/external/webkit/LayoutTests/http/tests/resources/ |
H A D | touch-temp-file.php | 11 $stat = stat($tmpFile); variable 12 if (!$stat) { 13 echo "FAIL: stat() call failed.\n"; 17 $mtime = $stat['mtime'] + 1;
|
/external/webkit/Source/JavaScriptCore/tests/mozilla/ecma_3/Exceptions/ |
H A D | regress-58946.js | 32 var stat = 'Testing a return statement inside a catch statement inside a function'; variable 41 printStatus (stat);
|
/external/clang/test/CodeGenCXX/ |
H A D | debug-info-global-ctor-dtor.cpp | 16 static A stat; local
|
/external/clang/test/Index/ |
H A D | print-bitwidth.c | 13 union S stat; member in struct:X 25 // CHECK-NOT: stat
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_stat.cc | 25 void StatOutput(u64 *stat) { argument 29 stat[StatShadowNonZero] = stat[StatShadowProcessed] - stat[StatShadowZero]; 184 name[StatInt_stat] = " stat "; 328 Printf("%s: %zu\n", name[i], (uptr)stat[i]);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_verify_key.c | 23 @param stat [out] Result of test, 1==valid, 0==invalid 26 int dsa_verify_key(dsa_key *key, int *stat) argument 32 LTC_ARGCHK(stat != NULL); 35 *stat = 0; 91 *stat = 1;
|
H A D | dsa_verify_hash.c | 27 @param stat [out] The result of the signature verification, 1==valid, 0==invalid 33 int *stat, dsa_key *key) 40 LTC_ARGCHK(stat != NULL); 44 *stat = 0; 75 *stat = 1; 90 @param stat [out] The result of the signature verification, 1==valid, 0==invalid 96 int *stat, dsa_key *key) 114 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); 31 dsa_verify_hash_raw( void *r, void *s, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument 94 dsa_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | MemoryUsage.cpp | 41 v8::HeapStatistics stat; local 42 v8::V8::GetHeapStatistics(&stat); 43 unsigned v8Usage = stat.total_heap_size() >> 20;
|
/external/bison/lib/ |
H A D | fstat.c | 17 /* If the user's config.h happens to include <sys/stat.h>, let it include only 18 the system's <sys/stat.h> here, so that orig_fstat doesn't recurse to 25 #include <sys/stat.h> 27 # undef stat /* avoid warning on mingw64 with _FILE_OFFSET_BITS=64 */ macro 28 # define stat _stati64 macro 35 orig_fstat (int fd, struct stat *buf) 41 /* Write "sys/stat.h" here, not <sys/stat.h>, otherwise OSF/1 5.1 DTK cc 42 eliminates this include because of the preliminary #include <sys/stat.h> 44 #include "sys/stat [all...] |
H A D | stat.c | 1 /* Work around platform bugs in stat. 19 /* If the user's config.h happens to include <sys/stat.h>, let it include only 20 the system's <sys/stat.h> here, so that orig_stat doesn't recurse to 25 /* Get the original definition of stat. It might be defined as a macro. */ 27 #include <sys/stat.h> 32 # undef stat /* avoid warning on mingw64 with _FILE_OFFSET_BITS=64 */ macro 33 # define stat _stati64 macro 37 /* mingw64 has a broken stat() function, based on _stat(), in libmingwex.a. 39 # define stat _stat macro 46 orig_stat (const char *filename, struct stat *bu [all...] |
/external/webkit/Tools/wx/build/ |
H A D | waf_extensions.py | 88 import stat namespace 90 st = os.stat(filename) 91 if stat.S_ISDIR(st[stat.ST_MODE]): raise IOError('not a file')
|
/external/chromium/chrome/browser/resources/file_manager/bin/ |
H A D | squashdir.py | 9 import stat namespace 35 statinfo = os.stat(abs_src) 39 if not stat.S_ISDIR(statinfo.st_mode):
|
/external/clang/tools/scan-build/ |
H A D | set-xcode-analyzer | 17 import stat namespace 55 os.chmod(path, stat.S_IRUSR | stat.S_IWUSR | stat.S_IRGRP | stat.S_IROTH)
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
H A D | ocb_decrypt_verify_memory.c | 31 @param stat [out] The result of the tag comparison (1==valid, 0==invalid) 40 int *stat) 50 LTC_ARGCHK(stat != NULL); 71 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat); 34 ocb_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, const unsigned char *tag, unsigned long taglen, int *stat) argument
|
H A D | ocb_done_decrypt.c | 28 @param stat [out] The result of the tag comparison 34 const unsigned char *tag, unsigned long taglen, int *stat) 44 LTC_ARGCHK(stat != NULL); 47 *stat = 0; 61 *stat = 1; 31 ocb_done_decrypt(ocb_state *ocb, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, const unsigned char *tag, unsigned long taglen, int *stat) argument
