/external/icu4c/test/intltest/ |
D | wbnf.cpp | 1506 UBool pass; in TestVariable() local 1507 pass = strcmp(var1.next(), value->next()) == 0; in TestVariable() 1508 pass = pass && strcmp(var2.next(), value2->next()) == 0; in TestVariable() 1509 pass = pass && strcmp(var3.next(), value3->next()) == 0; in TestVariable() 1510 return pass; in TestVariable() 1522 UBool pass; in TestSymbolTable() local 1523 pass = t.find(NULL) == SymbolTable::EMPTY; in TestSymbolTable() 1524 pass = pass && t.find("ccc") == SymbolTable::NO_VAR; in TestSymbolTable() 1525 pass = pass && t.find("bbb") == SymbolTable::NO_REF; in TestSymbolTable() 1526 pass = pass && t.find("abc") == SymbolTable::HAS_REF; in TestSymbolTable() [all …]
|
D | normconf.cpp | 300 UBool pass = TRUE, result; in checkConformance() local 309 pass &= assertEqual("C", field[i], out, field[1], "c2!=C(c", fieldNum); in checkConformance() 311 pass &= assertEqual("C(+1)", field[i], out, field[1], "c2!=C(c", fieldNum); in checkConformance() 313 pass &= assertEqual("C(-1)", field[i], out, field[1], "c2!=C(c", fieldNum); in checkConformance() 316 pass &= assertEqual("D", field[i], out, field[2], "c3!=D(c", fieldNum); in checkConformance() 318 pass &= assertEqual("D(+1)", field[i], out, field[2], "c3!=D(c", fieldNum); in checkConformance() 320 pass &= assertEqual("D(-1)", field[i], out, field[2], "c3!=D(c", fieldNum); in checkConformance() 323 pass &= assertEqual("KC", field[i], out, field[3], "c4!=KC(c", fieldNum); in checkConformance() 325 pass &= assertEqual("KC(+1)", field[i], out, field[3], "c4!=KC(c", fieldNum); in checkConformance() 327 pass &= assertEqual("KC(-1)", field[i], out, field[3], "c4!=KC(c", fieldNum); in checkConformance() [all …]
|
/external/openssl/crypto/pkcs12/ |
D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 73 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 113 if(!pass || !*pass) { in PKCS12_parse() 114 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; in PKCS12_parse() 115 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; in PKCS12_parse() 120 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca)) in PKCS12_parse() 144 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument [all …]
|
D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, [all …]
|
D | p12_add.c | 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, in PKCS12_MAKE_SHKEYBAG() argument 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, in PKCS12_MAKE_SHKEYBAG() 161 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 184 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, in PKCS12_pack_p7encdata() 193 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) in STACK_OF() 198 pass, passlen, in STACK_OF() 202 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, in PKCS12_decrypt_skey() argument 205 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
|
D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, in PKCS12_pbe_crypt() argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt() 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) in PKCS12_item_decrypt_d2i() argument 121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i() 151 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument 166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
|
D | p12_crt.c | 66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, in PKCS12_create() argument 117 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) in PKCS12_create() 126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); in PKCS12_create() 159 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create() 218 int nid_key, char *pass) in PKCS12_add_key() argument 231 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); in PKCS12_add_key() 255 int nid_safe, int iter, char *pass) in PKCS12_add_safe() argument 276 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0, in PKCS12_add_safe()
|
