames_impl.cpp | 64 if (fValues == NULL) { 83 if (fValues == NULL) { 90 UVector *values = new UVector(valueDeleter, NULL, DEFAULT_CHARACTERNODE_CAPACITY, status); 116 : fIgnoreCase(ignoreCase), fNodes(NULL), fNodesCapacity(0), fNodesCount(0), 117 fLazyContents(NULL), fIsEmpty(TRUE), fValueDeleter(valueDeleter) { 126 if (fLazyContents != NULL) { 160 if (fLazyContents == NULL) { 162 if (fLazyContents == NULL) { 176 if (fNodes == NULL) { 214 if (newNodes == NULL) { [all...] |
/external/openssl/crypto/objects/ |
H A D | obj_dat.c | 101 static LHASH_OF(ADDED_OBJ) *added=NULL; 164 if (a->sn == NULL) return(-1); 165 else if (b->sn == NULL) return(1); 168 if (a->ln == NULL) return(-1); 169 else if (b->ln == NULL) return(1); 182 if (added != NULL) return(1); 184 return(added != NULL); 229 if (added == NULL) return; 235 added=NULL; 250 ADDED_OBJ *ao[4]={NULL,NUL [all...] |
/external/bison/src/ |
H A D | symlist.c | 41 res->midrule = NULL; 43 res->action = NULL; 46 res->ruleprec = NULL; 50 res->next = NULL; 121 return NULL; 126 if (l == NULL || l->sym == NULL) 127 return NULL; 146 return NULL;
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_profile_queue.c | 68 ASSERTC(p_node != NULL, "Failed to allocate new list node", 0); 72 if (connect_queue == NULL) 86 if (connect_queue == NULL) 97 if (p_head == NULL) 145 (char*)&node, sizeof(connect_node_t), NULL); 161 NULL, 0, NULL); 169 ** Description Free up all the queue nodes and set the queue head to NULL 178 while (current != NULL) 185 connect_queue = NULL; [all...] |
H A D | btif_sm.c | 80 if (p_handlers == NULL) 82 BTIF_TRACE_ERROR1("%s : p_handlers is NULL", __FUNCTION__); 83 return NULL; 91 p_cb->p_handlers[initial_state](BTIF_SM_ENTER_EVT, NULL); 109 if (p_cb == NULL) 130 if (p_cb == NULL) 157 if (p_cb == NULL) 187 if (p_cb == NULL) 194 if (p_cb->p_handlers[p_cb->state](BTIF_SM_EXIT_EVT, NULL) == FALSE) 201 if (p_cb->p_handlers[p_cb->state](BTIF_SM_ENTER_EVT, NULL) [all...] |