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
H A D | katja_decrypt_key.c | 29 @param stat [out] Result of the decryption, 1==valid, 0==invalid 36 int hash_idx, int *stat, 46 LTC_ARGCHK(stat != NULL); 49 *stat = 0; 91 out, outlen, stat); 33 katja_decrypt_key(const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen, const unsigned char *lparam, unsigned long lparamlen, int hash_idx, int *stat, katja_key *key) argument
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
H A D | rsa_decrypt_key.c | 30 @param stat [out] Result of the decryption, 1==valid, 0==invalid 38 int *stat, rsa_key *key) 47 LTC_ARGCHK(stat != NULL); 50 *stat = 0; 91 out, outlen, stat); 94 err = pkcs_1_v1_5_decode(tmp, x, LTC_PKCS_1_EME, modulus_bitlen, out, outlen, stat); 34 rsa_decrypt_key_ex(const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen, const unsigned char *lparam, unsigned long lparamlen, int hash_idx, int padding, int *stat, rsa_key *key) argument
|
H A D | rsa_verify_hash.c | 29 @param stat [out] The result of the signature comparison, 1==valid, 0==invalid 37 int *stat, rsa_key *key) 45 LTC_ARGCHK(stat != NULL); 49 *stat = 0; 95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); 146 *stat = 1; 33 rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int padding, int hash_idx, unsigned long saltlen, int *stat, rsa_key *key) argument
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_decrypt_verify_memory.c | 34 @param stat [out] The result of the decryption (1==valid tag, 0==invalid) 44 int *stat) 51 LTC_ARGCHK(stat != NULL); 58 *stat = 0; 88 *stat = 1; 37 eax_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, unsigned char *tag, unsigned long taglen, int *stat) argument
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_verify_hash.c | 42 @param stat Result of signature, 1==valid, 0==invalid 48 int *stat, ecc_key *key) 57 LTC_ARGCHK(stat != NULL); 61 *stat = 0; 146 *stat = 1; 46 ecc_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, ecc_key *key) argument
|
/external/dropbear/libtomcrypt/testprof/ |
H A D | katja_test.c | 9 int hash_idx, prng_idx, stat, stat2, size; local 81 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 82 if (!(stat == 1 && stat2 == 0)) { 126 DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key)); 127 if (!(stat == 1 && stat2 == 0)) { 152 DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &key)); 157 if (!(stat == 1 && stat2 == 0)) { 158 fprintf(stderr, "katja_verify_hash (unsalted, origKey) failed, %d, %d", stat, stat2); 168 DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &privKey)); 173 if (!(stat [all...] |
H A D | ecc_test.c | 112 int stat, stat2; local 222 DO(ecc_verify_hash (buf[1], x, buf[0], 16, &stat, &pubKey)); 225 if (!(stat == 1 && stat2 == 0)) { 226 fprintf(stderr, "ecc_verify_hash failed %d, %d, ", stat, stat2);
|
H A D | rsa_test.c | 129 int hash_idx, prng_idx, stat, stat2; local 204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 205 if (!(stat == 1 && stat2 == 0)) { 249 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key)); 250 if (!(stat == 1 && stat2 == 0)) { 267 DO(rsa_decrypt_key_ex(out, len, tmp, &len2, NULL, 0, 0, LTC_PKCS_1_V1_5, &stat, &key)); 268 if (!(stat == 1 && stat2 == 0)) { 269 fprintf(stderr, "rsa_decrypt_key_ex failed, %d, %d", stat, stat2); 291 DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &key)); 296 if (!(stat [all...] |
/external/libnfc-nci/halimpl/bcm2079x/adaptation/ |
H A D | NonVolatileStore.cpp | 29 #include <sys/stat.h> 193 int stat = 0; local
|
/external/oprofile/libdb/ |
H A D | db_stat.c | 74 void odb_hash_display_stat(odb_hash_stat_t const * stat) argument 76 printf("total node number: %d\n", stat->node_nr); 77 printf("total used node: %d\n", stat->used_node_nr); 78 printf("total count: %llu\n", stat->total_count); 79 printf("hash table size: %d\n", stat->hash_table_size); 80 printf("greater list length: %d\n", stat->max_list_length); 81 printf("average non empty list length: %2.4f\n", stat->average_list_length); 85 void odb_hash_free_stat(odb_hash_stat_t * stat) argument 87 free(stat);
|