/third_party/pulseaudio/src/pulse/ |
H A D | proplist.c | 355 int pa_proplist_unset_many(pa_proplist *p, const char * const keys[]) { in pa_proplist_unset_many() argument 360 pa_assert(keys); in pa_proplist_unset_many() 362 for (k = keys; *k; k++) in pa_proplist_unset_many() 366 for (k = keys; *k; k++) in pa_proplist_unset_many()
|
/third_party/skia/third_party/externals/icu/source/i18n/ |
H A D | uspoof_conf.cpp | 56 // 3. Build a list of keys (UChar32s) from the four mapping tables. Sort the 414 // While copying the keys to the runtime array, in outputData() 418 int32_t *keys = in outputData() local 431 keys[i] = key; in outputData() 435 rawData->fCFUKeys = (int32_t)((char *)keys - (char *)rawData); in outputData() 437 fSpoofImpl->fSpoofData->fCFUKeys = keys; in outputData()
|
/third_party/skia/third_party/externals/harfbuzz/src/ |
H A D | gen-use-table.py | 471 uu = sorted (data.keys ()) 485 for suf in v.keys(): 546 for k in sorted(use_mapping.keys()): 551 for suf in v.keys():
|
/third_party/skia/infra/bots/recipes/ |
H A D | compute_buildstats.py | 117 keys = [] 118 for k in sorted(api.vars.builder_cfg.keys()): 120 keys.extend([k, api.vars.builder_cfg[k]]) 121 keystr = ' '.join(keys)
|
/third_party/skia/infra/bots/task_drivers/perf_puppeteer_skottie_frames/ |
H A D | perf_puppeteer_skottie_frames.go | 43 // These flags feed into the perf trace keys associated with the output data. 63 keys := map[string]string{ 71 outputWithoutResults, err := makePerfObj(*gitHash, *taskID, os.Getenv("SWARMING_BOT_ID"), keys) 100 func makePerfObj(gitHash, taskID, machineID string, keys map[string]string) (perfJSONFormat, error) { 111 rv.Key = keys
|
/third_party/skia/infra/bots/task_drivers/perf_puppeteer_render_skps/ |
H A D | perf_puppeteer_render_skps.go | 43 // These flags feed into the perf trace keys associated with the output data. 63 keys := map[string]string{ 71 outputWithoutResults, err := makePerfObj(*gitHash, *taskID, os.Getenv("SWARMING_BOT_ID"), keys) 100 func makePerfObj(gitHash, taskID, machineID string, keys map[string]string) (perfJSONFormat, error) { 111 rv.Key = keys
|
/third_party/skia/infra/bots/task_drivers/perf_puppeteer_canvas/ |
H A D | perf_puppeteer_canvas.go | 40 // These flags feed into the perf trace keys associated with the output data. 59 keys := map[string]string{ 67 outputWithoutResults, err := makePerfObj(*gitHash, *taskID, os.Getenv("SWARMING_BOT_ID"), keys) 95 func makePerfObj(gitHash, taskID, machineID string, keys map[string]string) (perfJSONFormat, error) { 106 rv.Key = keys
|
/third_party/rust/crates/rustix/src/thread/ |
H A D | prctl.rs | 709 /// Securely reset the thread's pointer authentication keys to fresh random values generated 723 keys: Option<PointerAuthenticationKeys>, in reset_pointer_authentication_keys() 725 let keys = keys.as_ref().map_or(0_u32, PointerAuthenticationKeys::bits); in reset_pointer_authentication_keys() 726 prctl_2args(PR_PAC_RESET_KEYS, keys as usize as *mut _).map(|_r| ()) in reset_pointer_authentication_keys()
|
/third_party/vk-gl-cts/scripts/ |
H A D | mustpass.py | 326 for pattern in patterns.keys(): 334 if len(t.keys()) == 0: 349 for pattern in patterns.keys(): 357 if len(t.keys()) == 0:
