Home
last modified time | relevance | path

Searched refs:keyname (Results 1 - 25 of 97) sorted by relevance

1234

/third_party/alsa-utils/alsamixer/
H A Dcurskey.c9 char *keyname; member
21 // Sorted by `keyname`
44 return strcmp(((struct curskey_key*) a)->keyname, in curskey_key_cmp()
45 ((struct curskey_key*) b)->keyname); in curskey_key_cmp()
56 cmp = strcasecmp(name, table[i].keyname); in curskey_find()
104 free(keynames[--keynames_count].keyname); in free_ncurses_keynames()
121 name = (char*) keyname(key); in create_ncurses_keynames()
131 keynames[keynames_count].keyname = cstrdup(name); in create_ncurses_keynames()
217 * - Curses keyname, no modifiers allowed (KEY_HOME, HOME, F1, F(1), ...)
/third_party/libinput/tools/
H A Dlibinput-debug-events.c320 const char *keyname; in print_key_event() local
327 keyname = "***"; in print_key_event()
330 keyname = libevdev_event_code_get_name(EV_KEY, key); in print_key_event()
331 keyname = keyname ? keyname : "???"; in print_key_event()
334 keyname, in print_key_event()
803 const char *keyname; in print_tablet_pad_key_event() local
809 keyname = "***"; in print_tablet_pad_key_event()
812 keyname in print_tablet_pad_key_event()
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-dhe.js51 const keyname = `dh${n}.pem`;
52 return fixtures.readKey(keyname);
H A Dtest-http2-create-client-secure-session.js16 function loadKey(keyname) {
17 return fixtures.readKey(keyname, 'binary');
/third_party/libdrm/radeon/
H A Dbof.h60 extern bof_t *bof_object_get(bof_t *object, const char *keyname);
61 extern int bof_object_set(bof_t *object, const char *keyname, bof_t *value);
H A Dbof.c64 bof_t *bof_object_get(bof_t *object, const char *keyname) in bof_object_get() argument
69 if (!strcmp(object->array[i]->value, keyname)) { in bof_object_get()
76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) in bof_object_set() argument
86 key = bof_string(keyname); in bof_object_set()
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp61 std::string keyname = prop->getString().str(); in cacheAnnotationFromMD() local
62 if (retval.find(keyname) != retval.end()) in cacheAnnotationFromMD()
63 retval[keyname].push_back(Val->getZExtValue()); in cacheAnnotationFromMD()
67 retval[keyname] = tmp; in cacheAnnotationFromMD()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_common.c247 if (tlvs->keyname) { in erp_parse_tlvs()
252 tlvs->keyname = pos; in erp_parse_tlvs()
H A Deap_common.h15 const u8 *keyname; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_common.c247 if (tlvs->keyname) { in erp_parse_tlvs()
252 tlvs->keyname = pos; in erp_parse_tlvs()
H A Deap_common.h15 const u8 *keyname; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server.c64 const char *keyname) in eap_erp_get_key()
67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key()
839 if (!parse.keyname) { in SM_STATE()
846 parse.keyname, parse.keyname_len); in SM_STATE()
852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
888 start = parse.keyname + parse.keyname_len; in SM_STATE()
2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity()
2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2061 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity()
63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument
[all...]
H A Deap.h106 const char *keyname);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server.c63 const char *keyname) in eap_erp_get_key()
66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key()
848 if (!parse.keyname) { in SM_STATE()
855 parse.keyname, parse.keyname_len); in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
897 start = parse.keyname + parse.keyname_len; in SM_STATE()
2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity()
2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2038 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity()
62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument
[all...]
H A Deap.h106 const char *keyname);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/
H A Deapol_auth_sm.h60 const char *keyname);
/third_party/node/deps/openssl/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local
284 keyname = opt_arg(); in pkcs12_main()
383 if (keyname != NULL) in pkcs12_main()
535 key = load_key(keyname ? keyname : infile, in pkcs12_main()
537 keyname ? in pkcs12_main()
/third_party/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local
284 keyname = opt_arg(); in pkcs12_main()
383 if (keyname != NULL) in pkcs12_main()
535 key = load_key(keyname ? keyname : infile, in pkcs12_main()
537 keyname ? in pkcs12_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/
H A Deapol_auth_sm.h84 const char *keyname);
/third_party/python/Lib/test/
H A Dtest_curses.py1002 self.assertEqual(curses.keyname(65), b'A')
1003 self.assertEqual(curses.keyname(13), b'^M')
1004 self.assertEqual(curses.keyname(127), b'^?')
1005 self.assertEqual(curses.keyname(0), b'^@')
1006 self.assertRaises(ValueError, curses.keyname, -1)
1007 self.assertIsInstance(curses.keyname(256), bytes)
/third_party/openssl/test/
H A Devp_test.c3056 char *keyname; /* Key name to store key or NULL */ member
3086 data->keyname = NULL; in keygen_test_init()
3101 OPENSSL_free(keygen->keyname); in keygen_test_cleanup()
3112 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse()
3130 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run()
3133 if (keygen->keyname != NULL) { in keygen_test_run()
3137 if (find_key(NULL, keygen->keyname, private_keys)) { in keygen_test_run()
3138 TEST_info("Duplicate key %s", keygen->keyname); in keygen_test_run()
3144 key->name = keygen->keyname; in keygen_test_run()
3145 keygen->keyname in keygen_test_run()
[all...]
/third_party/node/src/quic/
H A Dsessionticket.cc119 const unsigned char* keyname, in DecryptedCallback()
117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
/third_party/python/Lib/curses/
H A Dhas_key.py189 % (_curses.keyname( key ), system, python) )
/third_party/libinput/test/
H A Dtest-device.c1691 const char *keyname; in START_TEST() local
1694 keyname = libevdev_event_code_get_name(EV_KEY, code); in START_TEST()
1695 if (!keyname || in START_TEST()
1696 !strneq(keyname, "BTN_", 4) || in START_TEST()
1697 strneq(keyname, "BTN_TOOL_", 9)) in START_TEST()
/third_party/ffmpeg/libavcodec/
H A Dtiff.c1863 const char *keyname = get_geokey_name(s->geotags[i].key); in decode_frame() local
1864 if (!keyname) { in decode_frame()
1872 ret = av_dict_set(&p->metadata, keyname, s->geotags[i].val, 0); in decode_frame()
1874 av_log(avctx, AV_LOG_ERROR, "Writing metadata with key '%s' failed\n", keyname); in decode_frame()

Completed in 28 milliseconds

1234