Home
last modified time | relevance | path

Searched refs:keys (Results 1 - 25 of 1221) sorted by relevance

12345678910>>...49

/third_party/python/Lib/test/
H A Dtest_dictviews.py10 kt = type({}.keys())
22 keys = d.keys()
23 self.assertEqual(len(keys), 2)
24 self.assertEqual(set(keys), {1, "a"})
25 self.assertEqual(keys, {1, "a"})
26 self.assertNotEqual(keys, {1, "a", "b"})
27 self.assertNotEqual(keys, {1, "b"})
28 self.assertNotEqual(keys, {1})
29 self.assertNotEqual(keys, 4
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.c36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data()
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload()
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
441 const u8 *SK_a = initiator ? keys->SK_ai : keys in ikev2_decrypt_payload()
369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) ikev2_derive_auth_data() argument
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument
530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) ikev2_build_encrypted() argument
608 ikev2_keys_set(struct ikev2_keys *keys) ikev2_keys_set() argument
615 ikev2_free_keys(struct ikev2_keys *keys) ikev2_free_keys() argument
629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.c36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data()
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload()
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
441 const u8 *SK_a = initiator ? keys->SK_ai : keys in ikev2_decrypt_payload()
369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) ikev2_derive_auth_data() argument
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument
530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) ikev2_build_encrypted() argument
608 ikev2_keys_set(struct ikev2_keys *keys) ikev2_keys_set() argument
615 ikev2_free_keys(struct ikev2_keys *keys) ikev2_free_keys() argument
629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument
[all...]
/third_party/typescript/tests/baselines/reference/
H A DinferStringLiteralUnionForBindingElement.js2 declare function func<T extends string>(arg: { keys: T[] }): { readonly keys: T[]; readonly firstKey: T; };
5 const { firstKey } = func({keys: ["aa", "bb"]})
8 const { keys } = func({keys: ["aa", "bb"]})
9 const b: ("aa" | "bb")[] = keys;
13 const { keys, firstKey } = func({keys: ["aa", "bb"]})
15 const b: ("aa" | "bb")[] = keys;
19 const x = func({keys
[all...]
/third_party/jerryscript/tests/jerry/es2015/
H A Dreflect-own-keys.js54 var keys = Reflect.ownKeys (obj); variable
55 assert (2 === keys.length);
56 assert ("a" === keys[0]);
57 assert ("b" === keys[1]);
60 var keys = Reflect.ownKeys (obj); variable
61 assert (2 === keys.length);
62 assert ("a" === keys[0]);
63 assert ("b" === keys[1]);
68 var keys = Reflect.ownKeys (obj) variable
69 assert (2 === keys
74 var keys = Reflect.ownKeys ([1, 2]); global() variable
[all...]
/third_party/ffmpeg/libavformat/
H A Dasfcrypt.c50 * @brief read keys from keybuf into keys
51 * @param keybuf buffer containing the keys
52 * @param keys output key array containing the keys for encryption in
55 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) in multiswap_init() argument
59 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; in multiswap_init()
63 * @brief invert the keys so that encryption become decryption keys and
65 * @param keys ke
67 multiswap_invert_keys(uint32_t keys[12]) multiswap_invert_keys() argument
76 multiswap_step(const uint32_t keys[12], uint32_t v) multiswap_step() argument
88 multiswap_inv_step(const uint32_t keys[12], uint32_t v) multiswap_inv_step() argument
108 multiswap_enc(const uint32_t keys[12], uint64_t key, uint64_t data) multiswap_enc() argument
132 multiswap_dec(const uint32_t keys[12], uint64_t key, uint64_t data) multiswap_dec() argument
[all...]
