Searched refs:pass (Results 1 - 25 of 336) sorted by relevance

1234567891011>>

/external/valgrind/main/none/tests/ppc32/
H A Dxlc_dbl_u32.stdout.exp0 pass
/external/checkpolicy/
H A Dmodule_compiler.h21 int define_policy(int pass, int module_header_given);
54 int require_class(int pass);
55 int require_role(int pass);
56 int require_type(int pass);
57 int require_attribute(int pass);
58 int require_attribute_role(int pass);
59 int require_user(int pass);
60 int require_bool(int pass);
61 int require_tunable(int pass);
62 int require_sens(int pass);
[all...]
/external/openssl/crypto/pkcs12/
H A Dp12_p8d.c63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument
65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
H A Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass,
71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
106 if(!pass || !*pass) {
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL;
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = "";
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
127 if (!parse_pk12 (p12, pass,
179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
[all...]
H A Dpkcs12.h178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
182 const char *pass, int passlen,
185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
215 const char *pass, int passlen,
218 int PKCS12_key_gen_asc(const char *pass, in
254 int key_nid, char *pass); variable
256 int safe_nid, int iter, char *pass); variable
[all...]
H A Dp12_decr.c71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument
81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
121 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
128 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
158 const char *pass, int passlen,
173 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
120 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument
157 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
/external/mesa3d/src/glsl/glcpp/tests/
H A Dglcpp-test6 pass=0
16 pass=$((pass+1))
24 echo "$pass/$total tests returned correct results"
42 echo "$pass/$total tests returned correct results"
45 if [ "$pass" = "$total" ] && [ "$clean" = "$total" ]; then
/external/webkit/LayoutTests/fast/dom/getElementsByClassName/resources/
H A Dcommon.js8 pass = true
10 pass = false
15 pass = false
20 r.textContent = pass ? "PASS" : "FAIL (" + log + ")"
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKSPasswordProtectionTest.java55 char [] pass = {'a', 'b', 'c'};
56 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass);
59 assertEquals("Incorrect password length", pass.length, rPass.length);
60 for (int i = 0; i < pass.length; i++) {
62 .concat(")"), pass[i], rPass[i]);
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/
H A DTestCase.java34 private boolean pass; field in class:TestCase
37 return pass;
41 pass = value;
/external/llvm/lib/CodeGen/
H A DSpiller.h35 Spiller* createSpiller(MachineFunctionPass &pass,
41 Spiller *createInlineSpiller(MachineFunctionPass &pass,
H A DSpiller.cpp52 MachineFunctionPass *pass; member in class:__anon8734::SpillerBase
62 SpillerBase(MachineFunctionPass &pass, MachineFunction &mf, VirtRegMap &vrm) argument
63 : pass(&pass), mf(&mf), vrm(&vrm)
65 lis = &pass.getAnalysis<LiveIntervals>();
172 TrivialSpiller(MachineFunctionPass &pass, MachineFunction &mf, argument
174 : SpillerBase(pass, mf, vrm) {}
186 llvm::Spiller* llvm::createSpiller(MachineFunctionPass &pass, argument
190 case trivial: return new TrivialSpiller(pass, mf, vrm);
191 case inline_: return createInlineSpiller(pass, m
[all...]
/external/clang/lib/ARCMigrate/
H A DTransARCAssign.cpp40 ARCAssignChecker(MigrationPass &pass) : Pass(pass) { } argument
75 void trans::makeAssignARCSafe(MigrationPass &pass) { argument
