Home
last modified time | relevance | path

Searched refs:pass2 (Results 1 – 25 of 28) sorted by relevance

12

/external/ppp/pppd/
Dsrp-entry.c101 char *pass1, *pass2; in main() local
154 if ((pass2 = getpassphrase("Re-enter phrase: ")) == NULL) in main()
156 if (strcmp(pass1, pass2) == 0) in main()
/external/clang/test/Analysis/inlining/
Dfalse-positive-suppression.cpp156 void pass2(X *const &p2) { in pass2() function
161 pass2(getNull()); in test2()
/external/e2fsprogs/e2fsck/
DMakefile.pq5 OBJS= e2fsck.obj super.obj pass1.obj pass2.obj pass3.obj \
DAndroid.mk78 pass2.c \
DCHANGES38 Fixed dependency on BLOCK_SIZE in pass2. e2fsck will now handle 4k
DMakefile.in68 OBJS= crc32.o dict.o unix.o e2fsck.o super.o pass1.o pass1b.o pass2.o \
76 profiled/pass2.o profiled/pass3.o profiled/pass4.o profiled/pass5.o \
92 $(srcdir)/pass2.c \
349 pass2.o: $(srcdir)/pass2.c $(top_builddir)/lib/config.h \
/external/clang/test/Sema/
Dwarn-shadow.c10 int pass2; in foo() local
/external/e2fsprogs/po/
DPOTFILES.in14 e2fsck/pass2.c
De2fsprogs.pot489 #: e2fsck/pass1.c:475 e2fsck/pass2.c:782
563 #: e2fsck/pass2.c:283
567 #: e2fsck/pass2.c:805
Dzh_CN.po484 #: e2fsck/pass1.c:476 e2fsck/pass2.c:782
558 #: e2fsck/pass2.c:283
562 #: e2fsck/pass2.c:805
Did.po487 #: e2fsck/pass1.c:476 e2fsck/pass2.c:782
561 #: e2fsck/pass2.c:283
565 #: e2fsck/pass2.c:805
Dit.po496 #: e2fsck/pass1.c:476 e2fsck/pass2.c:782
573 #: e2fsck/pass2.c:283
577 #: e2fsck/pass2.c:805
Dde.po484 #: e2fsck/pass1.c:476 e2fsck/pass2.c:782
558 #: e2fsck/pass2.c:283
562 #: e2fsck/pass2.c:805
Dca.po491 #: e2fsck/pass1.c:475 e2fsck/pass2.c:782
565 #: e2fsck/pass2.c:283
569 #: e2fsck/pass2.c:805
Dtr.po489 #: e2fsck/pass1.c:475 e2fsck/pass2.c:782
563 #: e2fsck/pass2.c:283
567 #: e2fsck/pass2.c:805
Dnl.po488 #: e2fsck/pass1.c:475 e2fsck/pass2.c:782
562 #: e2fsck/pass2.c:283
566 #: e2fsck/pass2.c:805
Des.po521 #: e2fsck/pass1.c:476 e2fsck/pass2.c:782
595 #: e2fsck/pass2.c:283
599 #: e2fsck/pass2.c:805
Dsv.po499 #: e2fsck/pass1.c:475 e2fsck/pass2.c:782
573 #: e2fsck/pass2.c:283
577 #: e2fsck/pass2.c:805
/external/chromium_org/cc/layers/
Ddelegated_renderer_layer_impl_unittest.cc99 TestRenderPass* pass2 = AddRenderPass(&delegated_render_passes, in DelegatedRendererLayerImplTestSimple() local
103 AddQuad(pass2, gfx::Rect(0, 0, 7, 7), 22u); in DelegatedRendererLayerImplTestSimple()
104 AddRenderPassQuad(pass2, pass1); in DelegatedRendererLayerImplTestSimple()
109 AddRenderPassQuad(pass3, pass2); in DelegatedRendererLayerImplTestSimple()
1407 TestRenderPass* pass2 = AddRenderPass(&delegated_render_passes, in TEST_F() local
1411 AddQuad(pass2, gfx::Rect(quad_screen_rect.size()), SK_ColorRED); in TEST_F()
1418 AddRenderPassQuad(pass1, pass2, 0, FilterOperations(), transform); in TEST_F()
/external/openssl/apps/
Dapps.h246 int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
Dapps.c634 int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2) in app_passwd() argument
644 *pass2 = app_get_pass(err, arg2, same ? 2 : 0); in app_passwd()
645 if(!*pass2) return 0; in app_passwd()
646 } else if(pass2) *pass2 = NULL; in app_passwd()
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/
DTokenRewriteStream.as76 * tokens.insertAfter("pass2", u, "text after u");}
78 * trace(tokens.toString("pass2"));
/external/libvpx/libvpx/vp9/common/arm/neon/
Dvp9_idct32x32_add_neon.asm327 ; int16_t pass2[32 * 32];
1140 ; the input of pass2 is the result of pass1. we have to remove the offset
1143 ; r1 = pass2[32 * 32]
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/common/arm/neon/
Dvp9_idct32x32_add_neon.asm327 ; int16_t pass2[32 * 32];
1140 ; the input of pass2 is the result of pass1. we have to remove the offset
1143 ; r1 = pass2[32 * 32]
/external/e2fsprogs/
DTODO33 In pass2.c, lines 352-357, I read:

12