/third_party/ltp/pan/
H A Dtag_report.c109 int cuts_report(SYM tags, SYM keys, char *at, char *tag) in cuts_report() argument
187 (char *)Data.data, keys); in cuts_report()
193 test_result(tag, "*", "*", result, keys); in cuts_report()
196 test_result(tag, "-", "-", "TC count wrong", keys); in cuts_report()
211 * I could get a key (tag), get it's sub-keys (TCIDs), then get the key
225 int tag_report(SYM alltags, SYM ctag, SYM keys) in tag_report() argument
239 if ((tag = (char *)sym_get(keys, key_get)) == NULL) { in tag_report()
245 if ((is = (char *)sym_get(keys, key_get)) == NULL) { in tag_report()
246 test_result(tag, NULL, NULL, "no init status", keys); in tag_report()
251 test_result(tag, NULL, NULL, is, keys); in tag_report()
418 cuts_testcase(SYM tag, SYM keys) cuts_testcase() argument
[all...]
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/
H A Droot.js16 * The top-level role and metadata file signed by the root keys.
17 * This role specifies trusted keys for all other top-level roles, which may further delegate trust.
23 this.keys = options.keys || {};
32 const roleNames = new Set(Object.keys(options.roles));
46 this.keys[key.keyID] = key;
54 util_1.default.isDeepStrictEqual(this.keys, other.keys) &&
63 keys: keysToJSON(this.keys),
[all...]
H A Ddelegations.js20 this.keys = options.keys;
23 if (Object.keys(options.roles).some((roleName) => role_1.TOP_LEVEL_ROLE_NAMES.includes(roleName))) {
34 return (util_1.default.isDeepStrictEqual(this.keys, other.keys) &&
56 keys: keysToJSON(this.keys),
68 const { keys, roles, succinct_roles, ...unrecognizedFields } = data;
74 keys: keysFromJSON(keys),
[all...]
/third_party/libphonenumber/metadata/src/test/java/com/google/i18n/phonenumbers/metadata/table/
H A DRangeKeyTest.java35 ImmutableList<RangeKey> keys = RangeKey.decompose(RangeTree.empty()); in testEmpty()
36 assertThat(keys).isEmpty(); in testEmpty()
41 ImmutableList<RangeKey> keys = RangeKey.decompose(RangeTree.from(RangeSpecification.empty())); in testZeroLengthMatch()
42 assertThat(keys).containsExactly(key("", 0)); in testZeroLengthMatch()
47 ImmutableList<RangeKey> keys = RangeKey.decompose(ranges("xxx", "xxxx", "xxxxx")); in testOnlyAnyPath()
48 assertThat(keys).containsExactly(key("", 3, 4, 5)); in testOnlyAnyPath()
53 ImmutableList<RangeKey> keys = RangeKey.decompose(ranges("123xxx", "123xxxx", "123xxxxx")); in testSimple()
54 assertThat(keys).containsExactly(key("123", 6, 7, 8)); in testSimple()
59 ImmutableList<RangeKey> keys = in testEmbeddedRanges()
61 assertThat(keys) in testEmbeddedRanges()
[all...]
/third_party/libwebsockets/plugins/ssh-base/crypto/
H A Dchacha.c238 lws_chacha_activate(struct lws_ssh_keys *keys) in lws_chacha_activate() argument
240 if (keys->cipher) { in lws_chacha_activate()
241 free(keys->cipher); in lws_chacha_activate()
242 keys->cipher = NULL; in lws_chacha_activate()
245 keys->cipher = malloc(sizeof(struct lws_cipher_chacha)); in lws_chacha_activate()
246 if (!keys->cipher) in lws_chacha_activate()
249 memset(keys->cipher, 0, sizeof(struct lws_cipher_chacha)); in lws_chacha_activate()
251 /* uses 2 x 256-bit keys, so 512 bits (64 bytes) needed */ in lws_chacha_activate()
252 chacha_keysetup(K_2(keys), keys in lws_chacha_activate()
264 lws_chacha_destroy(struct lws_ssh_keys *keys) lws_chacha_destroy() argument
273 lws_chachapoly_get_length(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *in4) lws_chachapoly_get_length() argument
302 chachapoly_crypt(struct lws_ssh_keys *keys, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) chachapoly_crypt() argument
355 lws_chacha_decrypt(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *ct, uint32_t len, uint8_t *pt) lws_chacha_decrypt() argument
363 lws_chacha_encrypt(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *ct, uint32_t len, uint8_t *pt) lws_chacha_encrypt() argument
[all...]