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 191 data->ikev2.keys.SK_ar, in eap_ikev2_build_msg() 192 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_ikev2.c | 187 data->ikev2.keys.SK_ai, in eap_ikev2_build_msg() 188 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 191 data->ikev2.keys.SK_ar, in eap_ikev2_build_msg() 192 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_ikev2.c | 187 data->ikev2.keys.SK_ai, in eap_ikev2_build_msg() 188 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/kernel/linux/linux-5.10/net/sched/ |
H A D | sch_cake.c | 587 static bool cake_update_flowkeys(struct flow_keys *keys, in cake_update_flowkeys() argument 602 if (ip != keys->addrs.v4addrs.src) { in cake_update_flowkeys() 603 keys->addrs.v4addrs.src = ip; in cake_update_flowkeys() 607 if (ip != keys->addrs.v4addrs.dst) { in cake_update_flowkeys() 608 keys->addrs.v4addrs.dst = ip; in cake_update_flowkeys() 612 if (keys->ports.ports) { in cake_update_flowkeys() 616 if (port != keys->ports.src) { in cake_update_flowkeys() 617 keys->ports.src = port; in cake_update_flowkeys() 621 if (port != keys->ports.dst) { in cake_update_flowkeys() 622 port = keys in cake_update_flowkeys() 654 struct flow_keys keys, host_keys; cake_hash() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 1068 struct crypto_authenc_keys *keys) in sec_aead_aes_set_key() 1070 switch (keys->enckeylen) { in sec_aead_aes_set_key() 1084 memcpy(c_ctx->c_key, keys->enckey, keys->enckeylen); in sec_aead_aes_set_key() 1090 struct crypto_authenc_keys *keys) in sec_aead_auth_set_key() 1095 if (!keys->authkeylen) { in sec_aead_auth_set_key() 1102 if (keys->authkeylen > blocksize) { in sec_aead_auth_set_key() 1103 ret = crypto_shash_tfm_digest(hash_tfm, keys->authkey, in sec_aead_auth_set_key() 1104 keys->authkeylen, ctx->a_key); in sec_aead_auth_set_key() 1111 memcpy(ctx->a_key, keys in sec_aead_auth_set_key() 1067 sec_aead_aes_set_key(struct sec_cipher_ctx *c_ctx, struct crypto_authenc_keys *keys) sec_aead_aes_set_key() argument 1089 sec_aead_auth_set_key(struct sec_auth_ctx *ctx, struct crypto_authenc_keys *keys) sec_aead_auth_set_key() argument 1150 struct crypto_authenc_keys keys; sec_aead_setkey() local [all...] |
/kernel/linux/linux-6.6/net/sched/ |
H A D | sch_cake.c | 588 static bool cake_update_flowkeys(struct flow_keys *keys, in cake_update_flowkeys() argument 603 if (ip != keys->addrs.v4addrs.src) { in cake_update_flowkeys() 604 keys->addrs.v4addrs.src = ip; in cake_update_flowkeys() 608 if (ip != keys->addrs.v4addrs.dst) { in cake_update_flowkeys() 609 keys->addrs.v4addrs.dst = ip; in cake_update_flowkeys() 613 if (keys->ports.ports) { in cake_update_flowkeys() 617 if (port != keys->ports.src) { in cake_update_flowkeys() 618 keys->ports.src = port; in cake_update_flowkeys() 622 if (port != keys->ports.dst) { in cake_update_flowkeys() 623 port = keys in cake_update_flowkeys() 655 struct flow_keys keys, host_keys; cake_hash() local [all...] |
/third_party/python/Lib/ |
H A D | mailbox.py | 99 """Return an iterator over keys.""" 102 def keys(self): member in Mailbox 103 """Return a list of keys.""" 145 for key in self.keys(): 165 """Change the messages that correspond to certain keys.""" 399 """Return an iterator over keys.""" 626 """Return an iterator over keys.""" 628 yield from self._toc.keys() 680 for key in sorted(self._toc.keys()): 952 keys [all...] |
/test/xts/acts/distributeddatamgr/kvStoretest/kvStorejstest/hap/entry/src/ohosTest/js/test/ |