D | p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 84 if(!pass) { in PKCS12_key_gen_asc() 87 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc() 100 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument 115 if (!pass) { in PKCS12_key_gen_uni() 126 h__dump(pass, passlen); in PKCS12_key_gen_uni() 149 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
|
D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac() 105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 113 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { in PKCS12_verify_mac() 124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() argument 136 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { in PKCS12_set_mac()
|
/external/icu4c/test/testdata/ |
D | idna_conf.txt | 9 passfail: pass 20 passfail: pass 31 passfail: pass 42 passfail: pass 53 passfail: pass 64 passfail: pass 75 passfail: pass 86 passfail: pass 97 passfail: pass 108 passfail: pass [all …]
|
/external/openssl/include/openssl/ |
D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, [all …]
|
/external/qemu/distrib/libpng-1.2.19/ |
D | pnggccrd.c | 1126 png_uint_32 initial_val = BPP3 * png_pass_start[png_ptr->pass]; in png_combine_row() 1128 register int stride = BPP3 * png_pass_inc[png_ptr->pass]; in png_combine_row() 1130 register int rep_bytes = BPP3 * png_pass_width[png_ptr->pass]; in png_combine_row() 1299 png_uint_32 initial_val = BPP4 * png_pass_start[png_ptr->pass]; in png_combine_row() 1301 register int stride = BPP4 * png_pass_inc[png_ptr->pass]; in png_combine_row() 1303 register int rep_bytes = BPP4 * png_pass_width[png_ptr->pass]; in png_combine_row() 1433 png_uint_32 initial_val = png_pass_start[png_ptr->pass]; in png_combine_row() 1435 register int stride = png_pass_inc[png_ptr->pass]; in png_combine_row() 1437 register int rep_bytes = png_pass_width[png_ptr->pass]; in png_combine_row() 1750 png_uint_32 initial_val = BPP2 * png_pass_start[png_ptr->pass]; in png_combine_row() [all …]
|
D | pngpread.c | 788 png_ptr->interlaced && png_ptr->pass > 6) || in png_process_IDAT_data() 833 if (png_ptr->pass < 6) in png_push_process_row() 840 switch (png_ptr->pass) in png_push_process_row() 845 for (i = 0; i < 8 && png_ptr->pass == 0; i++) in png_push_process_row() 850 if (png_ptr->pass == 2) /* pass 1 might be empty */ in png_push_process_row() 852 for (i = 0; i < 4 && png_ptr->pass == 2; i++) in png_push_process_row() 858 if (png_ptr->pass == 4 && png_ptr->height <= 4) in png_push_process_row() 860 for (i = 0; i < 2 && png_ptr->pass == 4; i++) in png_push_process_row() 866 if (png_ptr->pass == 6 && png_ptr->height <= 4) in png_push_process_row() 876 for (i = 0; i < 8 && png_ptr->pass == 1; i++) in png_push_process_row() [all …]
|
D | pngvcrd.c | 257 register int disp = png_pass_inc[png_ptr->pass]; in png_combine_row() 261 srcptr = png_ptr->row_buf + 1 + offset_table[png_ptr->pass]* in png_combine_row() 263 dstptr = row + offset_table[png_ptr->pass]*pixel_bytes; in png_combine_row() 264 initial_val = offset_table[png_ptr->pass]*pixel_bytes; in png_combine_row() 401 register int disp = png_pass_inc[png_ptr->pass]; in png_combine_row() 405 srcptr = png_ptr->row_buf + 1 + offset_table[png_ptr->pass]* in png_combine_row() 407 dstptr = row + offset_table[png_ptr->pass]*pixel_bytes; in png_combine_row() 408 initial_val = offset_table[png_ptr->pass]*pixel_bytes; in png_combine_row() 507 register int disp = png_pass_inc[png_ptr->pass]; in png_combine_row() 511 srcptr = png_ptr->row_buf + 1 + offset_table[png_ptr->pass]* in png_combine_row() [all …]
|
/external/libpng/ |
D | pngpread.c | 863 png_ptr->interlaced && png_ptr->pass > 6) || in png_process_IDAT_data() 909 if (png_ptr->pass < 6) in png_push_process_row() 916 switch (png_ptr->pass) in png_push_process_row() 921 for (i = 0; i < 8 && png_ptr->pass == 0; i++) in png_push_process_row() 927 if (png_ptr->pass == 2) /* Pass 1 might be empty */ in png_push_process_row() 929 for (i = 0; i < 4 && png_ptr->pass == 2; i++) in png_push_process_row() 936 if (png_ptr->pass == 4 && png_ptr->height <= 4) in png_push_process_row() 938 for (i = 0; i < 2 && png_ptr->pass == 4; i++) in png_push_process_row() 945 if (png_ptr->pass == 6 && png_ptr->height <= 4) in png_push_process_row() 957 for (i = 0; i < 8 && png_ptr->pass == 1; i++) in png_push_process_row() [all …]
