/external/dropbear/ |
keyimport.h | 38 int filetype); 39 sign_key *import_read(const char *filename, char *passphrase, int filetype); 40 int import_encrypted(const char* filename, int filetype);
|
keyimport.c | 67 int import_encrypted(const char* filename, int filetype) { 69 if (filetype == KEYFILE_OPENSSH) { 72 } else if (filetype == KEYFILE_SSHCOM) { 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { 81 if (filetype == KEYFILE_OPENSSH) { 83 } else if (filetype == KEYFILE_DROPBEAR) { 86 } else if (filetype == KEYFILE_SSHCOM) { 94 int filetype) { 96 if (filetype == KEYFILE_OPENSSH) { 98 } else if (filetype == KEYFILE_DROPBEAR) [all...] |
/external/e2fsprogs/misc/ |
mke2fs.conf | 2 base_features = sparse_super,filetype,resize_inode,dir_index,ext_attr
|
/external/e2fsprogs/lib/ext2fs/ |
newdir.c | 35 int filetype = 0; local 49 filetype = EXT2_FT_DIR << 8; 54 dir->name_len = 1 | filetype; 65 dir->name_len = 2 | filetype;
|
/external/e2fsprogs/e2fsck/ |
rehash.c | 470 int filetype = 0; local 473 filetype = EXT2_FT_DIR << 8; 479 dir->name_len = 1 | filetype; 485 dir->name_len = 2 | filetype;
|
pass2.c | 477 * Check the directory filetype (if present) 484 int filetype = dirent->name_len >> 8; local 490 if (filetype == 0 || 511 if (filetype == should_be) 515 if (fix_problem(ctx, filetype ? PR_2_BAD_FILETYPE : PR_2_SET_FILETYPE, [all...] |
/external/e2fsprogs/debugfs/ |
debugfs.c | 1369 int filetype, nr; local [all...] |
/external/protobuf/editors/ |
proto.vim | 38 " augroup filetype
|
/external/qemu/android/ |
main.c | 1850 const char* filetype = "file"; local [all...] |
/external/libvpx/build/make/ |
obj_int_extract.c | 79 if (header.filetype != MH_OBJECT) 81 log_msg("Bad filetype for object file. Currently only tested for MH_OBJECT.\n");
|