Home
last modified time | relevance | path

Searched refs:keys (Results 801 - 825 of 3101) sorted by relevance

1...<<31323334353637383940>>...125

/third_party/skia/third_party/externals/egl-registry/api/
H A Dreg.py1153 if ('group' in proto.attrib.keys()):
1156 if (group not in self.groupdict.keys()):
1158 if (group not in badGroup.keys()):
1168 if ('group' in param.attrib.keys()):
1170 if (group not in self.groupdict.keys()):
1172 if (group not in badGroup.keys()):
1176 if (len(badGroup.keys()) > 0):
1178 for key in sorted(badGroup.keys()):
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_gnutls.c878 struct tls_random *keys) in tls_connection_get_random()
883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random()
886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random()
888 keys->client_random = client.data; in tls_connection_get_random()
889 keys->server_random = server.data; in tls_connection_get_random()
890 keys->client_random_len = client.size; in tls_connection_get_random()
891 keys->server_random_len = client.size; in tls_connection_get_random()
877 tls_connection_get_random(void *ssl_ctx, struct tls_connection *conn, struct tls_random *keys) tls_connection_get_random() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dikev2.c19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit()
110 &data->keys); in ikev2_derive_keys()
550 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret()
579 "using shared keys"); in ikev2_process_auth_secret()
655 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth()
1002 &data->keys, 0, data->shared_secret, in ikev2_build_auth()
1117 &data->keys, 0, msg, plain, in ikev2_build_sa_init()
1159 &data->keys, 0, msg, plain, in ikev2_build_sa_auth()
1195 &data->keys, 0, msg, plain, in ikev2_build_notify()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_gnutls.c878 struct tls_random *keys) in tls_connection_get_random()
883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random()
886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random()
888 keys->client_random = client.data; in tls_connection_get_random()
889 keys->server_random = server.data; in tls_connection_get_random()
890 keys->client_random_len = client.size; in tls_connection_get_random()
891 keys->server_random_len = client.size; in tls_connection_get_random()
877 tls_connection_get_random(void *ssl_ctx, struct tls_connection *conn, struct tls_random *keys) tls_connection_get_random() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Dikev2.c19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit()
110 &data->keys); in ikev2_derive_keys()
552 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret()
581 "using shared keys"); in ikev2_process_auth_secret()
657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth()
1004 &data->keys, 0, data->shared_secret, in ikev2_build_auth()
1119 &data->keys, 0, msg, plain, in ikev2_build_sa_init()
1161 &data->keys, 0, msg, plain, in ikev2_build_sa_auth()
1197 &data->keys, 0, msg, plain, in ikev2_build_notify()
/kernel/linux/linux-5.10/drivers/md/
H A Ddm-thin-metadata.c38 * followed by an array of keys, followed by an array of values. We have
39 * to binary search on the keys so they're all held together to help the
1507 dm_block_t keys[2] = { td->id, block }; in __find_block() local
1515 r = dm_btree_lookup(info, pmd->root, keys, &value); in __find_block()
1547 dm_block_t keys[2] = { td->id, block }; in __find_next_mapped_block() local
1549 r = dm_btree_lookup_next(&pmd->info, pmd->root, keys, vblock, &value); in __find_next_mapped_block()
1626 dm_block_t keys[2] = { td->id, block }; in __insert() local
1631 r = dm_btree_insert_notify(&pmd->info, pmd->root, keys, &value, in __insert()
1660 dm_block_t keys[2] = { td->id, block }; in __remove() local
1662 r = dm_btree_remove(&pmd->info, pmd->root, keys, in __remove()
1677 dm_block_t keys[1] = { td->id }; __remove_range() local
[all...]
/test/xts/acts/hiviewdfx/hiappeventtest/hiappeventcpptest/
H A DHiAppEventCPPTest.cpp809 string keys[maxLen + 1]; in HWTEST_F() local
814 keys[i] = "key" + std::to_string(i); in HWTEST_F()
816 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F()
1074 string keys[maxLen+1]; in HWTEST_F() local
1079 keys[i] = "key" + std::to_string(i); in HWTEST_F()
1081 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F()
1116 string keys[maxLen+1]; in HWTEST_F() local
1132 keys[i] = "key" + std::to_string(i); in HWTEST_F()
1134 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F()
1166 string keys[maxLe in HWTEST_F() local
[all...]
/drivers/hdf_core/framework/tools/hdf_dev_eco_tool/command_line/
H A Dhdf_tool_commands.py46 for cmd in self.commands.keys():
/drivers/interface/display/buffer/v1_1/include/
H A Didisplay_buffer.h41 virtual int32_t ListMetadataKeys(const BufferHandle& handle, std::vector<uint32_t>& keys) = 0;
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dx509_parser.h10 #include <keys/asymmetric-type.h>
/kernel/linux/linux-5.10/drivers/net/ethernet/cisco/enic/
H A Denic_clsf.h10 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
/kernel/linux/linux-6.6/include/linux/
H A Dpr.h10 u64 keys[]; member
30 * pr_read_keys - Read the registered keys and return them in the
31 * pr_keys->keys array. The keys array will have been allocated at the
33 * number of keys the array can hold. If there are more than can fit
35 * will reflect the total number of keys the device contains, so the
/kernel/linux/linux-6.6/drivers/net/ethernet/cisco/enic/
H A Denic_clsf.h10 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dx509_parser.h10 #include <keys/asymmetric-type.h>
H A Dx509_loader.c5 #include <keys/asymmetric-type.h>
/third_party/curl/lib/
H A Dcurl_ntlm_core.h43 void Curl_ntlm_core_lm_resp(const unsigned char *keys,
/third_party/node/test/parallel/
H A Dtest-event-emitter-subclass.js51 assert.deepStrictEqual(Object.keys(myee._events), []);
H A Dtest-http-agent-maxsockets-respected.js49 const sockets = agent.sockets[Object.keys(agent.sockets)[0]];
H A Dtest-worker-messageport-hasref.js22 for (const asyncId of m.keys()) {
H A Dtest-worker-terminate-source-map.js41 Object.keys = increaseCallCount;
/third_party/node/test/pseudo-tty/
H A Dtest-async-wrap-getasyncid-tty.js26 const objKeys = Object.keys(providers);
/third_party/node/benchmark/util/
H A Dtype-check.js29 type: Object.keys(args),
H A Dnormalize-encoding.js23 input: inputs.concat(Object.keys(groupedInputs)),
/third_party/node/benchmark/url/
H A Dlegacy-vs-whatwg-url-searchparams-parse.js7 searchParam: Object.keys(searchParams),
/third_party/mesa3d/src/mapi/glapi/gen/
H A Dapi_vtxfmt_init_h.py72 for condition in sorted(settings_by_condition.keys()):

Completed in 27 milliseconds

1...<<31323334353637383940>>...125