/external/valgrind/memcheck/tests/ |
H A D | sbfragment.stdout.exp | 1 after 3000 loops, last size block requested 96032008
|
H A D | err_disable_arange1.stderr.exp | 31 WARNING: exiting program has the following client-requested
|
/external/boringssl/src/crypto/rand/ |
H A D | windows.c | 41 void CRYPTO_sysrand(uint8_t *out, size_t requested) { argument 42 while (requested > 0) { 44 if (requested < output_bytes_this_pass) { 45 output_bytes_this_pass = requested; 50 requested -= output_bytes_this_pass;
|
H A D | urandom.c | 142 void CRYPTO_sysrand(uint8_t *out, size_t requested) { argument 148 if (requested == 0) { 163 if (!urandom_buffering || requested > BUF_SIZE / 2) { 165 if (!read_full(fd, out, requested)) { 177 rand_bytes_per_buf - buf->used >= requested) { 178 memcpy(out, &buf->rand[buf->used], requested); 179 buf->used += requested; 217 while (requested > 0) { 219 if (todo > requested) { 220 todo = requested; [all...] |
/external/selinux/libselinux/src/ |
H A D | checkAccess.c | 63 int selinux_check_passwd_access(access_vector_t requested) argument 81 requested, 84 if ((retval == 0) && ((requested & avd.allowed) == requested)) { 98 int checkPasswdAccess(access_vector_t requested) 100 return selinux_check_passwd_access(requested);
|
H A D | compute_av.c | 16 access_vector_t requested, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 80 access_vector_t requested, 87 requested, &lavd); 107 access_vector_t requested, 121 requested, avd); 134 access_vector_t requested, struct av_decision *avd) 140 requested, &lavd); 13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | avc.c | 413 * @requested: requested permissions, interpreted based on @tclass 417 * @requested permissions between the SID pair 425 access_vector_t requested, struct avc_entry_ref *aeref) 433 if (node && ((node->ae.avd.decided & requested) == requested)) { 695 security_class_t tclass, access_vector_t requested, 700 denied = requested & ~avd->allowed; 703 else if (!requested || result) 704 audited = denied = requested; 423 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) argument 694 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument [all...] |
/external/skia/src/core/ |
H A D | SkTypefaceCache.h | 42 void add(SkTypeface*, const SkFontStyle& requested); 67 static void Add(SkTypeface*, const SkFontStyle& requested);
|
/external/mesa3d/src/gallium/auxiliary/pipebuffer/ |
H A D | pb_buffer.h | 249 * the requested or not. 252 pb_check_alignment(pb_size requested, pb_size provided) argument 254 if(!requested) 256 if(requested > provided) 258 if(provided % requested != 0) 266 * the requested or not. 269 pb_check_usage(unsigned requested, unsigned provided) argument 271 return (requested & provided) == requested ? TRUE : FALSE;
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
H A D | ICUResourceBundleImpl.java | 27 UResourceBundle requested) { 35 return getAliasedResource(this, null, 0, _key, _resource, aliasesVisited, requested); 146 UResourceBundle requested) { 151 return createBundleObject(resKey, item, aliasesVisited, requested); 183 UResourceBundle requested) { 185 return createBundleObject(i, indexStr, aliasesVisited, requested); 189 UResourceBundle requested) { 190 return createBundleObject(index, Integer.toString(index), aliasesVisited, requested); 215 UResourceBundle requested) { 220 return createBundleObject(resKey, getContainerResource(i), aliasesVisited, requested); 24 createBundleObject(String _key, int _resource, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument 145 createBundleObject(int index, String resKey, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument 182 handleGet(String indexStr, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument 188 handleGet(int index, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument 214 handleGet(String resKey, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument 223 handleGet(int index, HashMap<String, String> aliasesVisited, UResourceBundle requested) argument [all...] |
/external/clang/test/CXX/temp/temp.spec/ |
H A D | p5.cpp | 20 expected-note{{requested here}}
|
/external/libselinux/src/ |
H A D | compute_av.c | 16 access_vector_t requested, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 13 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | avc.c | 373 * @requested: requested permissions, interpreted based on @tclass 377 * @requested permissions between the SID pair 385 access_vector_t requested, struct avc_entry_ref *aeref) 393 if (node && ((node->ae.avd.decided & requested) == requested)) { 655 security_class_t tclass, access_vector_t requested, 660 denied = requested & ~avd->allowed; 663 else if (!requested || result) 664 audited = denied = requested; 383 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) argument 654 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 704 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument [all...] |
