/third_party/jerryscript/tools/ |
H A D | run_jerry_tdd_executable.py | 66 err_str = err.decode('UTF-8') 68 print(err_str) 87 err_str = err.decode('UTF-8') 88 print(err_str)
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/ExecutionEngine/OProfileJIT/ |
H A D | OProfileJITEventListener.cpp | 60 const std::string err_str = sys::StrError(); in initialize() local 61 LLVM_DEBUG(dbgs() << "Failed to connect to OProfile agent: " << err_str in initialize() 71 const std::string err_str = sys::StrError(); in ~OProfileJITEventListener() local 73 << err_str << "\n"); in ~OProfileJITEventListener()
|
/third_party/benchmark/test/ |
H A D | output_test_helper.cc | 353 std::string err_str; in TestCase() local 354 regex->Init(substituted_regex, &err_str); in TestCase() 355 BM_CHECK(err_str.empty()) in TestCase() 358 << "\n got error: " << err_str; in TestCase() local
|
/third_party/mesa3d/src/mesa/program/ |
H A D | program_parse.y | 336 const char *const err_str = (state->mode == ARB_vertex) 340 yyerror(& @2, state, err_str); 2510 char *err_str; 2513 err_str = make_error_string("glProgramStringARB(%s)\n", s); 2514 if (err_str) { 2515 _mesa_error(state->ctx, GL_INVALID_OPERATION, "%s", err_str); 2516 free(err_str); 2519 err_str = make_error_string("line %u, char %u: error: %s\n", 2521 _mesa_set_program_error(state->ctx, locp->position, err_str); 2523 if (err_str) { [all...] |
/third_party/ffmpeg/tools/ |
H A D | ismindex.c | 418 const char* err_str = ""; in read_mfra() local 429 err_str = "mfra size mismatch"; in read_mfra() 434 err_str = "mfra tag mismatch"; in read_mfra() 444 err_str = "error in write_fragments"; in read_mfra() 450 fprintf(stderr, "Unable to read the MFRA atom in %s (%s)\n", file, err_str); in read_mfra()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_wolfssl.c | 800 static const char * wolfssl_tls_err_string(int err, const char *err_str) in wolfssl_tls_err_string() argument 808 return err_str; in wolfssl_tls_err_string() 829 const char *subject, const char *err_str, in wolfssl_tls_fail_event() 845 ev.cert_fail.reason_txt = wolfssl_tls_err_string(err, err_str); in wolfssl_tls_fail_event() 953 const char *err_str; in tls_verify_cb() local 1000 err_str = wolfSSL_X509_verify_cert_error_string(err); in tls_verify_cb() 1024 err_str = "Server certificate mismatch"; in tls_verify_cb() 1044 err, err_str, depth, buf); in tls_verify_cb() 1046 err_str, TLS_FAIL_UNSPECIFIED); in tls_verify_cb() 1052 __func__, preverify_ok, err, err_str, in tls_verify_cb() 827 wolfssl_tls_fail_event(struct tls_connection *conn, WOLFSSL_X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) wolfssl_tls_fail_event() argument [all...] |
H A D | tls_openssl.c | 2145 const char *subject, const char *err_str, in openssl_tls_fail_event() 2161 ev.cert_fail.reason_txt = err_str; in openssl_tls_fail_event() 2307 const char *err_str; in tls_verify_cb() local 2355 err_str = X509_verify_cert_error_string(err); in tls_verify_cb() 2377 err_str = "Server certificate mismatch"; in tls_verify_cb() 2419 " error %d (%s) depth %d for '%s'", err, err_str, in tls_verify_cb() 2422 err_str, TLS_FAIL_UNSPECIFIED); in tls_verify_cb() 2428 preverify_ok, err, err_str, in tls_verify_cb() 2143 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) openssl_tls_fail_event() argument
|
