/third_party/skia/third_party/externals/egl-registry/api/ |
H A D | reg.py | 1153 if ('group' in proto.attrib.keys()): 1156 if (group not in self.groupdict.keys()): 1158 if (group not in badGroup.keys()): 1168 if ('group' in param.attrib.keys()): 1170 if (group not in self.groupdict.keys()): 1172 if (group not in badGroup.keys()): 1176 if (len(badGroup.keys()) > 0): 1178 for key in sorted(badGroup.keys()):
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_gnutls.c | 878 struct tls_random *keys) in tls_connection_get_random() 883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random() 886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random() 888 keys->client_random = client.data; in tls_connection_get_random() 889 keys->server_random = server.data; in tls_connection_get_random() 890 keys->client_random_len = client.size; in tls_connection_get_random() 891 keys->server_random_len = client.size; in tls_connection_get_random() 877 tls_connection_get_random(void *ssl_ctx, struct tls_connection *conn, struct tls_random *keys) tls_connection_get_random() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | ikev2.c | 19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit() 110 &data->keys); in ikev2_derive_keys() 550 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret() 579 "using shared keys"); in ikev2_process_auth_secret() 655 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth() 1002 &data->keys, 0, data->shared_secret, in ikev2_build_auth() 1117 &data->keys, 0, msg, plain, in ikev2_build_sa_init() 1159 &data->keys, 0, msg, plain, in ikev2_build_sa_auth() 1195 &data->keys, 0, msg, plain, in ikev2_build_notify()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_gnutls.c | 878 struct tls_random *keys) in tls_connection_get_random() 883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random() 886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random() 888 keys->client_random = client.data; in tls_connection_get_random() 889 keys->server_random = server.data; in tls_connection_get_random() 890 keys->client_random_len = client.size; in tls_connection_get_random() 891 keys->server_random_len = client.size; in tls_connection_get_random() 877 tls_connection_get_random(void *ssl_ctx, struct tls_connection *conn, struct tls_random *keys) tls_connection_get_random() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | ikev2.c | 19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit() 110 &data->keys); in ikev2_derive_keys() 552 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret() 581 "using shared keys"); in ikev2_process_auth_secret() 657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth() 1004 &data->keys, 0, data->shared_secret, in ikev2_build_auth() 1119 &data->keys, 0, msg, plain, in ikev2_build_sa_init() 1161 &data->keys, 0, msg, plain, in ikev2_build_sa_auth() 1197 &data->keys, 0, msg, plain, in ikev2_build_notify()
|
/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-thin-metadata.c | 38 * followed by an array of keys, followed by an array of values. We have 39 * to binary search on the keys so they're all held together to help the 1507 dm_block_t keys[2] = { td->id, block }; in __find_block() local 1515 r = dm_btree_lookup(info, pmd->root, keys, &value); in __find_block() 1547 dm_block_t keys[2] = { td->id, block }; in __find_next_mapped_block() local 1549 r = dm_btree_lookup_next(&pmd->info, pmd->root, keys, vblock, &value); in __find_next_mapped_block() 1626 dm_block_t keys[2] = { td->id, block }; in __insert() local 1631 r = dm_btree_insert_notify(&pmd->info, pmd->root, keys, &value, in __insert() 1660 dm_block_t keys[2] = { td->id, block }; in __remove() local 1662 r = dm_btree_remove(&pmd->info, pmd->root, keys, in __remove() 1677 dm_block_t keys[1] = { td->id }; __remove_range() local [all...] |
/test/xts/acts/hiviewdfx/hiappeventtest/hiappeventcpptest/ |
H A D | HiAppEventCPPTest.cpp | 809 string keys[maxLen + 1]; in HWTEST_F() local 814 keys[i] = "key" + std::to_string(i); in HWTEST_F() 816 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F() 1074 string keys[maxLen+1]; in HWTEST_F() local 1079 keys[i] = "key" + std::to_string(i); in HWTEST_F() 1081 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F() 1116 string keys[maxLen+1]; in HWTEST_F() local 1132 keys[i] = "key" + std::to_string(i); in HWTEST_F() 1134 OH_HiAppEvent_AddStringParam(list, keys[i].c_str(), values[i].c_str()); in HWTEST_F() 1166 string keys[maxLe in HWTEST_F() local [all...] |
/drivers/hdf_core/framework/tools/hdf_dev_eco_tool/command_line/ |
H A D | hdf_tool_commands.py | 46 for cmd in self.commands.keys():
|
/drivers/interface/display/buffer/v1_1/include/ |
H A D | idisplay_buffer.h | 41 virtual int32_t ListMetadataKeys(const BufferHandle& handle, std::vector<uint32_t>& keys) = 0;
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_parser.h | 10 #include <keys/asymmetric-type.h>
|
/kernel/linux/linux-5.10/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.h | 10 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | pr.h | 10 u64 keys[]; member 30 * pr_read_keys - Read the registered keys and return them in the 31 * pr_keys->keys array. The keys array will have been allocated at the 33 * number of keys the array can hold. If there are more than can fit 35 * will reflect the total number of keys the device contains, so the
|
/kernel/linux/linux-6.6/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.h | 10 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_parser.h | 10 #include <keys/asymmetric-type.h>
|
H A D | x509_loader.c | 5 #include <keys/asymmetric-type.h>
|
/third_party/curl/lib/ |
H A D | curl_ntlm_core.h | 43 void Curl_ntlm_core_lm_resp(const unsigned char *keys,
|
/third_party/node/test/parallel/ |
H A D | test-event-emitter-subclass.js | 51 assert.deepStrictEqual(Object.keys(myee._events), []);
|
H A D | test-http-agent-maxsockets-respected.js | 49 const sockets = agent.sockets[Object.keys(agent.sockets)[0]];
|
H A D | test-worker-messageport-hasref.js | 22 for (const asyncId of m.keys()) {
|
H A D | test-worker-terminate-source-map.js | 41 Object.keys = increaseCallCount;
|
/third_party/node/test/pseudo-tty/ |
H A D | test-async-wrap-getasyncid-tty.js | 26 const objKeys = Object.keys(providers);
|
/third_party/node/benchmark/util/ |
H A D | type-check.js | 29 type: Object.keys(args),
|
H A D | normalize-encoding.js | 23 input: inputs.concat(Object.keys(groupedInputs)),
|
/third_party/node/benchmark/url/ |
H A D | legacy-vs-whatwg-url-searchparams-parse.js | 7 searchParam: Object.keys(searchParams),
|
/third_party/mesa3d/src/mapi/glapi/gen/ |
H A D | api_vtxfmt_init_h.py | 72 for condition in sorted(settings_by_condition.keys()):
|