/external/skia/include/codec/ |
H A D | SkScanlineDecoder.h | 74 SkScanlineDecoder(const SkImageInfo& requested) argument 75 : fDstInfo(requested)
|
/external/libselinux/include/selinux/ |
H A D | avc.h | 240 * @requested: requested permissions, interpreted based on @tclass 244 * Check the AVC to determine whether the @requested permissions are granted 249 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 259 access_vector_t requested, 267 * @requested: requested permissions, interpreted based on @tclass 271 * Check the AVC to determine whether the @requested permissions are granted 276 * permissions in accordance with the policy. Return %0 if all @requested 281 security_class_t tclass, access_vector_t requested, [all...] |
/external/selinux/libselinux/include/selinux/ |
H A D | avc.h | 244 * @requested: requested permissions, interpreted based on @tclass 248 * Check the AVC to determine whether the @requested permissions are granted 253 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 263 access_vector_t requested, 271 * @requested: requested permissions, interpreted based on @tclass 275 * Check the AVC to determine whether the @requested permissions are granted 280 * permissions in accordance with the policy. Return %0 if all @requested 285 security_class_t tclass, access_vector_t requested, [all...] |
H A D | selinux.h | 187 access_vector_t requested, 192 access_vector_t requested, 198 access_vector_t requested, 203 access_vector_t requested, 564 * @perm: requested permissions string, interpreted based on @tclass 580 extern int selinux_check_passwd_access(access_vector_t requested); 581 extern int checkPasswdAccess(access_vector_t requested);
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | services.h | 49 sepol_access_vector_t requested, /* IN */ 53 denials of the requested permissions. */ 60 sepol_access_vector_t requested, 76 sepol_access_vector_t requested,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | eloop_win.c | 361 struct os_reltime now, requested, remaining; local 368 requested.sec = req_secs; 369 requested.usec = req_usecs; 372 if (os_reltime_before(&requested, &remaining)) { 375 eloop_register_timeout(requested.sec, 376 requested.usec, 393 struct os_reltime now, requested, remaining; local 400 requested.sec = req_secs; 401 requested.usec = req_usecs; 404 if (os_reltime_before(&remaining, &requested)) { [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | eloop_win.c | 361 struct os_reltime now, requested, remaining; local 368 requested.sec = req_secs; 369 requested.usec = req_usecs; 372 if (os_reltime_before(&requested, &remaining)) { 375 eloop_register_timeout(requested.sec, 376 requested.usec, 393 struct os_reltime now, requested, remaining; local 400 requested.sec = req_secs; 401 requested.usec = req_usecs; 404 if (os_reltime_before(&remaining, &requested)) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | eloop_win.c | 361 struct os_reltime now, requested, remaining; local 368 requested.sec = req_secs; 369 requested.usec = req_usecs; 372 if (os_reltime_before(&requested, &remaining)) { 375 eloop_register_timeout(requested.sec, 376 requested.usec, 393 struct os_reltime now, requested, remaining; local 400 requested.sec = req_secs; 401 requested.usec = req_usecs; 404 if (os_reltime_before(&remaining, &requested)) { [all...] |
/external/icu/icu4c/source/i18n/ |
H A D | ucol_imp.h | 87 CollationLoader(const CollationCacheEntry *re, const Locale &requested, UErrorCode &errorCode);
|
/external/skia/include/ports/ |
H A D | SkFontConfigInterface.h | 78 * (which may differ from the requested familyName). 80 * (which may differ from the requested style). 85 SkTypeface::Style requested,
|
/external/antlr/antlr-3.4/runtime/Perl5/lib/ANTLR/Runtime/ |
H A D | TokenSource.pm | 34 requested a token. Keep lexing until you get a valid one. Just report
|
/external/google-breakpad/src/testing/scripts/ |
H A D | gmock_doctor.py | 177 r'::operator Action<.*>\' requested here') 227 r'::operator Action<void \(.*\)>\' requested here') 235 r'requested here') 265 r'PrintValue\' requested here') 426 r'Action<(?P<type>.*)\(\)>\' requested here')
|