/external/valgrind/main/none/tests/ppc32/ |
xlc_dbl_u32.stdout.exp | 0 pass
|
/system/core/fastboot/ |
p12topem.sh | 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
|
genkey.sh | 5 echo "Usage: $0 alias \"pass phrase\"" 11 openssl genrsa -3 -out $1.pem -passout pass:"$2" 2048 14 openssl req -new -x509 -key $1.pem -passin pass:"$2" \ 20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \ 21 -out $1.p12 -name $1 -passout pass:"$2"
|
signfile.sh | 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
|
/external/checkpolicy/ |
module_compiler.h | 21 int define_policy(int pass, int module_header_given); 54 int require_class(int pass); 55 int require_role(int pass); 56 int require_type(int pass); 57 int require_attribute(int pass); 58 int require_attribute_role(int pass); 59 int require_user(int pass); 60 int require_bool(int pass); 61 int require_tunable(int pass); 62 int require_sens(int pass); [all...] |
/external/openssl/crypto/pkcs12/ |
p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/testdata/handlers/sub/ |
exception_in_transfer_wsh.py | 36 pass
|
no_wsh_at_the_end.py | 36 pass
|
plain_wsh.py | 32 pass
|
wrong_handshake_sig_wsh.py | 36 pass
|
wrong_transfer_sig_wsh.py | 36 pass
|
/external/llvm/lib/CodeGen/ |
Spiller.h | 35 Spiller* createSpiller(MachineFunctionPass &pass, 41 Spiller *createInlineSpiller(MachineFunctionPass &pass,
|
/external/webkit/LayoutTests/fast/js/resources/ |
js-test-post-function.js | 4 debug('<br><span class="pass">TEST COMPLETE</span>');
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSPasswordProtectionTest.java | 55 char [] pass = {'a', 'b', 'c'}; local 56 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass); 59 assertEquals("Incorrect password length", pass.length, rPass.length); 60 for (int i = 0; i < pass.length; i++) { 62 .concat(")"), pass[i], rPass[i]);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPasswordProtectionTest.java | 48 char [] pass = {'a', 'b', 'c'}; local 49 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass); 52 assertEquals("Incorrect password length", pass.length, rPass.length); 53 for (int i = 0; i < pass.length; i++) { 55 .concat(")"), pass[i], rPass[i]);
|
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
TestCase.java | 34 private boolean pass; field in class:TestCase 37 return pass; 41 pass = value;
|
/external/protobuf/python/google/protobuf/internal/ |
message_listener.py | 78 pass
|
/external/webkit/Tools/Scripts/webkitpy/common/ |
newstringio.py | 40 pass
|
/frameworks/rs/java/tests/RSTest_CompatLib/src/com/android/rs/test/ |
copy_test.rs | 19 void sendResult(bool pass) { 20 if (pass) {
|
/frameworks/rs/java/tests/RsTest/src/com/android/rs/test/ |
copy_test.rs | 19 void sendResult(bool pass) { 20 if (pass) {
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/port/ |
dryrun.py | 41 (check_build() and check_sys_deps() must pass and auxiliary binaries 45 tests are either SKIPPED or expected to PASS.""" 73 pass 76 pass 85 pass 88 pass 91 pass 94 pass 97 pass 100 pass [all...] |
/ndk/sources/cxx-stl/llvm-libc++/test/ |
testit | 65 PASS=0 73 pass=0 83 let "pass+=1" 88 if (ls *.pass.cpp &> /dev/null) 90 for FILE in $(ls *.pass.cpp); do 96 let "pass+=1" 116 if [ $pass -gt 0 ] 118 echo "passed $pass tests in `pwd`" 124 if [ $fail -eq 0 -a $pass -eq 0 ] 131 let "PASS+=$pass [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_base.py | 53 pass 61 pass 70 pass 79 pass 87 pass
|
/external/clang/lib/ARCMigrate/ |
TransARCAssign.cpp | 36 MigrationPass &Pass; 40 ARCAssignChecker(MigrationPass &pass) : Pass(pass) { } 51 ASTContext &Ctx = Pass.Ctx; 57 Transaction Trans(Pass.TA); 58 if (Pass.TA.clearDiagnostic(diag::err_typecheck_arr_assign_enumeration, 62 Pass.TA.insert(TLoc.getBeginLoc(), "__strong "); 75 void trans::makeAssignARCSafe(MigrationPass &pass) { 76 ARCAssignChecker assignCheck(pass); [all...] |
TransUnusedInitDelegate.cpp | 36 MigrationPass &Pass; 41 UnusedInitRewriter(MigrationPass &pass) 42 : Body(0), Pass(pass) { } 53 Pass.TA.hasDiagnostic(diag::err_arc_unused_init_message, 55 Transaction Trans(Pass.TA); 56 Pass.TA.clearDiagnostic(diag::err_arc_unused_init_message, 59 Pass.TA.insert(ExprRange.getBegin(), "if (!(self = "); 61 retStr += getNilString(Pass.Ctx); 62 Pass.TA.insertAfterToken(ExprRange.getEnd(), retStr) [all...] |