/external/opencv/cv/src/ |
cvpgh.cpp | 158 int i, count, pass; local 207 for( pass = 1; pass <= 2; pass++ ) 227 if( pass == 2 ) 247 if( pass == 2 ) 267 if( pass == 2 ) 294 else /* 1st pass */ 303 if( pass == 1 ) 312 if( pass == 1 [all...] |
/external/clang/lib/ARCMigrate/ |
TransRetainReleaseDealloc.cpp | 36 MigrationPass &Pass; 44 RetainReleaseDeallocRemover(MigrationPass &pass) 45 : Body(0), Pass(pass) { 47 Pass.Ctx.Selectors.getNullarySelector(&Pass.Ctx.Idents.get("delegate")); 49 Pass.Ctx.Selectors.getNullarySelector(&Pass.Ctx.Idents.get("finalize")); 71 Pass.TA.reportError("it is not safe to remove an unused 'autorelease' " 76 // Pass through [all...] |
TransZeroOutPropsInDealloc.cpp | 29 MigrationPass &Pass; 37 ZeroOutInDeallocRemover(MigrationPass &pass) : Pass(pass), SelfD(0) { 39 Pass.Ctx.Selectors.getNullarySelector(&Pass.Ctx.Idents.get("finalize")); 43 ASTContext &Ctx = Pass.Ctx; 44 TransformActions &TA = Pass.TA; 83 Transaction Trans(Pass.TA); 84 Pass.TA.removeStmt(POE) [all...] |
TransAutoreleasePool.cpp | 71 AutoreleasePoolRewriter(MigrationPass &pass) 72 : Body(0), Pass(pass) { 73 PoolII = &pass.Ctx.Idents.get("NSAutoreleasePool"); 74 DrainSel = pass.Ctx.Selectors.getNullarySelector( 75 &pass.Ctx.Idents.get("drain")); 112 Transaction Trans(Pass.TA); 115 Pass.TA.removeStmt(info.Dcl); 126 Pass.TA.replaceStmt(*scope.Begin, "@autoreleasepool {"); 127 Pass.TA.removeStmt(*scope.End) [all...] |
/external/openssl/apps/ |
apps.h | 247 const char *pass, ENGINE *e, const char *cert_descrip); 249 const char *pass, ENGINE *e, const char *key_descrip); 251 const char *pass, ENGINE *e, const char *key_descrip); 253 const char *pass, ENGINE *e, const char *cert_descrip); 255 const char *pass, ENGINE *e, const char *cert_descrip);
|
genpkey.c | 87 char *pass = NULL; local 115 else if (!strcmp(*args,"-pass")) 203 BIO_printf(bio_err, "-pass arg output file pass phrase source\n"); 218 if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) 270 NULL, pass); 309 if (pass) 310 OPENSSL_free(pass);
|
pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 84 int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, 86 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass); 106 char pass[50], macpass[50]; local 326 BIO_printf (bio_err, "-passin p input file pass phrase source\n"); 327 BIO_printf (bio_err, "-passout p output file pass phrase source\n"); 362 cpass = pass; 571 EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) 576 if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass) [all...] |
/external/chromium/testing/gmock/scripts/generator/cpp/ |
ast.py | 190 pass 194 pass 313 pass 317 pass 356 pass 524 pass 640 pass # Just don't add to type_modifiers. [all...] |
/external/libvpx/vp8/encoder/ |
ratectrl.c | 346 if (cpi->pass == 2) 348 cpi->this_frame_target = cpi->per_frame_bandwidth; // New Two pass RC 373 if (cpi->pass != 2) 375 // For now Alt ref is not allowed except in 2 pass modes. 425 // Not two pass 426 if (cpi->pass != 2) 428 // Single Pass lagged mode: TBD 433 // Single Pass compression: Has to use current and historical data 505 // Apply an upper limit based on Q for 1 pass encodes 506 if (Boost > kf_gf_boost_qlimits[Q] && (cpi->pass == 0) [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/location/ |
LocationVerifier.java | 80 pass(); method 167 private void pass() { method in class:LocationVerifier 169 mCb.pass();
|
/external/e2fsprogs/util/ |
copy_sparse.c | 68 int pass = 0; local 78 if (pass++ >= 3) 82 pass = 0;
|
/external/linux-tools-perf/scripts/python/ |
sched-migration.py | 373 pass 378 pass 383 pass 388 pass 393 pass 398 pass 403 pass 408 pass 447 pass 452 pass [all...] |
/external/openssh/ |
readpass.c | 55 char *pass; local 107 pass = xstrdup(buf); 109 return pass;
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
call_main.cc | 212 // will get input from the console, parse it, and pass the appropriate 281 talk_base::InsecureCryptStringImpl pass; local 285 pass.password() = argv[2]; 304 if (pass.password().empty() && !test_server) { 307 std::cin >> pass.password(); 323 pass.password() = jid.node(); 326 xcs.set_pass(talk_base::CryptString(pass));
|
/external/e2fsprogs/resize/ |
resize2fs.h | 108 errcode_t (*progress)(ext2_resize_t rfs, int pass, 115 * Progress pass numbers... 127 int pass, unsigned long cur,
|
/external/llvm/utils/ |
findmisopt | 78 opt_switches=`llvm-as < /dev/null -o - | opt -std-compile-opts -disable-output -debug-pass=Arguments 2>&1 | sed 's/Pass Arguments: //'` 79 ld_switches=`llvm-as < /dev/null -o - | llvm-ld - -debug-pass=Arguments 2>&1 | sed 's/Pass Arguments: //'` 161 echo "Found required early pass: $trimmed" 169 echo "findmisopt: All optimizations pass. Perhaps this isn't a misopt?"
