/external/autotest/utils/ |
D | check_patch.py | 187 def __init__(self, path, confirm=False): argument 196 self.confirm = confirm 297 auto=self.confirm) 305 def __init__(self, patch=None, patchwork_id=None, confirm=False): argument 306 self.confirm = confirm 323 answer = utils.ask("Would you like to revert them?", auto=self.confirm) 412 confirm = options.confirm variable 423 file_checker = FileChecker(path, confirm=confirm) 427 patch_checker = PatchChecker(patch=local_patch, confirm=confirm) 429 patch_checker = PatchChecker(patchwork_id=id, confirm=confirm)
|
/external/openssh/ |
D | ssh-add.c | 94 static int confirm = 0; variable 243 comment, confirm ? " (will confirm each use)" : ""); in add_file() 264 confirm ? " (will confirm each use)" : ""); in add_file() 270 lifetime, confirm)) == 0) { in add_file() 276 if (confirm != 0) in add_file() 318 lifetime, confirm)) != 0) { in add_file() 327 if (confirm != 0) in add_file() 350 lifetime, confirm)) == 0) { in update_card() 536 confirm = 1; in main()
|
D | authfd.c | 516 encode_constraints(struct sshbuf *m, u_int life, u_int confirm) in encode_constraints() argument 525 if (confirm != 0) { in encode_constraints() 540 u_int life, u_int confirm) in ssh_add_identity_constrained() argument 543 int r, constrained = (life || confirm); in ssh_add_identity_constrained() 582 (r = encode_constraints(msg, life, confirm)) != 0) in ssh_add_identity_constrained() 650 u_int life, u_int confirm) in ssh_update_card() argument 653 int r, constrained = (life || confirm); in ssh_update_card() 670 (r = encode_constraints(msg, life, confirm)) != 0) in ssh_update_card()
|
D | authfd.h | 34 const char *comment, u_int life, u_int confirm); 37 const char *pin, u_int life, u_int confirm);
|
D | ssh-agent.c | 118 u_int confirm; member 326 if (id != NULL && (!id->confirm || confirm_key(id) == 0)) { in process_authentication_challenge1() 399 if (id->confirm && confirm_key(id) != 0) { in process_sign_request2() 592 int success = 0, confirm = 0; in process_add_identity() local 631 confirm = 1; in process_add_identity() 658 id->confirm = confirm; in process_add_identity() 733 int r, i, version, count = 0, success = 0, confirm = 0; in process_add_smartcard_key() local 756 confirm = 1; in process_add_smartcard_key() 778 id->confirm = confirm; in process_add_smartcard_key()
|
/external/tcpdump/tests/ |
D | decnet.out | 8 1.1 > 1.1 16 conn-confirm 8196>8195 ver 4.1 segsize 16403 22 1.1 > 1.1 16 conn-confirm 8198>8197 ver 4.1 segsize 16403 134 1.1 > 1.1 13 disconn-confirm 8195>8196 disconnect complete 136 1.1 > 1.1 13 disconn-confirm 8198>8197 disconnect complete 137 1.1 > 1.1 13 disconn-confirm 8198>8197 disconnect complete 138 1.1 > 1.1 13 disconn-confirm 8195>8196 disconnect complete
|
/external/autotest/contrib/ |
D | manage_powerunit_info.py | 181 confirm = raw_input("%s (y/N) " % confirm_msg).lower() == 'y' variable 182 if confirm:
|
/external/e2fsprogs/tests/f_pre_1970_date_encoding/ |
D | script | 47 # confirm that the xtime is wrong on the pre-1970 file 50 # and confirm that it is right on the remaining files
|
/external/llvm/test/Bitcode/ |
D | mdstring-high-bits.ll | 3 ; PR21882: confirm we don't crash when high bits are set in a character in a
|
/external/sl4a/Common/src/com/googlecode/android_scripting/interpreter/html/ |
D | HtmlActivityTask.java | 326 result.confirm(); in onJsAlert() 351 result.confirm(); in onJsConfirm() 375 result.confirm(value); in onJsPrompt()
|
/external/autotest/client/site_tests/desktopui_SpeechSynthesisSemiAuto/ |
D | control | 18 Please confirm manually that the text "Welcome to Chromium O S" is heard.
|
/external/autotest/client/site_tests/logging_UdevCrash/ |
D | control | 17 confirm the *.log file has the correct conetent.
|
/external/autotest/server/site_tests/logging_GenerateCrashFiles/ |
D | control.kernel | 15 Crash process and confirm log files are generated.
|
D | control.process | 15 Crash process and confirm log files are generated.
|
/external/autotest/client/site_tests/logging_CrashServices/ |
D | control | 17 Crash all valid Chrome OS processes from a whitelist, and confirm
|
/external/wpa_supplicant_8/src/common/ |
D | sae.c | 1155 u8 *confirm) in sae_cn_confirm() argument 1184 confirm); in sae_cn_confirm() 1193 u8 *confirm) in sae_cn_confirm_ecc() argument 1204 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm); in sae_cn_confirm_ecc() 1213 u8 *confirm) in sae_cn_confirm_ffc() argument 1224 scalar2, element_b2, sae->tmp->prime_len, confirm); in sae_cn_confirm_ffc()
|
/external/autotest/client/tests/pi_tests/ |
D | control | 8 The basic premise here is to set up a deadlock scenario and confirm that PI
|
/external/dnsmasq/contrib/Solaris10/ |
D | README | 19 To confirm that the service is enabled and online:
|
/external/autotest/client/site_tests/network_WiMaxSmoke/ |
D | control | 27 the WiMAX network, it fetches some data from a URL to confirm the WiMAX
|
/external/llvm/test/CodeGen/Mips/ |
D | fneg.ll | 4 ; present, they confirm to 1985.
|
D | fabs.ll | 4 ; present, they confirm to 1985.
|
/external/autotest/client/site_tests/kernel_CheckArmErrata/ |
D | control | 23 with known errata. It will then attempt to confirm (perhaps by using
|
/external/llvm/test/tools/gold/X86/ |
D | thinlto_linkonceresolution.ll | 21 ; confirm the weak linkage directly in the saved opt bitcode files.
|
/external/llvm/test/Transforms/LoopVersioningLICM/ |
D | loopversioningLICM3.ll | 4 ; Test to confirm loop is not a candidate for LoopVersioningLICM.
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/bluetooth/ |
D | GattServerFacade.java | 212 @RpcParameter(name = "confirm") Boolean confirm) throws Exception { in gattServerNotifyCharacteristicChanged() 238 gattServer.notifyCharacteristicChanged(bluetoothDevice, bluetoothCharacteristic, confirm); in gattServerNotifyCharacteristicChanged() 255 @RpcParameter(name = "confirm") Boolean confirm) throws Exception { in gattServerNotifyCharacteristicChangedByInstanceId() 279 gattServer.notifyCharacteristicChanged(bluetoothDevice, mGattChar, confirm); in gattServerNotifyCharacteristicChangedByInstanceId()
|