/external/chromium_org/tools/valgrind/ |
H A D | unused_suppressions.py | 13 supp = suppressions.GetSuppressions() 16 for supps in supp.values():
|
H A D | memcheck_analyze.py | 285 supp = self._suppression; 286 supp = supp.replace("fun:_Znwj", "fun:_Znw*") 287 supp = supp.replace("fun:_Znwm", "fun:_Znw*") 288 supp = supp.replace("fun:_Znaj", "fun:_Zna*") 289 supp = supp.replace("fun:_Znam", "fun:_Zna*") 293 supp [all...] |
H A D | suppressions.py | 550 for supp in positive: 551 parsed = suppression_parser(supp.split("\n"), "positive_suppression") 553 "Suppression:\n%s\ndidn't match stack:\n%s" % (supp, stack)) 554 for supp in negative: 555 parsed = suppression_parser(supp.split("\n"), "negative_suppression") 557 "Suppression:\n%s\ndid match stack:\n%s" % (supp, stack)) 953 supp = ValgrindStyleSuppression("http://crbug.com/1234", "Memcheck:Leak", 954 ["...", "fun:foo"], "supp.txt:1") 962 assert str(supp) == supp_str, ( 963 "str(supp) ! [all...] |
H A D | test_suppressions.py | 98 supp = suppressions.GetSuppressions() 141 cur_supp = supp['common_suppressions'] 145 cur_supp += supp['mac_suppressions'] 148 cur_supp += supp['win_suppressions'] 150 cur_supp += supp['linux_suppressions'] 152 cur_supp += supp['drmem_suppressions'] 154 cur_supp += supp['drmem_full_suppressions']
|
H A D | tsan_analyze.py | 119 supp = "" 122 supp += self.line_ 128 (int(hashlib.md5(supp).hexdigest()[:16], 16))) 131 result.append(supp)
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 34 struct wpa_sm *supp; member in struct:wpa 131 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]); 132 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]); 182 wpa->supp = wpa_sm_init(ctx); 183 if (wpa->supp == NULL) { 188 wpa_sm_set_own_addr(wpa->supp, wpa->supp_addr); 189 wpa_sm_set_param(wpa->supp, WPA_PARAM_RSN_ENABLED, 1); 190 wpa_sm_set_param(wpa->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN); 191 wpa_sm_set_param(wpa->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); 192 wpa_sm_set_param(wpa->supp, WPA_PARAM_GROU [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_libignore.cc | 22 void LibIgnore::Init(const SuppressionContext &supp) { argument 25 const uptr n = supp.SuppressionCount(); 27 const Suppression *s = supp.SuppressionAt(i);
|
H A D | sanitizer_libignore.h | 33 void Init(const SuppressionContext &supp);
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_suppressions.cc | 81 const char *supp = ReadFile(flags()->suppressions); local 82 g_ctx->Parse(supp); 84 supp = __tsan_default_suppressions(); 85 g_ctx->Parse(supp);
|
H A D | tsan_rtl_report.cc | 512 Suppression *supp = 0; local 515 suppress_pc = IsSuppressed(rep->typ, rep->mops[i]->stack, &supp); 517 suppress_pc = IsSuppressed(rep->typ, rep->stacks[i], &supp); 519 suppress_pc = IsSuppressed(rep->typ, rep->threads[i]->stack, &supp); 521 suppress_pc = IsSuppressed(rep->typ, rep->locs[i], &supp); 523 FiredSuppression s = {srep.GetReport()->typ, suppress_pc, supp}; 550 if (s->supp) 551 s->supp->hit_count++; 567 if (s->supp) 568 s->supp 606 FiredSuppression supp = {rep->typ, frame->pc, 0}; local [all...] |
H A D | tsan_rtl.h | 446 Suppression *supp; member in struct:__tsan::FiredSuppression
|
/external/valgrind/main/coregrind/ |
H A D | m_errormgr.c | 134 Supp* supp; member in struct:_Error 645 err->supp = NULL; 752 if (p->supp != NULL) { 754 p->supp->count++; 818 p->supp = is_suppressible_error(&err); 820 if (p->supp == NULL) { 830 p->supp->count++; 976 if (p->supp != NULL) continue; 1040 if (err->supp != NULL) 1262 Supp* supp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 43 wpa_sm_deinit(peer->supp); 114 return wpa_sm_set_ap_rsn_ie(peer->supp, 221 peer->supp = wpa_sm_init(ctx); 222 if (peer->supp == NULL) { 227 wpa_sm_set_own_addr(peer->supp, own_addr); 228 wpa_sm_set_param(peer->supp, WPA_PARAM_RSN_ENABLED, 1); 229 wpa_sm_set_param(peer->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN); 230 wpa_sm_set_param(peer->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); 231 wpa_sm_set_param(peer->supp, WPA_PARAM_GROUP, WPA_CIPHER_CCMP); 232 wpa_sm_set_param(peer->supp, WPA_PARAM_KEY_MGM 750 int supp; local [all...] |