|
/external/regex-re2/re2/ |
make_unicode_casefold.py | 93 pass 95 pass
|
/external/valgrind/main/exp-sgcheck/tests/ |
hackedbz2.stdout.exp | 5 pass 1: size is 17143, grp uses are 38 62 2 92 6 71 6 pass 2: size is 6506, grp uses are 28 71 0 86 9 77 7 pass 3: size is 6479, grp uses are 26 70 0 81 11 83 8 pass 4: size is 6469, grp uses are 26 69 0 74 17 85
|
/external/valgrind/main/memcheck/tests/ |
origin5-bz2.stdout.exp | 6 pass 1: size is 17143, grp uses are 38 62 2 92 6 71 7 pass 2: size is 6506, grp uses are 28 71 0 86 9 77 8 pass 3: size is 6479, grp uses are 26 70 0 81 11 83 9 pass 4: size is 6469, grp uses are 26 69 0 74 17 85
|
vcpu_bz2.stdout.exp | 5 pass 1: size is 17143, grp uses are 38 62 2 92 6 71 6 pass 2: size is 6506, grp uses are 28 71 0 86 9 77 7 pass 3: size is 6479, grp uses are 26 70 0 81 11 83 8 pass 4: size is 6469, grp uses are 26 69 0 74 17 85
|
/external/webkit/Tools/Scripts/ |
run-javascriptcore-tests | 63 Usage: $programName [options] [options to pass to build system] 65 --jsDriver-args= A string of arguments to pass to jsDriver.pl
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
KeyManagerFactorySpiTest.java | 143 public Parameters (char[] pass) { 144 this.passWD = pass;
|
/external/libselinux/src/ |
label_file.c | 279 char *line_buf, int pass, unsigned lineno) 315 if (pass == 1) { 316 /* On the second pass, process and store the specification in spec. */ 399 unsigned int lineno, pass, i, j, maxnspec; local 440 * The first pass counts the number of specifications and 442 * of the first pass, the spec array is allocated. 443 * The second pass performs detailed validation of the input 447 for (pass = 0; pass < 2; pass++) [all...] |
/external/checkpolicy/ |
policy_parse.y | 57 extern unsigned int pass; 156 base_policy : { if (define_policy(pass, 0) == -1) return -1; } 158 { if (pass == 1) { if (policydb_index_classes(policydbp)) return -1; } 159 else if (pass == 2) { if (policydb_index_others(NULL, policydbp, 0)) return -1; }} 161 { if (pass == 1) { if (policydb_index_bools(policydbp)) return -1;} 162 else if (pass == 2) { if (policydb_index_others(NULL, policydbp, 0)) return -1;}} 311 { if (pass == 2) { if (define_conditional((cond_expr_t*)$2, (avrule_t*)$4, (avrule_t*)$6) < 0) return -1; }} 784 { if (end_avrule_block(pass) == -1) return -1; 789 { if (define_policy(pass, 1) == -1) return -1; } 818 { if (require_class(pass)) return -1; [all...] |
/external/libpng/ |
pngread.c | 619 png_debug2(1, "in png_read_row (row %lu, pass %d)", 620 png_ptr->row_number, png_ptr->pass); 624 if (png_ptr->row_number == 0 && png_ptr->pass == 0) 662 switch (png_ptr->pass) 669 png_pass_dsp_mask[png_ptr->pass]); 679 png_pass_dsp_mask[png_ptr->pass]); 689 png_pass_dsp_mask[png_ptr->pass]); 699 png_pass_dsp_mask[png_ptr->pass]); 709 png_pass_dsp_mask[png_ptr->pass]); 719 png_pass_dsp_mask[png_ptr->pass]); 1075 int pass, j; local [all...] |