/external/chromium/third_party/icu/source/test/cintltst/ |
H A D | crestst.h | 52 int32_t pass; variable
|
/external/icu4c/test/cintltst/ |
H A D | crestst.h | 52 int32_t pass; variable
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
|
H A D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 109 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument 117 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 128 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, argument 140 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
|
H A D | p12_p8e.c | 64 const char *pass, int passlen, 86 pass, passlen, p8inf, 1); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_crpt.c | 69 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_add.c | 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 168 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 200 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, 209 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) 214 pass, passlen, 218 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument 221 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
|
H A D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 130 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 229 int nid_key, char *pass) 242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 266 int nid_safe, int iter, char *pass) 287 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
|
H A D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 151 const char *pass, int passlen, 166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 106 if(!pass || !*pass) { 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 127 if (!parse_pk12 (p12, pass, 179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
/external/chromium/third_party/icu/source/test/intltest/ |
H A D | restest.h | 51 int32_t pass; member in class:ResourceBundleTest
|
H A D | restsnew.h | 54 int32_t pass; member in class:NewResourceBundleTest
|
/external/genext2fs/ |
H A D | test-mount.sh | 23 pass () { function 47 pass dtest $size $blocks 75 pass ftest $fname $blocks
|
/external/icu4c/test/intltest/ |
H A D | restest.h | 51 int32_t pass; member in class:ResourceBundleTest
|
H A D | restsnew.h | 54 int32_t pass; member in class:NewResourceBundleTest
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt.c | 72 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 104 if(!pass) passlen = 0; 105 else if(passlen == -1) passlen = strlen(pass); 109 EVP_DigestUpdate(&ctx, pass, passlen);
|
H A D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, argument 96 if(!pass) 99 passlen = strlen(pass); 113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); 120 HMAC(digest, pass, passlen, 132 h__dump (pass, passlen); 142 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 167 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 278 if(!PKCS5_PBKDF2_HMAC(pass, passle [all...] |
/external/webkit/JavaScriptCore/API/tests/ |
H A D | testapi.js | 31 function pass(msg) function 52 pass(a + " should be " + b + " and is."); 63 pass(a + " threw: " + e); 107 pass("MyObject.myPropertyName was enumerated"); 112 pass("MyObject.regularType was enumerated"); 130 pass("getting property descriptor of throwOnGet threw exception"); 141 pass("getting property descriptor of hasPropertyLie threw exception");
|
/external/dropbear/libtomcrypt/src/hashes/ |
H A D | tiger.c | 578 /* one complete pass */ 579 static void pass(ulong64 *a, ulong64 *b, ulong64 *c, ulong64 *x, int mul) function 629 pass(&a,&b,&c,x,5); 631 pass(&c,&a,&b,x,7); 633 pass(&b,&c,&a,x,9);
|
/external/e2fsprogs/util/ |
H A D | copy_sparse.c | 68 int pass = 0; local 78 if (pass++ >= 3) 82 pass = 0;
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 85 int pass = 1; variable 88 pass = 2; 120 "getsainfo pass #%i\n", pass); 131 if (pass == 2) 135 } else if (pass == 1) 155 if ((anonymous == NULL) && (pass == 1)) { 156 pass++;
|
/external/libpng/contrib/gregbook/ |
H A D | readpng2.c | 67 png_uint_32 row_num, int pass); 532 png_uint_32 row_num, int pass) 537 /* first check whether the row differs from the previous pass; if not, 550 /* save the pass number for optional use by the front end */ 552 mainprog_ptr->pass = pass; 531 readpng2_row_callback(png_structp png_ptr, png_bytep new_row, png_uint_32 row_num, int pass) argument
|
H A D | readpng2.h | 95 int pass; member in struct:_mainprog_info
|
/external/openssl/apps/ |
H A D | genpkey.c | 87 char *pass = NULL; local 115 else if (!strcmp(*args,"-pass")) 203 BIO_printf(bio_err, "-pass arg output file pass phrase source\n"); 218 if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) 270 NULL, pass); 309 if (pass) 310 OPENSSL_free(pass);
|
H A D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 217 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 306 p8pass = pass; 307 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) 369 p8pass = pass; 370 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|