/external/v8/tools/ |
H A D | common-includes.sh | 52 confirm() { function 65 confirm "Branch $1 exists, do you want to delete it?"
|
/external/chromium/chrome/browser/chromeos/ |
H A D | tab_closeable_state_watcher_browsertest.cc | 284 // Close browser, click Cancel in BeforeUnload confirm dialog. 287 AppModalDialog* confirm = ui_test_utils::WaitForAppModalDialog(); local 288 confirm->native_dialog()->CancelAppModalDialog(); 297 confirm = ui_test_utils::WaitForAppModalDialog(); 298 confirm->native_dialog()->AcceptAppModalDialog(); 311 // Close browser, click OK in BeforeUnload confirm dialog. 313 AppModalDialog* confirm = ui_test_utils::WaitForAppModalDialog(); local 314 confirm->native_dialog()->AcceptAppModalDialog();
|
/external/webkit/Tools/Scripts/webkitpy/common/system/ |
H A D | user.py | 129 def confirm(self, message=None, default=DEFAULT_YES, raw_input=raw_input): member in class:User
|
/external/mockito/src/org/mockito/internal/creation/ |
H A D | MockSettingsImpl.java | 141 public MockCreationSettings<T> confirm(Class<T> typeToMock) {
method in class:MockSettingsImpl
|
/external/webkit/Tools/Scripts/webkitpy/tool/steps/ |
H A D | options.py | 42 confirm = make_option("--no-confirm", action="store_false", dest="confirm", default=True, help="Skip confirmation steps.") variable in class:Options
|
/external/openssh/ |
H A D | ssh-add.c | 83 /* User has to confirm key use */ 84 static int confirm = 0; variable 209 confirm)) { 215 if (confirm != 0) 217 "The user must confirm each use of the key\n"); 245 lifetime, confirm)) { 253 if (confirm != 0) 254 fprintf(stderr, "The user must confirm each use of the key\n"); 273 if (ssh_update_card(ac, add, id, pin, lifetime, confirm)) { 416 confirm [all...] |
H A D | authfd.c | 539 const char *comment, u_int life, u_int confirm) 542 int type, constrained = (life || confirm); 577 if (confirm != 0) 631 const char *reader_id, const char *pin, u_int life, u_int confirm) 634 int type, constrained = (life || confirm); 653 if (confirm != 0) 538 ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key, const char *comment, u_int life, u_int confirm) argument 630 ssh_update_card(AuthenticationConnection *auth, int add, const char *reader_id, const char *pin, u_int life, u_int confirm) argument
|
H A D | ssh-agent.c | 110 u_int confirm; member in struct:identity 274 if (id != NULL && (!id->confirm || confirm_key(id) == 0)) { 336 if (id != NULL && (!id->confirm || confirm_key(id) == 0)) 468 int type, success = 0, death = 0, confirm = 0; local 625 confirm = 1; 650 id->confirm = confirm; 704 int i, type, version, count = 0, success = 0, death = 0, confirm = 0; local 718 confirm = 1; 740 id->confirm [all...] |
H A D | sshconnect.c | 571 confirm(const char *prompt) function 875 if (!confirm(msg)) 1068 if (!confirm(msg))
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_gatt_server.c | 104 uint8_t confirm; member in struct:__anon974 434 p_cb->len, p_cb->value, p_cb->confirm); 587 int len, int confirm, char* p_value) 594 btif_cb.confirm = confirm; 586 btif_gatts_send_indication(int server_if, int attribute_handle, int conn_id, int len, int confirm, char* p_value) argument
|
/external/ping/ |
H A D | ping_common.c | 31 int confirm = 0; variable 703 confirm = confirm_flag;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.c | 911 u8 *confirm) 920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 940 confirm); 949 u8 *confirm) 960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm); 969 u8 *confirm) 980 scalar2, element_b2, sae->tmp->prime_len, confirm); 1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag 906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument 944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument 964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | sae.c | 911 u8 *confirm) 920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 940 confirm); 949 u8 *confirm) 960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm); 969 u8 *confirm) 980 scalar2, element_b2, sae->tmp->prime_len, confirm); 1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag 906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument 944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument 964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.c | 911 u8 *confirm) 920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 940 confirm); 949 u8 *confirm) 960 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm); 969 u8 *confirm) 980 scalar2, element_b2, sae->tmp->prime_len, confirm); 1013 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag 906 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) argument 944 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) argument 964 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) argument [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_int.h | 175 BT_OCTET16 confirm; member in struct:__anon1557
|
/external/webkit/Source/WebKit/efl/WebCoreSupport/ |
H A D | ChromeClientEfl.cpp | 430 bool confirm; local 442 confirm = ewk_view_run_open_panel(m_view, kit(frame), chooser->allowsMultipleFiles(), suggestedFilenames, &selectedFilenames); 446 if (!confirm)
|
/external/webkit/Tools/Scripts/webkitpy/tool/ |
H A D | mocktool.py | 589 def confirm(self, message=None, default='y'): member in class:MockUser
|
/external/webkit/Source/WebCore/page/ |
H A D | DOMWindow.cpp | 987 bool DOMWindow::confirm(const String& message) function in class:WebCore::DOMWindow
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_int.h | 595 tBTA_DM_API_CONFIRM confirm; member in union:__anon514
|
/external/webkit/Source/WebKit/efl/ewk/ |
H A D | ewk_view.cpp | 426 INF("javascript confirm: %s", message); 427 INF("javascript confirm (HARD CODED)? YES"); 4018 Eina_Bool confirm; local 4025 confirm = sd->api->run_open_panel(sd, frame, allows_multiple_files, suggested_filenames, selected_filenames); 4026 if (!confirm && *selected_filenames) 4028 return confirm;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ui.workbench_3.6.1.M20101117-0800.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.ui.ide_3.6.2.M20101117-0800.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/dexmaker/lib/ |
H A D | mockito-core-1.9.1-SNAPSHOT.jar | META-INF/ META-INF/MANIFEST.MF org/ org/mockito/ org/mockito/asm/ org/mockito/asm/signature/ ... |