/third_party/skia/experimental/tools/
H A Dget_examples.py52 keys = parse_fiddle_sk(match.group(1))
55 width = keys.get('width', '256')
56 height = keys.get('height', '256')
57 source_image = keys.get('source', 256)
58 duration = keys.get('duration', '0')
59 textonly = 'textonly' in keys
60 srgb = not textonly and 'srgb' in keys
61 f16 = srgb and 'f16' in keys
62 offscreen = 'offscreen' in keys
82 keys
[all...]
/third_party/mesa3d/src/panfrost/bifrost/
H A Dgen_disasm.py56 options = [n for n in instructions.keys() if (n[0] == '*') == is_fma]
131 keys = set()
134 keys |= find_context_keys_expr(test)
139 keys |= find_context_keys_expr(val)
141 return keys
152 def compile_derived_inner(expr, keys):
158 args = [compile_derived_inner(arg, keys) for arg in expr[1:]]
165 return "ctx[{}]".format(keys.index(expr))
167 def compile_derived(expr, keys):
168 return eval('lambda ctx, ordering: ' + compile_derived_inner(expr, keys))
[all...]
/third_party/rust/crates/clap/src/util/
H A Dflat_map.rs10 keys: Vec<K>,
20 for (index, existing) in self.keys.iter().enumerate() {
32 self.keys.push(key);
47 for existing in &self.keys { in contains_key()
69 .keys in remove_entry()
73 let key = self.keys.remove(index); in remove_entry()
79 self.keys.is_empty()
83 for (index, existing) in self.keys.iter().enumerate() { in entry()
96 for (index, existing) in self.keys.iter().enumerate() { in get()
109 for (index, existing) in self.keys in get_mut()
117 pub fn keys(&self) -> std::slice::Iter<'_, K> { keys() functions
[all...]
/third_party/node/test/parallel/
H A Dtest-webcrypto-wrap-unwrap.js48 return Promise.all(Object.keys(kWrappingData).map(async (name) => {
49 const keys = await subtle.generateKey(
54 kWrappingData[name].wrappingKey = keys.publicKey;
55 kWrappingData[name].unwrappingKey = keys.privateKey;
57 kWrappingData[name].wrappingKey = keys;
58 kWrappingData[name].unwrappingKey = keys;
195 const keys = await subtle.generateKey(params.algorithm, true, usages);
202 key: keys.publicKey,
207 key: keys.privateKey,
215 key: keys,
[all...]
/third_party/node/benchmark/crypto/
H A Doneshot-verify.js7 const fixtures_keydir = path.resolve(__dirname, '../../test/fixtures/keys/');
45 function measureSync(n, digest, signature, publicKey, keys) {
51 publicKey || keys[i],
57 function measureAsync(n, digest, signature, publicKey, keys) {
70 publicKey || keys[n - remaining],
78 function measureAsyncParallel(n, digest, signature, publicKey, keys) {
89 publicKey || keys[i],
99 let publicKey, keys, digest;
128 keys = keyObjects;
140 measureSync(n, digest, signature, publicKey, keys);
[all...]
H A Doneshot-sign.js7 const fixtures_keydir = path.resolve(__dirname, '../../test/fixtures/keys/');
34 function measureSync(n, digest, privateKey, keys) {
40 privateKey || keys[i]);
45 function measureAsync(n, digest, privateKey, keys) {
58 privateKey || keys[n - remaining],
65 function measureAsyncParallel(n, digest, privateKey, keys) {
76 privateKey || keys[i],
85 let privateKey, keys, digest;
114 keys = keyObjects;
122 measureSync(n, digest, privateKey, keys);
[all...]
/third_party/python/Tools/scripts/
H A Dparse_html5_entities.py34 added = new.keys() - old.keys()
39 removed = old.keys() - new.keys()
45 for name in (old.keys() & new.keys()):
55 # The keys in the generated dictionary should be sorted
56 # in a case-insensitive way, however, when two keys are equal,
61 # Since the sorting is stable the uppercase keys will eventually
63 keys
[all...]