76 ARCAssignChecker assignCheck(pass);
77 assignCheck.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
H A DTransUnusedInitDelegate.cpp41 UnusedInitRewriter(MigrationPass &pass) argument
42 : Body(0), Pass(pass) { }
75 void trans::rewriteUnusedInitDelegate(MigrationPass &pass) { argument
76 BodyTransform<UnusedInitRewriter> trans(pass);
77 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
H A DTransEmptyStatementsAndDealloc.cpp156 EmptyStatementsRemover(MigrationPass &pass) : Pass(pass) { } argument
200 static void cleanupDeallocOrFinalize(MigrationPass &pass) { argument
201 ASTContext &Ctx = pass.Ctx;
202 TransformActions &TA = pass.TA;
205 Ctx.Selectors.getNullarySelector(&pass.Ctx.Idents.get("finalize"));
228 if (isBodyEmpty(DeallocM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) {
239 if (isBodyEmpty(FinalizeM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) {
250 void trans::removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass) { argument
251 EmptyStatementsRemover(pass)
[all...]
/external/iproute2/doc/
H A DMakefile35 @set -e; pass=2; echo "Running LaTeX $<"; \
38 if [ $$pass -gt 3 ]; then \
41 echo "Re-running LaTeX $<, $${pass}d pass"; pass=$$[$$pass + 1]; \
/external/chromium/chrome/browser/chromeos/login/
H A Dscreen_locker_tester.cc43 views::Textfield* pass = GetPasswordField(); local
44 pass->SetText(ASCIIToUTF16(password.c_str()));
49 views::Textfield* pass = GetPasswordField(); local
50 return UTF16ToUTF8(pass->text());
55 views::Textfield* pass = GetPasswordField(); local
60 pass, key_event);
/external/icu4c/test/intltest/
H A Dwbnf.cpp1506 UBool pass; local
1507 pass = strcmp(var1.next(), value->next()) == 0;
1508 pass = pass && strcmp(var2.next(), value2->next()) == 0;
1509 pass = pass && strcmp(var3.next(), value3->next()) == 0;
1510 return pass;
1522 UBool pass; local
1523 pass = t.find(NULL) == SymbolTable::EMPTY;
1524 pass
1548 UBool pass = TRUE; local
1607 UBool pass = TRUE; local
1717 UBool pass; local
[all...]
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/
H A DKeyManagerFactorySpiTests.java61 char[] pass = { 'a', 'b', 'c' };
69 kmfSpi.engineInit(kStore, pass);
88 kmfSpi.engineInit(kStore, pass);
96 mfp = new MyKeyManagerFactorySpi.Parameters(kStore, pass);
H A DMyKeyManagerFactorySpi.java75 public Parameters (KeyStore ks, char[] pass) { argument
77 this.passWD = pass;
/external/icu4c/test/cintltst/
H A Dcrestst.h52 int32_t pass; variable
/external/openssh/
H A Dauth-sia.c53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
68 if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
/external/openssl/include/openssl/
H A Dpkcs12.h178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
182 const char *pass, int passlen,
185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
215 const char *pass, int passlen,
218 int PKCS12_key_gen_asc(const char *pass, in
254 int key_nid, char *pass); variable
256 int safe_nid, int iter, char *pass); variable
[all...]
/external/dnsmasq/contrib/dynamic-dnsmasq/
H A Ddynamic-dnsmasq.pl30 # port 9020, and include the hostname, user and pass, and it should
73 my ($pass, $domain, $ip) = split("\t",$val);
125 my ($user,$pass) = split ":", MIME::Base64::decode($1);
126 if ( authorize($user, $pass, $cgi{'hostname'}, $cgi{'myip'}) == 0 ) {
142 my ($user, $pass, $hostname) = @_;
144 $X->put($user, join("\t", ($pass, $hostname)));
150 my ($user, $pass, $hostname) = @_;
160 my $pass = shift;
165 if ( defined $h{$user} and ($spass eq $pass) and ($shost eq $hostname) ) {
/external/openssh/regress/
H A Dsftp-batch.sh12 cat << EOF > ${BATCH}.pass.1
19 cat << EOF > ${BATCH}.pass.2
40 ${SFTP} -b ${BATCH}.pass.1 -D ${SFTPSERVER} >/dev/null 2>&1 \
48 ${SFTP} -b ${BATCH}.pass.2 -D ${SFTPSERVER} >/dev/null 2>&1 \

Completed in 561 milliseconds

1234567891011>>