H A D | tls_gnutls.c | 930 const char *subject, const char *err_str, in gnutls_tls_fail_event() 944 ev.cert_fail.reason_txt = err_str; in gnutls_tls_fail_event() 928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_wolfssl.c | 804 static const char * wolfssl_tls_err_string(int err, const char *err_str) in wolfssl_tls_err_string() argument 812 return err_str; in wolfssl_tls_err_string() 833 const char *subject, const char *err_str, in wolfssl_tls_fail_event() 849 ev.cert_fail.reason_txt = wolfssl_tls_err_string(err, err_str); in wolfssl_tls_fail_event() 960 const char *err_str; in tls_verify_cb() local 1007 err_str = wolfSSL_X509_verify_cert_error_string(err); in tls_verify_cb() 1031 err_str = "Server certificate mismatch"; in tls_verify_cb() 1051 err, err_str, depth, buf); in tls_verify_cb() 1053 err_str, TLS_FAIL_UNSPECIFIED); in tls_verify_cb() 1059 __func__, preverify_ok, err, err_str, in tls_verify_cb() 831 wolfssl_tls_fail_event(struct tls_connection *conn, WOLFSSL_X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) wolfssl_tls_fail_event() argument [all...] |
H A D | tls_openssl.c | 2185 const char *subject, const char *err_str, in openssl_tls_fail_event() 2201 ev.cert_fail.reason_txt = err_str; in openssl_tls_fail_event() 2382 const char *err_str; in tls_verify_cb() local 2432 err_str = X509_verify_cert_error_string(err); in tls_verify_cb() 2454 err_str = "Server certificate mismatch"; in tls_verify_cb() 2496 " error %d (%s) depth %d for '%s'", err, err_str, in tls_verify_cb() 2499 err_str, TLS_FAIL_UNSPECIFIED); in tls_verify_cb() 2505 preverify_ok, err, err_str, in tls_verify_cb() 2183 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) openssl_tls_fail_event() argument
|
H A D | tls_gnutls.c | 930 const char *subject, const char *err_str, in gnutls_tls_fail_event() 944 ev.cert_fail.reason_txt = err_str; in gnutls_tls_fail_event() 928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument
|
/third_party/node/deps/v8/src/execution/ |
H A D | messages.cc | 245 MaybeHandle<String> err_str = in AppendErrorString() local 247 if (err_str.is_null()) { in AppendErrorString() 257 err_str = ErrorUtils::ToString(isolate, pending_exception); in AppendErrorString() 258 if (err_str.is_null()) { in AppendErrorString() 267 builder->AppendString(err_str.ToHandleChecked()); in AppendErrorString() 271 builder->AppendString(err_str.ToHandleChecked()); in AppendErrorString()
|
/third_party/python/Lib/test/ |
H A D | test_threading.py | 1522 err_str = None 1525 nonlocal err_str 1526 err_str = str(exc_value) 1537 self.assertEqual(err_str, 'threading_hook failed')
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_test_common_source.c | 333 #define X509_CRT_ERROR_INFO(err, err_str, info) \ in x509_crt_verify_info()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | http_curl.c | 1000 const char *err_str; in curl_cb_ssl_verify() local 1013 err_str = X509_verify_cert_error_string(err); in curl_cb_ssl_verify() 1032 depth, err, err_str, buf); in curl_cb_ssl_verify()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | http_curl.c | 1000 const char *err_str; in curl_cb_ssl_verify() local 1013 err_str = X509_verify_cert_error_string(err); in curl_cb_ssl_verify() 1032 depth, err, err_str, buf); in curl_cb_ssl_verify()
|
/third_party/astc-encoder/Source/ |
H A D | tinyexr.h | 11731 std::string err_str; 11732 int ret = ParseEXRHeader(&info, NULL, version, &err_str, marker, marker_size); 11735 if (err && !err_str.empty()) { 11736 tinyexr::SetErrorMessage(err_str, err); 13117 std::string err_str; 13119 int ret = ParseEXRHeader(&info, &empty_header, exr_version, &err_str, 13123 tinyexr::SetErrorMessage(err_str, err);
|
/third_party/mbedtls/library/ |
H A D | x509_crt.c | 1893 #define X509_CRT_ERROR_INFO(err, err_str, info) { err, info },
|