H A D | SingleKvStoreCallbackJsunit.test.js | 1219 let keys = []; 1230 keys.push(key + i); 1236 await kvStore.deleteBatch(keys, async function (err,data) { 1257 let keys = ['batch_test_string_key1', 'batch_test_string_key2']; 1258 await kvStore.deleteBatch(keys, function (err,data) { 1294 let keys = ['batch_test_string_key1', 'batch_test_string_keya']; 1295 await kvStore.deleteBatch(keys, async function (err,data) { 1329 let keys = Object.keys(entries).slice(5); //delete 5 beginnings 1330 await kvStore.deleteBatch(keys, asyn [all...] |
H A D | DeviceKvStorePromiseJsunit.test.js | 1460 let keys = []; 1471 keys.push(key + i); 1477 await kvStore.deleteBatch(keys).then((err) => { 1503 let keys = ['batch_test_string_key1', 'batch_test_string_key2']; 1504 await kvStore.deleteBatch(keys).then((err) => { 1541 let keys = ['batch_test_string_key1', 'batch_test_string_keya']; 1542 await kvStore.deleteBatch(keys).then((err) => { 1588 let keys = Object.keys(entries).slice(5); //delete 5 beginnings 1589 await kvStore.deleteBatch(keys) [all...] |
H A D | DeviceKvStoreCallbackJsunit.test.js | 1260 let keys = []; 1271 keys.push(key + i); 1277 await kvStore.deleteBatch(keys, async function (err,data) { 1298 let keys = ['batch_test_string_key1', 'batch_test_string_key2']; 1299 await kvStore.deleteBatch(keys, function (err,data) { 1335 let keys = ['batch_test_string_key1', 'batch_test_string_keya']; 1336 await kvStore.deleteBatch(keys, async function (err,data) { 1370 let keys = Object.keys(entries).slice(5); //delete 5 beginnings 1371 await kvStore.deleteBatch(keys, asyn [all...] |
/third_party/node/deps/v8/src/runtime/ |
H A D | runtime-object.cc | 284 // ES #sec-object.keys 294 // Collect the own keys for the {receiver}. in RUNTIME_FUNCTION() 295 Handle<FixedArray> keys; in RUNTIME_FUNCTION() local 297 isolate, keys, in RUNTIME_FUNCTION() 301 return *keys; in RUNTIME_FUNCTION() 314 // Collect the own keys for the {receiver}. in RUNTIME_FUNCTION() 317 Handle<FixedArray> keys; in RUNTIME_FUNCTION() local 319 isolate, keys, in RUNTIME_FUNCTION() 323 return *keys; in RUNTIME_FUNCTION() 338 Handle<FixedArray> keys; in RUNTIME_FUNCTION() local 1020 Handle<FixedArray> keys; RUNTIME_FUNCTION() local [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
H A D | ssl_ticket.h | 35 * management, rotating the keys periodically in order to preserve forward 66 mbedtls_ssl_ticket_key keys[2]; /*!< ticket protection keys */ member 105 * \note The lifetime of the keys is twice the lifetime of tickets.
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/paho.mqtt.c/include/mqtt/ |
H A D | MQTTClientPersistence.h | 172 * @brief Returns the keys in this persistent data store. 176 * @param keys The address of a pointer to pointers to strings. Assuming 178 * keys (strings used to store the data with Persistence_put()). It also 179 * allocates memory to hold an array of pointers to these strings. <i>keys</i> 181 * @param nkeys A pointer to the number of keys in this persistent data store. 182 * This function sets the number of keys, if successful. 186 typedef int (*Persistence_keys)(void* handle, char*** keys, int* nkeys);
|
/device/soc/rockchip/common/vendor/drivers/gpu/drm/bridge/synopsys/ |
H A D | dw-hdmi-hdcp.h | 42 struct hdcp_keys *keys; member
|
/device/soc/rockchip/common/sdk_linux/drivers/gpu/drm/bridge/synopsys/ |
H A D | dw-hdmi-hdcp.h | 42 struct hdcp_keys *keys; member
|