Searched defs:confirm (Results 1 - 25 of 25) sorted by relevance

/external/v8/tools/
H A Dcommon-includes.sh52 confirm() { function
65 confirm "Branch $1 exists, do you want to delete it?"
/external/chromium/chrome/browser/chromeos/
H A Dtab_closeable_state_watcher_browsertest.cc284 // Close browser, click Cancel in BeforeUnload confirm dialog.
287 AppModalDialog* confirm = ui_test_utils::WaitForAppModalDialog(); local
288 confirm->native_dialog()->CancelAppModalDialog();
297 confirm = ui_test_utils::WaitForAppModalDialog();
298 confirm->native_dialog()->AcceptAppModalDialog();
311 // Close browser, click OK in BeforeUnload confirm dialog.
313 AppModalDialog* confirm = ui_test_utils::WaitForAppModalDialog(); local
314 confirm->native_dialog()->AcceptAppModalDialog();
/external/webkit/Tools/Scripts/webkitpy/common/system/
H A Duser.py129 def confirm(self, message=None, default=DEFAULT_YES, raw_input=raw_input): member in class:User
/external/mockito/src/org/mockito/internal/creation/
H A DMockSettingsImpl.java141 public MockCreationSettings<T> confirm(Class<T> typeToMock) { method in class:MockSettingsImpl
/external/webkit/Tools/Scripts/webkitpy/tool/steps/
H A Doptions.py42 confirm = make_option("--no-confirm", action="store_false", dest="confirm", default=True, help="Skip confirmation steps.") variable in class:Options
/external/openssh/
H A Dssh-add.c83 /* User has to confirm key use */
84 static int confirm = 0; variable
209 confirm)) {
215 if (confirm != 0)
217 "The user must confirm each use of the key\n");
245 lifetime, confirm)) {
253 if (confirm != 0)
254 fprintf(stderr, "The user must confirm each use of the key\n");
273 if (ssh_update_card(ac, add, id, pin, lifetime, confirm)) {
416 confirm
[all...]
H A Dauthfd.c539 const char *comment, u_int life, u_int confirm)
542 int type, constrained = (life || confirm);
577 if (confirm != 0)
631 const char *reader_id, const char *pin, u_int life, u_int confirm)
634 int type, constrained = (life || confirm);
653 if (confirm != 0)
538 ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key, const char *comment, u_int life, u_int confirm) argument
630 ssh_update_card(AuthenticationConnection *auth, int add, const char *reader_id, const char *pin, u_int life, u_int confirm) argument
H A Dssh-agent.c110 u_int confirm; member in struct:identity
274 if (id != NULL && (!id->confirm || confirm_key(id) == 0)) {
336 if (id != NULL && (!id->confirm || confirm_key(id) == 0))
468 int type, success = 0, death = 0, confirm = 0; local
625 confirm = 1;
650 id->confirm = confirm;
704 int i, type, version, count = 0, success = 0, death = 0, confirm = 0; local
718 confirm = 1;
740 id->confirm
[all...]
H A Dsshconnect.c571 confirm(const char *prompt) function
875 if (!confirm(msg))
1068 if (!confirm(msg))
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_gatt_server.c104 uint8_t confirm; member in struct:__anon974
434 p_cb->len, p_cb->value, p_cb->confirm);
587 int len, int confirm, char* p_value)
594 btif_cb.confirm = confirm;
586 btif_gatts_send_indication(int server_if, int attribute_handle, int conn_id, int len, int confirm, char* p_value) argument
/external/ping/
H A Dping_common.c31 int confirm = 0; variable
703 confirm = confirm_flag;
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.c911 u8 *confirm)
920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT,
922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar,
940 confirm);
949 u8 *confirm)
960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm);
969 u8 *confirm)
980 scalar2, element_b2, sae->tmp->prime_len, confirm);
1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag
906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument
944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument
964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dsae.c911 u8 *confirm)
920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT,
922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar,
940 confirm);
949 u8 *confirm)
960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm);
969 u8 *confirm)
980 scalar2, element_b2, sae->tmp->prime_len, confirm);
1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag
906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument
944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument
964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.c911 u8 *confirm)
920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT,
922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar,
940 confirm);
949 u8 *confirm)
960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm);
969 u8 *confirm)
980 scalar2, element_b2, sae->tmp->prime_len, confirm);
1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag
906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument
944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument
964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument
[all...]
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_int.h175 BT_OCTET16 confirm; member in struct:__anon1557
/external/webkit/Source/WebKit/efl/WebCoreSupport/
H A DChromeClientEfl.cpp430 bool confirm; local
442 confirm = ewk_view_run_open_panel(m_view, kit(frame), chooser->allowsMultipleFiles(), suggestedFilenames, &selectedFilenames);
446 if (!confirm)
/external/webkit/Tools/Scripts/webkitpy/tool/
H A Dmocktool.py589 def confirm(self, message=None, default='y'): member in class:MockUser
/external/webkit/Source/WebCore/page/
H A DDOMWindow.cpp987 bool DOMWindow::confirm(const String& message) function in class:WebCore::DOMWindow
/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_int.h595 tBTA_DM_API_CONFIRM confirm; member in union:__anon514
/external/webkit/Source/WebKit/efl/ewk/
H A Dewk_view.cpp426 INF("javascript confirm: %s", message);
427 INF("javascript confirm (HARD CODED)? YES");
4018 Eina_Bool confirm; local
4025 confirm = sd->api->run_open_panel(sd, frame, allows_multiple_files, suggested_filenames, selected_filenames);
4026 if (!confirm && *selected_filenames)
4028 return confirm;
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ui.workbench_3.6.1.M20101117-0800.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.osgi_3.6.1.R36x_v20100806.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.osgi_3.6.2.R36x_v20101103.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.ui.ide_3.6.2.M20101117-0800.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/dexmaker/lib/
H A Dmockito-core-1.9.1-SNAPSHOT.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/mockito/ org/mockito/asm/ org/mockito/asm/signature/ ...

Completed in 495 milliseconds