/third_party/icu/icu4c/source/samples/legacy/
H A Dlegacy.cpp31 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]);
32 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]);
55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys() argument
60 currentKey = keys[i]; in printKeys()
94 static uint8_t keys[4][32]; in main() local
102 test_current(uTest, 4, 5, keys); in main()
104 printKeys("Current keys", keys, 4); in main()
110 test_legacy(uTest, 4, 5, keys); in main()
112 printKeys("Legacy keys", key in main()
[all...]
/third_party/skia/third_party/externals/icu/source/samples/legacy/
H A Dlegacy.cpp31 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]);
32 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]);
55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys() argument
60 currentKey = keys[i]; in printKeys()
94 static uint8_t keys[4][32]; in main() local
102 test_current(uTest, 4, 5, keys); in main()
104 printKeys("Current keys", keys, 4); in main()
110 test_legacy(uTest, 4, 5, keys); in main()
112 printKeys("Legacy keys", key in main()
[all...]
/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py111 self._cert_sig_algs = list(CERTIFICATES.keys())
580 parser.add_argument('server', choices=SERVER_CLASSES.keys(), nargs='?',
581 default=list(SERVER_CLASSES.keys())[0],
583 parser.add_argument('client', choices=CLIENT_CLASSES.keys(), nargs='?',
584 default=list(CLIENT_CLASSES.keys())[0],
586 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?',
587 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0],
589 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?',
590 default=list(SIG_ALG_IANA_VALUE.keys())[0],
592 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), narg
[all...]
/third_party/skia/src/core/
H A DSkScalar.cpp12 SkScalar SkScalarInterpFunc(SkScalar searchKey, const SkScalar keys[], in SkScalarInterpFunc() argument
15 SkASSERT(keys != nullptr); in SkScalarInterpFunc()
19 SkASSERT(keys[i-1] <= keys[i]); in SkScalarInterpFunc()
23 while (right < length && keys[right] < searchKey) { in SkScalarInterpFunc()
35 SkScalar leftKey = keys[right-1]; in SkScalarInterpFunc()
36 SkScalar rightKey = keys[right]; in SkScalarInterpFunc()
/third_party/mbedtls/programs/ssl/
H A Dssl_test_common_source.c23 eap_tls_keys *keys = (eap_tls_keys *) p_expkey; in eap_tls_key_derivation() local
29 if (secret_len != sizeof(keys->master_secret)) { in eap_tls_key_derivation()
33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation()
34 memcpy(keys->randbytes, client_random, 32); in eap_tls_key_derivation()
35 memcpy(keys->randbytes + 32, server_random, 32); in eap_tls_key_derivation()
36 keys->tls_prf_type = tls_prf_type; in eap_tls_key_derivation()
117 dtls_srtp_keys *keys = (dtls_srtp_keys *) p_expkey; in dtls_srtp_key_derivation() local
123 if (secret_len != sizeof(keys->master_secret)) { in dtls_srtp_key_derivation()
127 memcpy(keys in dtls_srtp_key_derivation()
[all...]
/third_party/jerryscript/tests/jerry-test-suite/15/15.02/15.02.03/
H A D15.02.03-004.js22 var keys = Object.keys(object);
24 assert(keys[0] == "prop1" &&
25 keys[1] == "prop2" &&
26 keys[2] == "prop3" &&
27 keys[3] == "prop4");
/third_party/libinput/tools/
H A Dlibinput-record-verify-yaml.py44 def dict_key_crosscheck(self, d, keys):
45 """Check that each key in d is in keys, and that each key is in d"""
46 self.assertEqual(sorted(d.keys()), sorted(keys))
292 keys = ["type", "seat", "logical_seat"]
294 self.dict_key_crosscheck(e, keys)
299 keys = ["type", "time", "delta", "unaccel"]
301 self.dict_key_crosscheck(e, keys)
314 keys = ["type", "time", "button", "state", "seat_count"]
316 self.dict_key_crosscheck(e, keys)
[all...]

Completed in 9 milliseconds

12345678910>>...49