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 91 if(!pass) passlen = 0; in PKCS5_PBKDF2_HMAC_SHA1() 92 else if(passlen == -1) passlen = strlen(pass); in PKCS5_PBKDF2_HMAC_SHA1() 103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL); in PKCS5_PBKDF2_HMAC_SHA1() 109 HMAC(EVP_sha1(), pass, passlen, in PKCS5_PBKDF2_HMAC_SHA1() 120 h__dump (pass, passlen); in PKCS5_PBKDF2_HMAC_SHA1() 147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key); in PKCS5_v2_PBE_keyivgen()
|
D | evp_pbe.c | 77 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 95 if(!pass) passlen = 0; in EVP_PBE_CipherInit() 96 else if (passlen == -1) passlen = strlen(pass); in EVP_PBE_CipherInit() 98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher, in EVP_PBE_CipherInit()
|
D | p5_crpt.c | 103 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 134 if(!pass) passlen = 0; in PKCS5_PBE_keyivgen() 135 else if(passlen == -1) passlen = strlen(pass); in PKCS5_PBE_keyivgen() 139 EVP_DigestUpdate(&ctx, pass, passlen); in PKCS5_PBE_keyivgen()
|
/external/ipsec-tools/src/racoon/ |
D | sainfo.c | 85 int pass = 1; variable 88 pass = 2; 120 "getsainfo pass #%i\n", pass); 131 if (pass == 2) 135 } else if (pass == 1) 155 if ((anonymous == NULL) && (pass == 1)) { 156 pass++;
|
/external/webkit/JavaScriptCore/API/tests/ |
D | testapi.js | 31 function pass(msg) function 52 pass(a + " should be " + b + " and is."); 63 pass(a + " threw: " + e); 107 pass("MyObject.myPropertyName was enumerated"); 112 pass("MyObject.regularType was enumerated");
|
/external/qemu/target-arm/ |
D | translate.c | 1182 static TCGv neon_load_reg(int reg, int pass) in neon_load_reg() argument 1185 tcg_gen_ld_i32(tmp, cpu_env, neon_reg_offset(reg, pass)); in neon_load_reg() 1189 static void neon_store_reg(int reg, int pass, TCGv var) in neon_store_reg() argument 1191 tcg_gen_st_i32(var, cpu_env, neon_reg_offset(reg, pass)); in neon_store_reg() 2757 int pass; in disas_vfp_insn() local 2766 pass = (insn >> 21) & 1; in disas_vfp_insn() 2779 tmp = neon_load_reg(rn, pass); in disas_vfp_insn() 2818 for (n = 0; n <= pass * 2; n++) { in disas_vfp_insn() 2828 tmp2 = neon_load_reg(rn, pass); in disas_vfp_insn() 2833 tmp2 = neon_load_reg(rn, pass); in disas_vfp_insn() [all …]
|
/external/openssl/apps/ |
D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 84 int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, 86 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char… 104 char pass[50], macpass[50]; in MAIN() local 367 cpass = pass; in MAIN() 573 EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) in MAIN() 578 if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass); in MAIN() 632 if(!noprompt && EVP_read_pw_string(pass, sizeof pass, "Enter Import Password:", 0)) { in MAIN() 640 if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass); in MAIN() 689 int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass, in dump_certs_keys_p12() argument [all …]
|
D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; in MAIN() local 314 p8pass = pass; in MAIN() 315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) in MAIN() 395 p8pass = pass; in MAIN() 396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0); in MAIN()
|
/external/e2fsprogs/e2fsck/ |
D | recovery.c | 42 struct recovery_info *info, enum passtype pass); 308 struct recovery_info *info, enum passtype pass) in do_one_pass() argument 335 if (pass == PASS_SCAN) in do_one_pass() 338 jbd_debug(1, "Starting recovery pass %d\n", pass); in do_one_pass() 358 if (pass != PASS_SCAN) in do_one_pass() 409 if (pass != PASS_REPLAY) { in do_one_pass() 514 if (pass != PASS_REVOKE) { in do_one_pass() 542 if (pass == PASS_SCAN) in do_one_pass() 550 pass, next_commit_ID, info->end_transaction); in do_one_pass()
|
/external/webkit/JavaScriptCore/tests/mozilla/ecma_2/RegExp/ |
D | regexp-enumerate-001.js | 67 var pass = false; 70 pass = true; 78 pass );
|