/third_party/python/Lib/test/ |
H A D | test_minidom.py | 56 def confirm(self, test, testname = "Test"): member in MinidomTest 61 self.confirm(t == s, "looking for %r, found %r" % (s, t)) 72 self.confirm(isinstance(dom, Document)) 78 self.confirm(isinstance(dom, Document)) 96 self.confirm(dom.getElementsByTagName("LI") == \ 106 self.confirm(len(root.childNodes) == 2 118 self.confirm(len(root.childNodes) == 3 130 self.confirm(len(root.childNodes) == 4 159 self.confirm(tuple(dom.documentElement.childNodes) == 167 self.confirm(tupl [all...] |
H A D | test_pulldom.py | 298 def confirm(self, test, testname="Test"): member in SAX2DOMTestCase
|
/third_party/rust/crates/memchr/src/memchr/ |
H A D | fallback.rs | 48 let confirm = |byte| byte == n1; in memchr() 57 return forward_search(start_ptr, end_ptr, ptr, confirm); in memchr() 62 return forward_search(start_ptr, end_ptr, ptr, confirm); in memchr() 80 forward_search(start_ptr, end_ptr, ptr, confirm) in memchr() 88 let confirm = |byte| byte == n1 || byte == n2; in memchr2() 96 return forward_search(start_ptr, end_ptr, ptr, confirm); in memchr2() 103 return forward_search(start_ptr, end_ptr, ptr, confirm); in memchr2() 120 forward_search(start_ptr, end_ptr, ptr, confirm) in memchr2() 129 let confirm = |byte| byte == n1 || byte == n2 || byte == n3; in memchr3() 137 return forward_search(start_ptr, end_ptr, ptr, confirm); in memchr3() [all...] |
/third_party/python/Lib/idlelib/ |
H A D | runscript.py | 187 confirm = self.ask_save_dialog() 189 if confirm: 198 confirm = messagebox.askokcancel(title="Save Before Run or Check", 202 return confirm
|
H A D | iomenu.py | 187 confirm = messagebox.askyesnocancel( 192 if confirm: 197 elif confirm is None: 301 confirm = messagebox.askokcancel( 306 if not confirm:
|
H A D | squeezer.py | 150 confirm = messagebox.askokcancel( 160 if not confirm:
|
/third_party/toybox/toys/other/ |
H A D | i2ctools.c | 7 * Note: -y must have the same value in each toy for `confirm`. 77 printf_format static void confirm(const char *fmt, ...) in confirm() function 206 confirm("Probe chips 0x%02x-0x%02x on bus %d?", first, last, bus); in i2cdetect_main() 243 confirm("Dump chip 0x%02x on bus %d?", chip, bus); in i2cdump_main() 273 confirm("Read register 0x%02x from chip 0x%02x on bus %d?", addr, chip, bus); in i2cget_main() 311 confirm("Write register 0x%02x from chip 0x%02x on bus %d?", addr, chip, bus); in i2cset_main()
|
/third_party/pulseaudio/src/tests/ |
H A D | lo-test-util.c | 90 static int skip = 0, confirm; in calibrate_read_cb() local 113 confirm = 0; in calibrate_read_cb() 127 if (++confirm > 5) { in calibrate_read_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | sae.c | 1184 u8 *confirm) in sae_cn_confirm() 1193 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, in sae_cn_confirm() 1195 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, in sae_cn_confirm() 1213 confirm); in sae_cn_confirm() 1222 u8 *confirm) in sae_cn_confirm_ecc() 1233 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm); in sae_cn_confirm_ecc() 1242 u8 *confirm) in sae_cn_confirm_ffc() 1253 scalar2, element_b2, sae->tmp->prime_len, confirm); in sae_cn_confirm_ffc() 1290 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag in sae_check_confirm() 1179 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) sae_cn_confirm() argument 1217 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) sae_cn_confirm_ecc() argument 1237 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) sae_cn_confirm_ffc() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae.c | 2261 u8 *confirm) in sae_cn_confirm() 2270 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, in sae_cn_confirm() 2272 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, in sae_cn_confirm() 2291 5, addr, len, confirm); in sae_cn_confirm() 2300 u8 *confirm) in sae_cn_confirm_ecc() 2312 confirm) < 0) in sae_cn_confirm_ecc() 2323 u8 *confirm) in sae_cn_confirm_ffc() 2334 confirm) < 0) in sae_cn_confirm_ffc() 2395 wpa_printf(MSG_DEBUG, "SAE: Too short confirm messag in sae_check_confirm() 2256 sae_cn_confirm(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const u8 *element1, size_t element1_len, const struct crypto_bignum *scalar2, const u8 *element2, size_t element2_len, u8 *confirm) sae_cn_confirm() argument 2295 sae_cn_confirm_ecc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_ec_point *element1, const struct crypto_bignum *scalar2, const struct crypto_ec_point *element2, u8 *confirm) sae_cn_confirm_ecc() argument 2318 sae_cn_confirm_ffc(struct sae_data *sae, const u8 *sc, const struct crypto_bignum *scalar1, const struct crypto_bignum *element1, const struct crypto_bignum *scalar2, const struct crypto_bignum *element2, u8 *confirm) sae_cn_confirm_ffc() argument [all...] |