Searched defs:good (Results 1 - 25 of 54) sorted by relevance

123

/external/valgrind/memcheck/tests/
H A Dexecve1.c7 char* good[1] = { NULL }; local
10 execve("/bin/true", good, good);
/external/clang/test/SemaCXX/
H A Dfunction-pointer-arguments.cpp9 void good() { function in namespace:PR16570
H A Doperator-arrow-depth.cpp21 A<MAX/2> good; variable
22 int n = good->n;
H A Dcxx0x-deleted-default-ctor.cpp46 struct good : non_trivial { struct in inherits:non_trivial
49 good g;
52 const good g; // expected-note {{field 'g' of const-qualified type 'const good' would not be initialized}}
H A Dvirtual-override.cpp237 X1<0, 0> good; member in namespace:type_dependent_covariance
H A Dcxx1y-variable-templates_top_level.cpp24 void good() { function in namespace:use_in_top_level_funcs
179 namespace good { namespace in namespace:explicit_specialization
/external/testng/src/test/java/test/override/
H A DOverrideSampleTest.java8 public void good() { method in class:OverrideSampleTest
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
H A Dplatform_CryptohomeMigrateKey.py12 def good(self): member in class:platform_CryptohomeMigrateKey
18 raise error.TestFail('Could not create good user.')
20 raise error.TestFail('Could not unmount good user.')
22 raise error.TestFail('Could not migrate good user.')
26 raise error.TestFail('Could not mount good user.')
28 raise error.TestFail('Could not unmount good user.')
52 self.good()
/external/clang/test/CXX/temp/temp.spec/
H A Dno-body.cpp11 namespace good { namespace
/external/autotest/cli/
H A Dcompose_query46 good = data_point.status_count.get(good_status, 0) variable
48 line.append('%5d / %-5d' % (good, total))
/external/doclava/src/com/google/doclava/
H A DLinkReference.java59 public boolean good; field in class:LinkReference
433 result.good = true;
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
H A DCertificateFactory_ImplTest.java231 private static String[][] good = { field in class:CertificateFactory_ImplTest
307 for (int i = 0; i < good.length; i++) {
309 (good[i][0] + x509crl + good[i][1]).getBytes("UTF-8"));
322 (good[0][0] + bad_content[i] + good[0][1]).getBytes("UTF-8"));
408 data[pem_x509] = (good[0][0] + x509crl + good[0][1] + "\n").getBytes("UTF-8");
410 data[pem_pkcs] = (good[0][0] + pkcs7so + good[
[all...]
/external/clang/lib/AST/
H A DComment.cpp37 struct good {}; struct in namespace:clang::comments::__anon967
41 good implements_child_begin_end(Comment::child_iterator (T::*)() const) {
42 return good();
52 (void) good(implements_child_begin_end(function))
151 // Defaults are should be good for declarations we don't handle explicitly.
/external/boringssl/src/crypto/cipher/
H A Dtls_cbc.c78 unsigned padding_length, good, to_check, i; local
88 good = constant_time_ge(in_len, overhead + padding_length);
108 good &= ~(mask & (padding_length ^ b));
112 * one or more of the lower eight bits of |good| will be cleared. */
113 good = constant_time_eq(0xff, good & 0xff);
117 * and returned -1, distinguishing good MAC and bad padding from bad MAC and
119 padding_length = good & (padding_length + 1);
122 return constant_time_select_int(good, 1, -1);
H A De_tls.c339 unsigned good = constant_time_eq_int(CRYPTO_memcmp(record_mac, mac, mac_len), local
341 good &= constant_time_eq_int(padding_ok, 1);
342 if (!good) {
/external/opencv3/modules/imgproc/src/
H A Dfeatureselect.cpp193 bool good = true; local
223 good = false;
232 if (good)
337 bool good = true; local
367 good = false;
376 if (good)
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c896 int good = 0, revoked = 0; local
942 good++;
948 else if (good)
974 * of the trusted certificates has a good status. If not,
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c896 int good = 0, revoked = 0; local
942 good++;
948 else if (good)
974 * of the trusted certificates has a good status. If not,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c896 int good = 0, revoked = 0; local
942 good++;
948 else if (good)
974 * of the trusted certificates has a good status. If not,
/external/jsoncpp/src/lib_json/
H A Djson_reader.cpp870 bool Reader::good() const { function in class:Json::Reader
/external/opencv3/modules/calib3d/src/
H A Drho.cpp309 int good; /* Good/bad flag */ member in struct:cv::RHO_HEST_REFC::__anon15096
1000 eval.good = 1;
1394 * Writes (direct): ctrl.numModels, curr.numInl, eval.Ntested, eval.good,
1414 eval.good = 1;
1418 for(i=0;i<arg.N && eval.good;i++){
1446 eval.good = lambda <= eval.A;
1447 /* If !good, the threshold A was exceeded, so we're rejecting */
1459 * Reads (direct): eval.good, curr.numInl, arg.N, eval.Ntested, eval.delta
1466 if(eval.good){
1489 * consistent with a good mode
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl_ocsp.c110 * good [0] IMPLICIT NULL,
117 ASN1_NULL *good; member in union:__anon21425::__anon21426
187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0),
744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good");
829 "OpenSSL: OCSP response did not indicate good status");
834 /* OCSP response indicated the certificate is good. */
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl_ocsp.c110 * good [0] IMPLICIT NULL,
117 ASN1_NULL *good; member in union:__anon21687::__anon21688
187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0),
744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good");
829 "OpenSSL: OCSP response did not indicate good status");
834 /* OCSP response indicated the certificate is good. */
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl_ocsp.c110 * good [0] IMPLICIT NULL,
117 ASN1_NULL *good; member in union:__anon21947::__anon21948
187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0),
744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good");
829 "OpenSSL: OCSP response did not indicate good status");
834 /* OCSP response indicated the certificate is good. */
/external/boringssl/src/ssl/
H A Ds3_srvr.c1614 uint8_t good = constant_time_eq_int_8(decrypt_buf[0], 0) & local
1618 good &= ~constant_time_is_zero_8(decrypt_buf[i]);
1620 good &= constant_time_is_zero_8(decrypt_buf[padding_len - 1]);
1624 good &= constant_time_eq_8(decrypt_buf[padding_len],
1626 good &= constant_time_eq_8(decrypt_buf[padding_len + 1],
1630 * premaster based on |good|. */
1633 good, decrypt_buf[padding_len + i], premaster_secret[i]);

Completed in 1174 milliseconds

123