/external/valgrind/main/none/tests/ppc32/ |
H A D | xlc_dbl_u32.stdout.exp | 0 pass
|
/external/checkpolicy/ |
H A D | module_compiler.h | 21 int define_policy(int pass, int module_header_given); 54 int require_class(int pass); 55 int require_role(int pass); 56 int require_type(int pass); 57 int require_attribute(int pass); 58 int require_attribute_role(int pass); 59 int require_user(int pass); 60 int require_bool(int pass); 61 int require_tunable(int pass); 62 int require_sens(int pass); [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
|
H A D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 106 if(!pass || !*pass) { 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 127 if (!parse_pk12 (p12, pass, 179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
H A D | pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, in 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
H A D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 121 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 128 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 158 const char *pass, int passlen, 173 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 120 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 157 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
/external/mesa3d/src/glsl/glcpp/tests/ |
H A D | glcpp-test | 6 pass=0 16 pass=$((pass+1)) 24 echo "$pass/$total tests returned correct results" 42 echo "$pass/$total tests returned correct results" 45 if [ "$pass" = "$total" ] && [ "$clean" = "$total" ]; then
|
/external/webkit/LayoutTests/fast/dom/getElementsByClassName/resources/ |
H A D | common.js | 8 pass = true 10 pass = false 15 pass = false 20 r.textContent = pass ? "PASS" : "FAIL (" + log + ")"
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSPasswordProtectionTest.java | 55 char [] pass = {'a', 'b', 'c'}; 56 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass); 59 assertEquals("Incorrect password length", pass.length, rPass.length); 60 for (int i = 0; i < pass.length; i++) { 62 .concat(")"), pass[i], rPass[i]);
|
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
H A D | TestCase.java | 34 private boolean pass; field in class:TestCase 37 return pass; 41 pass = value;
|
/external/llvm/lib/CodeGen/ |
H A D | Spiller.h | 35 Spiller* createSpiller(MachineFunctionPass &pass, 41 Spiller *createInlineSpiller(MachineFunctionPass &pass,
|
H A D | Spiller.cpp | 52 MachineFunctionPass *pass; member in class:__anon8734::SpillerBase 62 SpillerBase(MachineFunctionPass &pass, MachineFunction &mf, VirtRegMap &vrm) argument 63 : pass(&pass), mf(&mf), vrm(&vrm) 65 lis = &pass.getAnalysis<LiveIntervals>(); 172 TrivialSpiller(MachineFunctionPass &pass, MachineFunction &mf, argument 174 : SpillerBase(pass, mf, vrm) {} 186 llvm::Spiller* llvm::createSpiller(MachineFunctionPass &pass, argument 190 case trivial: return new TrivialSpiller(pass, mf, vrm); 191 case inline_: return createInlineSpiller(pass, m [all...] |
/external/clang/lib/ARCMigrate/ |
H A D | TransARCAssign.cpp | 40 ARCAssignChecker(MigrationPass &pass) : Pass(pass) { } argument 75 void trans::makeAssignARCSafe(MigrationPass &pass) { argument 76 ARCAssignChecker assignCheck(pass); 77 assignCheck.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | TransUnusedInitDelegate.cpp | 41 UnusedInitRewriter(MigrationPass &pass) argument 42 : Body(0), Pass(pass) { } 75 void trans::rewriteUnusedInitDelegate(MigrationPass &pass) { argument 76 BodyTransform<UnusedInitRewriter> trans(pass); 77 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | TransEmptyStatementsAndDealloc.cpp | 156 EmptyStatementsRemover(MigrationPass &pass) : Pass(pass) { } argument 200 static void cleanupDeallocOrFinalize(MigrationPass &pass) { argument 201 ASTContext &Ctx = pass.Ctx; 202 TransformActions &TA = pass.TA; 205 Ctx.Selectors.getNullarySelector(&pass.Ctx.Idents.get("finalize")); 228 if (isBodyEmpty(DeallocM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) { 239 if (isBodyEmpty(FinalizeM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) { 250 void trans::removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass) { argument 251 EmptyStatementsRemover(pass) [all...] |
/external/iproute2/doc/ |
H A D | Makefile | 35 @set -e; pass=2; echo "Running LaTeX $<"; \ 38 if [ $$pass -gt 3 ]; then \ 41 echo "Re-running LaTeX $<, $${pass}d pass"; pass=$$[$$pass + 1]; \
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | screen_locker_tester.cc | 43 views::Textfield* pass = GetPasswordField(); local 44 pass->SetText(ASCIIToUTF16(password.c_str())); 49 views::Textfield* pass = GetPasswordField(); local 50 return UTF16ToUTF8(pass->text()); 55 views::Textfield* pass = GetPasswordField(); local 60 pass, key_event);
|
/external/icu4c/test/intltest/ |
H A D | wbnf.cpp | 1506 UBool pass; local 1507 pass = strcmp(var1.next(), value->next()) == 0; 1508 pass = pass && strcmp(var2.next(), value2->next()) == 0; 1509 pass = pass && strcmp(var3.next(), value3->next()) == 0; 1510 return pass; 1522 UBool pass; local 1523 pass = t.find(NULL) == SymbolTable::EMPTY; 1524 pass 1548 UBool pass = TRUE; local 1607 UBool pass = TRUE; local 1717 UBool pass; local [all...] |
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
H A D | KeyManagerFactorySpiTests.java | 61 char[] pass = { 'a', 'b', 'c' }; 69 kmfSpi.engineInit(kStore, pass); 88 kmfSpi.engineInit(kStore, pass); 96 mfp = new MyKeyManagerFactorySpi.Parameters(kStore, pass);
|
H A D | MyKeyManagerFactorySpi.java | 75 public Parameters (KeyStore ks, char[] pass) { argument 77 this.passWD = pass;
|
/external/icu4c/test/cintltst/ |
H A D | crestst.h | 52 int32_t pass; variable
|
/external/openssh/ |
H A D | auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 68 if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
|
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, in 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
/external/dnsmasq/contrib/dynamic-dnsmasq/ |
H A D | dynamic-dnsmasq.pl | 30 # port 9020, and include the hostname, user and pass, and it should 73 my ($pass, $domain, $ip) = split("\t",$val); 125 my ($user,$pass) = split ":", MIME::Base64::decode($1); 126 if ( authorize($user, $pass, $cgi{'hostname'}, $cgi{'myip'}) == 0 ) { 142 my ($user, $pass, $hostname) = @_; 144 $X->put($user, join("\t", ($pass, $hostname))); 150 my ($user, $pass, $hostname) = @_; 160 my $pass = shift; 165 if ( defined $h{$user} and ($spass eq $pass) and ($shost eq $hostname) ) {
|
/external/openssh/regress/ |
H A D | sftp-batch.sh | 12 cat << EOF > ${BATCH}.pass.1 19 cat << EOF > ${BATCH}.pass.2 40 ${SFTP} -b ${BATCH}.pass.1 -D ${SFTPSERVER} >/dev/null 2>&1 \ 48 ${SFTP} -b ${BATCH}.pass.2 -D ${SFTPSERVER} >/dev/null 2>&1 \
|