/external/valgrind/memcheck/tests/ |
H A D | execve1.c | 7 char* good[1] = { NULL }; local 10 execve("/bin/true", good, good);
|
/external/clang/test/SemaCXX/ |
H A D | function-pointer-arguments.cpp | 9 void good() { function in namespace:PR16570
|
H A D | operator-arrow-depth.cpp | 21 A<MAX/2> good; variable 22 int n = good->n;
|
H A D | cxx0x-deleted-default-ctor.cpp | 46 struct good : non_trivial { struct in inherits:non_trivial 49 good g; 52 const good g; // expected-note {{field 'g' of const-qualified type 'const good' would not be initialized}}
|
H A D | virtual-override.cpp | 237 X1<0, 0> good; member in namespace:type_dependent_covariance
|
H A D | cxx1y-variable-templates_top_level.cpp | 24 void good() { function in namespace:use_in_top_level_funcs 179 namespace good { namespace in namespace:explicit_specialization
|
/external/testng/src/test/java/test/override/ |
H A D | OverrideSampleTest.java | 8 public void good() { method in class:OverrideSampleTest
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
H A D | platform_CryptohomeMigrateKey.py | 12 def good(self): member in class:platform_CryptohomeMigrateKey 18 raise error.TestFail('Could not create good user.') 20 raise error.TestFail('Could not unmount good user.') 22 raise error.TestFail('Could not migrate good user.') 26 raise error.TestFail('Could not mount good user.') 28 raise error.TestFail('Could not unmount good user.') 52 self.good()
|
/external/clang/test/CXX/temp/temp.spec/ |
H A D | no-body.cpp | 11 namespace good { namespace
|
/external/autotest/cli/ |
H A D | compose_query | 46 good = data_point.status_count.get(good_status, 0) variable 48 line.append('%5d / %-5d' % (good, total))
|
/external/doclava/src/com/google/doclava/ |
H A D | LinkReference.java | 59 public boolean good; field in class:LinkReference 433 result.good = true;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory_ImplTest.java | 231 private static String[][] good = { field in class:CertificateFactory_ImplTest 307 for (int i = 0; i < good.length; i++) { 309 (good[i][0] + x509crl + good[i][1]).getBytes("UTF-8")); 322 (good[0][0] + bad_content[i] + good[0][1]).getBytes("UTF-8")); 408 data[pem_x509] = (good[0][0] + x509crl + good[0][1] + "\n").getBytes("UTF-8"); 410 data[pem_pkcs] = (good[0][0] + pkcs7so + good[ [all...] |
/external/clang/lib/AST/ |
H A D | Comment.cpp | 37 struct good {}; struct in namespace:clang::comments::__anon967 41 good implements_child_begin_end(Comment::child_iterator (T::*)() const) { 42 return good(); 52 (void) good(implements_child_begin_end(function)) 151 // Defaults are should be good for declarations we don't handle explicitly.
|
/external/boringssl/src/crypto/cipher/ |
H A D | tls_cbc.c | 78 unsigned padding_length, good, to_check, i; local 88 good = constant_time_ge(in_len, overhead + padding_length); 108 good &= ~(mask & (padding_length ^ b)); 112 * one or more of the lower eight bits of |good| will be cleared. */ 113 good = constant_time_eq(0xff, good & 0xff); 117 * and returned -1, distinguishing good MAC and bad padding from bad MAC and 119 padding_length = good & (padding_length + 1); 122 return constant_time_select_int(good, 1, -1);
|
H A D | e_tls.c | 339 unsigned good = constant_time_eq_int(CRYPTO_memcmp(record_mac, mac, mac_len), local 341 good &= constant_time_eq_int(padding_ok, 1); 342 if (!good) {
|
/external/opencv3/modules/imgproc/src/ |
H A D | featureselect.cpp | 193 bool good = true; local 223 good = false; 232 if (good) 337 bool good = true; local 367 good = false; 376 if (good)
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 896 int good = 0, revoked = 0; local 942 good++; 948 else if (good) 974 * of the trusted certificates has a good status. If not,
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 896 int good = 0, revoked = 0; local 942 good++; 948 else if (good) 974 * of the trusted certificates has a good status. If not,
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 896 int good = 0, revoked = 0; local 942 good++; 948 else if (good) 974 * of the trusted certificates has a good status. If not,
|
/external/jsoncpp/src/lib_json/ |
H A D | json_reader.cpp | 870 bool Reader::good() const { function in class:Json::Reader
|
/external/opencv3/modules/calib3d/src/ |
H A D | rho.cpp | 309 int good; /* Good/bad flag */ member in struct:cv::RHO_HEST_REFC::__anon15096 1000 eval.good = 1; 1394 * Writes (direct): ctrl.numModels, curr.numInl, eval.Ntested, eval.good, 1414 eval.good = 1; 1418 for(i=0;i<arg.N && eval.good;i++){ 1446 eval.good = lambda <= eval.A; 1447 /* If !good, the threshold A was exceeded, so we're rejecting */ 1459 * Reads (direct): eval.good, curr.numInl, arg.N, eval.Ntested, eval.delta 1466 if(eval.good){ 1489 * consistent with a good mode [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl_ocsp.c | 110 * good [0] IMPLICIT NULL, 117 ASN1_NULL *good; member in union:__anon21425::__anon21426 187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0), 744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good"); 829 "OpenSSL: OCSP response did not indicate good status"); 834 /* OCSP response indicated the certificate is good. */
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl_ocsp.c | 110 * good [0] IMPLICIT NULL, 117 ASN1_NULL *good; member in union:__anon21687::__anon21688 187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0), 744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good"); 829 "OpenSSL: OCSP response did not indicate good status"); 834 /* OCSP response indicated the certificate is good. */
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl_ocsp.c | 110 * good [0] IMPLICIT NULL, 117 ASN1_NULL *good; member in union:__anon21947::__anon21948 187 ASN1_IMP(CertStatus, value.good, ASN1_NULL, 0), 744 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: good"); 829 "OpenSSL: OCSP response did not indicate good status"); 834 /* OCSP response indicated the certificate is good. */
|
/external/boringssl/src/ssl/ |
H A D | s3_srvr.c | 1614 uint8_t good = constant_time_eq_int_8(decrypt_buf[0], 0) & local 1618 good &= ~constant_time_is_zero_8(decrypt_buf[i]); 1620 good &= constant_time_is_zero_8(decrypt_buf[padding_len - 1]); 1624 good &= constant_time_eq_8(decrypt_buf[padding_len], 1626 good &= constant_time_eq_8(decrypt_buf[padding_len + 1], 1630 * premaster based on |good|. */ 1633 good, decrypt_buf[padding_len + i], premaster_secret[i]);
|