/external/perfetto/src/profiling/memory/ |
D | wire_protocol_unittest.cc | 95 WireMessage recv_msg; in TEST() local 97 &recv_msg)); in TEST() 100 ASSERT_EQ(recv_msg.record_type, msg.record_type); in TEST() 101 ASSERT_EQ(*recv_msg.alloc_header, *msg.alloc_header); in TEST() 102 ASSERT_EQ(recv_msg.payload_size, msg.payload_size); in TEST() 103 ASSERT_STREQ(recv_msg.payload, msg.payload); in TEST() 123 WireMessage recv_msg; in TEST() local 125 &recv_msg)); in TEST() 128 ASSERT_EQ(recv_msg.record_type, msg.record_type); in TEST() 129 ASSERT_EQ(*recv_msg.free_header, *msg.free_header); in TEST() [all …]
|
/external/crosvm/base/src/ |
D | tube.rs | 188 let recv_msg: String = s2.recv().unwrap(); in send_recv_no_fd() localVariable 190 assert_eq!(test_msg, recv_msg); in send_recv_no_fd() 208 let recv_msg: EventStruct = s2.recv().unwrap(); in send_recv_one_fd() localVariable 210 assert_eq!(test_msg.x, recv_msg.x); in send_recv_one_fd() 212 test_event_pair(test_msg.b, recv_msg.b); in send_recv_one_fd() 226 let mut recv_msg: HashMap<String, Event> = s2.recv().unwrap(); in send_recv_hash_map() localVariable 230 let mut recv_msg_keys: Vec<_> = recv_msg.keys().collect(); in send_recv_hash_map() 235 let recv_event = recv_msg.remove(&key).unwrap(); in send_recv_hash_map()
|
/external/selinux/python/sepolgen/src/share/ |
D | perm_map | 301 recv_msg r 10 329 recv_msg r 10 355 recv_msg r 10 380 recv_msg r 10 421 recv_msg r 10 445 recv_msg r 10 469 recv_msg r 10 496 recv_msg r 10 520 recv_msg r 10 712 recv_msg r 10 [all …]
|
/external/selinux/python/sepolgen/tests/ |
D | perm_map | 294 recv_msg r 10 322 recv_msg r 10 348 recv_msg r 10 373 recv_msg r 10 414 recv_msg r 10 438 recv_msg r 10 462 recv_msg r 10 489 recv_msg r 10 513 recv_msg r 10 705 recv_msg r 10 [all …]
|
/external/openssh/ |
D | ssh-pkcs11-client.c | 72 recv_msg(struct sshbuf *m) in recv_msg() function 150 if (recv_msg(msg) == SSH2_AGENT_SIGN_RESPONSE) { in rsa_encrypt() 209 if (recv_msg(msg) == SSH2_AGENT_SIGN_RESPONSE) { in ecdsa_do_sign() 338 type = recv_msg(msg); in pkcs11_add_provider() 386 if (recv_msg(msg) == SSH_AGENT_SUCCESS) in pkcs11_del_provider()
|
/external/ltp/testcases/network/netstress/ |
D | netstress.c | 547 char recv_msg[max_msg_len]; in server_fn() local 568 recv_len = sock_recv_poll(recv_msg + offset, in server_fn() 575 (recv_msg[0] != start_byte && in server_fn() 576 recv_msg[0] != start_fin_byte)) { in server_fn() 583 if (recv_msg[offset - 1] != end_byte) { in server_fn() 589 if (recv_msg[0] == start_fin_byte) in server_fn() 592 send_msg_len = parse_client_request(recv_msg); in server_fn()
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | udpgso_bench_rx.c | 212 static int recv_msg(int fd, char *buf, int len, int *gso_size) in recv_msg() function 258 ret = recv_msg(fd, rbuf, len, &gso_size); in do_flush_udp()
|
/external/selinux/libsepol/tests/policies/test-hooks/ |
D | small-base.conf | 113 recv_msg
|
D | cmp_policy.conf | 113 recv_msg
|
/external/selinux/libsepol/tests/policies/test-expander/ |
D | alias-base.conf | 113 recv_msg
|
D | role-base.conf | 113 recv_msg
|
D | user-base.conf | 113 recv_msg
|
D | small-base.conf | 113 recv_msg
|
/external/selinux/libsepol/tests/policies/test-deps/ |
D | base-notmetreq.conf | 112 recv_msg
|
D | small-base.conf | 113 recv_msg
|
D | base-metreq.conf | 113 recv_msg
|
/external/selinux/libsepol/tests/policies/test-linker/ |
D | small-base.conf | 113 recv_msg
|
/external/compiler-rt/lib/msan/tests/ |
D | msan_test.cc | 1051 struct msghdr recv_msg; in TEST() local 1052 memset(&recv_msg, 0, sizeof(recv_msg)); in TEST() 1053 recv_msg.msg_name = &recv_sai; in TEST() 1054 recv_msg.msg_namelen = sizeof(recv_sai); in TEST() 1055 recv_msg.msg_iov = &recv_iov; in TEST() 1056 recv_msg.msg_iovlen = 1; in TEST() 1057 res = recvmsg(server_socket, &recv_msg, 0); in TEST() 1060 ASSERT_EQ(sizeof(recv_sai), recv_msg.msg_namelen); in TEST() 1061 EXPECT_NOT_POISONED(*(struct sockaddr_in *)recv_msg.msg_name); in TEST()
|
/external/llvm-project/compiler-rt/lib/msan/tests/ |
D | msan_test.cpp | 1065 struct msghdr recv_msg; in TEST_P() local 1066 memset(&recv_msg, 0, sizeof(recv_msg)); in TEST_P() 1067 recv_msg.msg_name = recv_sai->ptr(); in TEST_P() 1068 recv_msg.msg_namelen = recv_sai->size(); in TEST_P() 1069 recv_msg.msg_iov = &recv_iov; in TEST_P() 1070 recv_msg.msg_iovlen = 1; in TEST_P() 1071 res = recvmsg(server_socket, &recv_msg, 0); in TEST_P() 1074 ASSERT_EQ(recv_sai->size(), recv_msg.msg_namelen); in TEST_P()
|
/external/selinux/libsepol/tests/policies/test-cond/ |
D | refpolicy-base.conf | 124 recv_msg 1514 allow kernel_t port_type:tcp_socket { send_msg recv_msg name_connect }; 1515 allow kernel_t port_type:udp_socket { send_msg recv_msg };
|
/external/selinux/python/sepolgen/tests/test_data/ |
D | httpd.log | 9226 type=AVC msg=audit(1163782674.054:13830): avc: denied { recv_msg } for pid=15069 comm="vpnc" sad… 9339 type=AVC msg=audit(1163782687.739:13873): avc: denied { recv_msg } for pid=15069 comm="vpnc" sad… 9752 type=AVC msg=audit(1163789869.396:14084): avc: denied { recv_msg } for pid=15069 comm="vpnc" sad… 10678 type=AVC msg=audit(1163794381.358:14484): avc: denied { recv_msg } for pid=16548 comm="firefox-b… 10725 type=AVC msg=audit(1163794669.472:14502): avc: denied { recv_msg } for pid=15069 comm="vpnc" sad… 10786 type=AVC msg=audit(1163795269.294:14526): avc: denied { recv_msg } for pid=15069 comm="vpnc" sad…
|