/external/icu4c/test/cintltst/ |
crestst.h | 52 int32_t pass; variable
|
/external/openssh/ |
auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 68 if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
|
/external/llvm/lib/CodeGen/ |
Spiller.cpp | 52 MachineFunctionPass *pass; member in class:__anon8981::SpillerBase 62 SpillerBase(MachineFunctionPass &pass, MachineFunction &mf, VirtRegMap &vrm) 63 : pass(&pass), mf(&mf), vrm(&vrm) 65 lis = &pass.getAnalysis<LiveIntervals>(); 172 TrivialSpiller(MachineFunctionPass &pass, MachineFunction &mf, 174 : SpillerBase(pass, mf, vrm) {} 186 llvm::Spiller* llvm::createSpiller(MachineFunctionPass &pass, 190 case trivial: return new TrivialSpiller(pass, mf, vrm); 191 case inline_: return createInlineSpiller(pass, mf, vrm) [all...] |
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 121 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 128 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 158 const char *pass, int passlen, 173 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
|
p12_p8e.c | 64 const char *pass, int passlen, 86 pass, passlen, p8inf, 1);
|
p12_crpt.c | 69 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
/external/openssl/include/openssl/ |
pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
/cts/tests/tests/graphics/src/android/graphics/drawable/cts/ |
InsetDrawableTest.java | 41 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 50 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 80 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 87 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 102 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 117 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 133 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 144 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 186 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 195 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); [all...] |
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
MyKeyManagerFactorySpi.java | 75 public Parameters (KeyStore ks, char[] pass) { 77 this.passWD = pass;
|
/external/openssh/regress/ |
sftp-batch.sh | 12 cat << EOF > ${BATCH}.pass.1 19 cat << EOF > ${BATCH}.pass.2 40 ${SFTP} -b ${BATCH}.pass.1 -D ${SFTPSERVER} >/dev/null 2>&1 \ 48 ${SFTP} -b ${BATCH}.pass.2 -D ${SFTPSERVER} >/dev/null 2>&1 \
|
/cts/tests/tests/webkitsecurity/assets/ |
bad-handshake-crash_wsh.py | 18 pass
|
/external/icu4c/test/intltest/ |
jamotest.h | 46 const UnicodeString& summary, UBool pass,
|
restest.h | 51 int32_t pass; member in class:ResourceBundleTest
|
restsnew.h | 54 int32_t pass; member in class:NewResourceBundleTest
|
normconf.cpp | 301 UBool pass = TRUE, result; local 313 pass &= assertEqual("C", field[i], out, field[1], "c2!=C(c", fieldNum); 315 pass &= assertEqual("C(+1)", field[i], out, field[1], "c2!=C(c", fieldNum); 317 pass &= assertEqual("C(-1)", field[i], out, field[1], "c2!=C(c", fieldNum); 324 pass &= assertEqual("D", field[i], out, field[2], "c3!=D(c", fieldNum); 326 pass &= assertEqual("D(+1)", field[i], out, field[2], "c3!=D(c", fieldNum); 328 pass &= assertEqual("D(-1)", field[i], out, field[2], "c3!=D(c", fieldNum); 335 pass &= assertEqual("KC", field[i], out, field[3], "c4!=KC(c", fieldNum); 337 pass &= assertEqual("KC(+1)", field[i], out, field[3], "c4!=KC(c", fieldNum); 339 pass &= assertEqual("KC(-1)", field[i], out, field[3], "c4!=KC(c", fieldNum) [all...] |
/external/webkit/Tools/QueueStatusServer/handlers/ |
updatebase.py | 40 pass
|
/external/webkit/Tools/Scripts/webkitpy/common/system/ |
zipfileset_mock.py | 45 pass
|
/device/ti/panda/audio/test/ |
music-monkey.py | 79 pass 82 pass 87 pass
|
/external/e2fsprogs/contrib/ |
make-sparse.c | 26 int pass = 0; local 36 if (pass++ >= 3) 40 pass = 0;
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 80 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 97 if(!pass) 100 passlen = strlen(pass); 114 if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL) 125 HMAC(digest, pass, passlen, 137 h__dump (pass, passlen); 147 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 172 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 223 rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen [all...] |
/external/webkit/Source/JavaScriptCore/tests/mozilla/ecma_2/RegExp/ |
regexp-enumerate-001.js | 67 var pass = false; 70 pass = true; 78 pass );
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
xmppclientsettings.h | 45 void set_pass(const talk_base::CryptString & pass) { pass_ = pass; } 56 const talk_base::CryptString & pass() const { return pass_; } function in class:buzz::XmppUserSettings 92 void set_proxy_pass(const talk_base::CryptString & pass) { proxy_pass_ = pass; }
|
/external/clang/lib/ARCMigrate/ |
TransAPIUses.cpp | 31 MigrationPass &Pass; 38 APIChecker(MigrationPass &pass) : Pass(pass) { 39 SelectorTable &sels = Pass.Ctx.Selectors; 40 IdentifierTable &ids = Pass.Ctx.Idents; 82 Pass.TA.reportError(err, parm->getLocStart(), parm->getSourceRange()); 91 Pass.TA.hasDiagnostic(diag::err_unavailable, 95 Transaction Trans(Pass.TA); 96 Pass.TA.clearDiagnostic(diag::err_unavailable [all...] |
/cts/tests/tests/text/src/android/text/style/cts/ |
ImageSpanTest.java | 43 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 58 new ImageSpan(mContext, R.drawable.pass); 59 new ImageSpan(mContext, R.drawable.pass, DynamicDrawableSpan.ALIGN_BOTTOM); 60 new ImageSpan(mContext, R.drawable.pass, DynamicDrawableSpan.ALIGN_BASELINE); 73 Drawable d = mContext.getResources().getDrawable(R.drawable.pass); 88 Drawable drawable = mContext.getResources().getDrawable(R.drawable.pass); 94 imageSpan = new ImageSpan(mContext, R.drawable.pass);
|