H A D | ibss_rsn.h | 35 struct wpa_sm *supp; member in struct:ibss_rsn_peer
|
/external/openssl/crypto/des/ |
H A D | makefile.bc | 33 ofb64ede.obj supp.obj
|
/external/valgrind/main/drd/ |
H A D | drd_error.c | 511 Supp* const supp) 546 VG_(set_supp_kind)(supp, skind); 559 SizeT* nBufp, Int* lineno, Supp* supp) 568 static Bool drd_error_matches_suppression(Error* const e, Supp* const supp) argument 570 return VG_(get_supp_kind)(supp) == VG_(get_error_kind)(e); 619 void drd_update_extra_suppresion_use(Error* e, Supp* supp) argument 510 drd_is_recognized_suppression(const HChar* const name, Supp* const supp) argument 558 drd_read_extra_suppression_info(Int fd, HChar** bufpp, SizeT* nBufp, Int* lineno, Supp* supp) argument
|
/external/libexif/libexif/ |
H A D | exif-tag.c | 1116 const ExifSupportLevel supp = ExifTagTable[i].esl[ifd][t]; local 1117 if (supp != EXIF_SUPPORT_LEVEL_NOT_RECORDED) 1118 return supp; 1150 const ExifSupportLevel supp = ExifTagTable[i].esl[ifd][0]; local 1152 if (supp != EXIF_SUPPORT_LEVEL_NOT_RECORDED) { 1155 if (ExifTagTable[i].esl[ifd][dt] != supp) 1160 return supp;
|
/external/chromium_org/third_party/icu/source/test/cintltst/ |
H A D | custrtst.c | 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 866 first!=u_strchr32(s+1, supp) || 867 first!=u_memchr32(s+1, supp, 9) || 873 last!=u_strrchr32(s+1, supp) || 874 last!=u_memrchr32(s+1, supp, 9) || 886 NULL!=u_memchr32(s+1, supp, 1) || 889 NULL!=u_memrchr32(s+1, supp, 1) || 892 NULL!=u_memrchr32(s+2, supp, 1) ||
|
/external/icu/icu4c/source/test/cintltst/ |
H A D | custrtst.c | 712 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 862 first!=u_strchr32(s+1, supp) || 863 first!=u_memchr32(s+1, supp, 9) || 869 last!=u_strrchr32(s+1, supp) || 870 last!=u_memrchr32(s+1, supp, 9) || 882 NULL!=u_memchr32(s+1, supp, 1) || 885 NULL!=u_memrchr32(s+1, supp, 1) || 888 NULL!=u_memrchr32(s+2, supp, 1) ||
|
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 1585 char *supp, *pos; local 1610 supp = xml_node_get_text(ctx->xml, mo); 1611 for (pos = supp; pos && *pos; pos++) 1613 if (supp == NULL || 1614 strstr(supp, URN_OMA_DM_DEVINFO) == NULL || 1615 strstr(supp, URN_OMA_DM_DEVDETAIL) == NULL || 1616 strstr(supp, URN_HS20_PPS) == NULL) { 1617 xml_node_get_text_free(ctx->xml, supp); 1625 xml_node_get_text_free(ctx->xml, supp);
|
/external/e2fsprogs/debugfs/ |
H A D | debugfs.c | 2168 static int find_supp_feature(__u32 *supp, int feature_type, char *name) argument 2182 if (!(supp[compat] & feature_mask)) 2188 if (supp[compat] & feature_mask) { 2209 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local 2217 ret = find_supp_feature(supp, E2P_FS_FEATURE, argv[1]); 2228 ret = find_supp_feature(supp, E2P_FS_FEATURE, NULL);
|
/external/valgrind/main/ |
H A D | Android.mk | 595 LOCAL_MODULE := default.supp 598 LOCAL_SRC_FILES := bionic.supp
|
/external/chromium_org/third_party/icu/source/i18n/ |
H A D | ucol_elm.cpp | 770 UChar32 supp = U16_GET_SUPPLEMENTARY(c, 0xdc00); local 771 UChar32 suppLimit = supp + 0x400; 772 while (supp < suppLimit) { 773 fcd |= nfcImpl->getFCD16FromNormData(supp++);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | t1_lib.c | 484 const uint16_t *pref, *supp; local 493 &supp, &supplen); 500 if (pref[i] == supp[j])
|