/third_party/elfutils/libdw/ |
H A D | dwarf_getabbrevattr.c | 41 unsigned int *namep, unsigned int *formp, in dwarf_getabbrevattr_data() 75 if (namep != NULL) in dwarf_getabbrevattr_data() 76 *namep = name; in dwarf_getabbrevattr_data() 89 dwarf_getabbrevattr (Dwarf_Abbrev *abbrev, size_t idx, unsigned int *namep, in INTDEF() 92 return INTUSE(dwarf_getabbrevattr_data) (abbrev, idx, namep, formp, in INTDEF() 40 dwarf_getabbrevattr_data(Dwarf_Abbrev *abbrev, size_t idx, unsigned int *namep, unsigned int *formp, Dwarf_Sword *datap, Dwarf_Off *offsetp) dwarf_getabbrevattr_data() argument
|
H A D | libdw.h | 610 unsigned int *namep, unsigned int *formp, 617 unsigned int *namep, unsigned int *formp,
|
/third_party/curl/lib/ |
H A D | cookie.c | 536 const char *namep = ptr; in Curl_cookie_add() local 542 while(nlen && ISBLANK(namep[nlen - 1])) in Curl_cookie_add() 592 if(nlen >= 7 && namep[0] == '_' && namep[1] == '_') { in Curl_cookie_add() 593 if(strncasecompare("__Secure-", namep, 9)) in Curl_cookie_add() 595 else if(strncasecompare("__Host-", namep, 7)) in Curl_cookie_add() 612 strstore(&co->name, namep, nlen); in Curl_cookie_add() 636 if((nlen == 6) && strncasecompare("secure", namep, 6)) { in Curl_cookie_add() 645 else if((nlen == 8) && strncasecompare("httponly", namep, 8)) in Curl_cookie_add() 653 else if((nlen == 4) && strncasecompare("path", namep, in Curl_cookie_add() [all...] |
/third_party/skia/third_party/externals/abseil-cpp/absl/time/internal/cctz/src/ |
H A D | cctz_benchmark.cc | 705 for (const char* const* namep = kTimeZoneNames; *namep != nullptr; ++namep) { in AllTimeZoneNames() 706 names.push_back(std::string("file:") + *namep); in AllTimeZoneNames()
|
/third_party/ltp/testcases/kernel/hotplug/memory_hotplug/ |
H A D | memtoy.c | 222 char **namep = sig_names; in set_signals() local 232 char *sig_name = *(namep++); in set_signals()
|
/third_party/openssl/test/ |
H A D | p_test.c | 115 const char *namep = *(void **)counter_request[1].data; in p_get_params() local 118 versionp, namep); in p_get_params()
|
/third_party/elfutils/libdwelf/ |
H A D | libdwelf.h | 57 const char **namep,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_ctrl.c | 311 char *namep; in wpa_ctrl_cleanup() local 322 namep = pathname + dirnamelen; in wpa_ctrl_cleanup() 325 if (os_strlcpy(namep, result->d_name, maxcopy) < maxcopy) in wpa_ctrl_cleanup()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_ctrl.c | 274 char *namep; in wpa_ctrl_cleanup() local 285 namep = pathname + dirnamelen; in wpa_ctrl_cleanup() 288 if (os_strlcpy(namep, entry.d_name, maxcopy) < maxcopy) in wpa_ctrl_cleanup()
|
/third_party/curl/lib/vtls/ |
H A D | schannel.c | 443 static bool algo(const char *check, char *namep, size_t nlen) in algo() argument 445 return (strlen(check) == nlen) && !strncmp(check, namep, nlen); in algo() 814 char *namep; in schannel_acquire_credential_handle() local 817 namep = startCur; in schannel_acquire_credential_handle() 820 algo("TLS_AES_256_GCM_SHA384", namep, n)) { in schannel_acquire_credential_handle() 824 && algo("TLS_AES_128_GCM_SHA256", namep, n)) { in schannel_acquire_credential_handle() 828 && algo("TLS_CHACHA20_POLY1305_SHA256", namep, n)) { in schannel_acquire_credential_handle() 832 && algo("TLS_AES_128_CCM_8_SHA256", namep, n)) { in schannel_acquire_credential_handle() 836 && algo("TLS_AES_128_CCM_SHA256", namep, n)) { in schannel_acquire_credential_handle() 840 failf(data, "schannel: Unknown TLS 1.3 cipher: %.*s", (int)n, namep); in schannel_acquire_credential_handle() [all...] |
/third_party/rust/crates/bindgen/bindgen-tests/tests/ |
H A D | stylo.hpp | [all...] |