/third_party/alsa-utils/alsamixer/ |
H A D | curskey.c | 9 char *keyname; member 21 // Sorted by `keyname` 44 return strcmp(((struct curskey_key*) a)->keyname, in curskey_key_cmp() 45 ((struct curskey_key*) b)->keyname); in curskey_key_cmp() 56 cmp = strcasecmp(name, table[i].keyname); in curskey_find() 104 free(keynames[--keynames_count].keyname); in free_ncurses_keynames() 121 name = (char*) keyname(key); in create_ncurses_keynames() 131 keynames[keynames_count].keyname = cstrdup(name); in create_ncurses_keynames() 217 * - Curses keyname, no modifiers allowed (KEY_HOME, HOME, F1, F(1), ...)
|
/third_party/libinput/tools/ |
H A D | libinput-debug-events.c | 320 const char *keyname; in print_key_event() local 327 keyname = "***"; in print_key_event() 330 keyname = libevdev_event_code_get_name(EV_KEY, key); in print_key_event() 331 keyname = keyname ? keyname : "???"; in print_key_event() 334 keyname, in print_key_event() 803 const char *keyname; in print_tablet_pad_key_event() local 809 keyname = "***"; in print_tablet_pad_key_event() 812 keyname in print_tablet_pad_key_event() [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-dhe.js | 51 const keyname = `dh${n}.pem`; 52 return fixtures.readKey(keyname);
|
H A D | test-http2-create-client-secure-session.js | 16 function loadKey(keyname) { 17 return fixtures.readKey(keyname, 'binary');
|
/third_party/libdrm/radeon/ |
H A D | bof.h | 60 extern bof_t *bof_object_get(bof_t *object, const char *keyname); 61 extern int bof_object_set(bof_t *object, const char *keyname, bof_t *value);
|
H A D | bof.c | 64 bof_t *bof_object_get(bof_t *object, const char *keyname) in bof_object_get() argument 69 if (!strcmp(object->array[i]->value, keyname)) { in bof_object_get() 76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) in bof_object_set() argument 86 key = bof_string(keyname); in bof_object_set()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/NVPTX/ |
H A D | NVPTXUtilities.cpp | 61 std::string keyname = prop->getString().str(); in cacheAnnotationFromMD() local 62 if (retval.find(keyname) != retval.end()) in cacheAnnotationFromMD() 63 retval[keyname].push_back(Val->getZExtValue()); in cacheAnnotationFromMD() 67 retval[keyname] = tmp; in cacheAnnotationFromMD()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_common.c | 247 if (tlvs->keyname) { in erp_parse_tlvs() 252 tlvs->keyname = pos; in erp_parse_tlvs()
|
H A D | eap_common.h | 15 const u8 *keyname; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_common.c | 247 if (tlvs->keyname) { in erp_parse_tlvs() 252 tlvs->keyname = pos; in erp_parse_tlvs()
|
H A D | eap_common.h | 15 const u8 *keyname; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 64 const char *keyname) in eap_erp_get_key() 67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key() 839 if (!parse.keyname) { in SM_STATE() 846 parse.keyname, parse.keyname_len); in SM_STATE() 852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 888 start = parse.keyname + parse.keyname_len; in SM_STATE() 2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity() 2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2061 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity() 63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument [all...] |
H A D | eap.h | 106 const char *keyname);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server.c | 63 const char *keyname) in eap_erp_get_key() 66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key() 848 if (!parse.keyname) { in SM_STATE() 855 parse.keyname, parse.keyname_len); in SM_STATE() 861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 897 start = parse.keyname + parse.keyname_len; in SM_STATE() 2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity() 2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2038 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity() 62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument [all...] |
H A D | eap.h | 106 const char *keyname);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 60 const char *keyname);
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 284 keyname = opt_arg(); in pkcs12_main() 383 if (keyname != NULL) in pkcs12_main() 535 key = load_key(keyname ? keyname : infile, in pkcs12_main() 537 keyname ? in pkcs12_main()
|
/third_party/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 284 keyname = opt_arg(); in pkcs12_main() 383 if (keyname != NULL) in pkcs12_main() 535 key = load_key(keyname ? keyname : infile, in pkcs12_main() 537 keyname ? in pkcs12_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 84 const char *keyname);
|
/third_party/python/Lib/test/ |
H A D | test_curses.py | 1002 self.assertEqual(curses.keyname(65), b'A') 1003 self.assertEqual(curses.keyname(13), b'^M') 1004 self.assertEqual(curses.keyname(127), b'^?') 1005 self.assertEqual(curses.keyname(0), b'^@') 1006 self.assertRaises(ValueError, curses.keyname, -1) 1007 self.assertIsInstance(curses.keyname(256), bytes)
|
/third_party/openssl/test/ |
H A D | evp_test.c | 3056 char *keyname; /* Key name to store key or NULL */ member 3086 data->keyname = NULL; in keygen_test_init() 3101 OPENSSL_free(keygen->keyname); in keygen_test_cleanup() 3112 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse() 3130 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run() 3133 if (keygen->keyname != NULL) { in keygen_test_run() 3137 if (find_key(NULL, keygen->keyname, private_keys)) { in keygen_test_run() 3138 TEST_info("Duplicate key %s", keygen->keyname); in keygen_test_run() 3144 key->name = keygen->keyname; in keygen_test_run() 3145 keygen->keyname in keygen_test_run() [all...] |
/third_party/node/src/quic/ |
H A D | sessionticket.cc | 119 const unsigned char* keyname, in DecryptedCallback() 117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
|
/third_party/python/Lib/curses/ |
H A D | has_key.py | 189 % (_curses.keyname( key ), system, python) )
|
/third_party/libinput/test/ |
H A D | test-device.c | 1691 const char *keyname; in START_TEST() local 1694 keyname = libevdev_event_code_get_name(EV_KEY, code); in START_TEST() 1695 if (!keyname || in START_TEST() 1696 !strneq(keyname, "BTN_", 4) || in START_TEST() 1697 strneq(keyname, "BTN_TOOL_", 9)) in START_TEST()
|
/third_party/ffmpeg/libavcodec/ |
H A D | tiff.c | 1863 const char *keyname = get_geokey_name(s->geotags[i].key); in decode_frame() local 1864 if (!keyname) { in decode_frame() 1872 ret = av_dict_set(&p->metadata, keyname, s->geotags[i].val, 0); in decode_frame() 1874 av_log(avctx, AV_LOG_ERROR, "Writing metadata with key '%s' failed\n", keyname); in decode_frame()
|