Home
last modified time | relevance | path

Searched refs:keyname (Results 1 - 25 of 99) sorted by relevance

1234

/foundation/arkui/napi/test/unittest/
H A Dtest_ark_api_allowlist.cpp65 std::string keyname = nameValue->ToString(vm)->ToString(vm); in CheckPropertyNames() local
66 HILOG_INFO("exportCopy->system->function:%{public}s", keyname.c_str()); in CheckPropertyNames()
67 if (keyToCond.find(keyname) != keyToCond.end()) { in CheckPropertyNames()
68 keyToCond[keyname] = true; in CheckPropertyNames()
81 std::string keyname = nameValue->ToString(vm)->ToString(vm); in Test001() local
82 HILOG_INFO("exportCopy->function:%{public}s", keyname.c_str()); in Test001()
83 if (keyname == "System") { in Test001()
110 std::string keyname = nameValue->ToString(vm)->ToString(vm); in Test002() local
111 HILOG_INFO("exportCopy->function:%{public}s", keyname.c_str()); in Test002()
112 if (keyname in Test002()
[all...]
/third_party/alsa-utils/alsamixer/
H A Dcurskey.c9 char *keyname; member
21 // Sorted by `keyname`
44 return strcmp(((struct curskey_key*) a)->keyname, in curskey_key_cmp()
45 ((struct curskey_key*) b)->keyname); in curskey_key_cmp()
56 cmp = strcasecmp(name, table[i].keyname); in curskey_find()
104 free(keynames[--keynames_count].keyname); in free_ncurses_keynames()
121 name = (char*) keyname(key); in create_ncurses_keynames()
131 keynames[keynames_count].keyname = cstrdup(name); in create_ncurses_keynames()
217 * - Curses keyname, no modifiers allowed (KEY_HOME, HOME, F1, F(1), ...)
/third_party/libinput/tools/
H A Dlibinput-debug-events.c320 const char *keyname; in print_key_event() local
327 keyname = "***"; in print_key_event()
330 keyname = libevdev_event_code_get_name(EV_KEY, key); in print_key_event()
331 keyname = keyname ? keyname : "???"; in print_key_event()
334 keyname, in print_key_event()
803 const char *keyname; in print_tablet_pad_key_event() local
809 keyname = "***"; in print_tablet_pad_key_event()
812 keyname in print_tablet_pad_key_event()
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-dhe.js51 const keyname = `dh${n}.pem`;
52 return fixtures.readKey(keyname);
H A Dtest-http2-create-client-secure-session.js16 function loadKey(keyname) {
17 return fixtures.readKey(keyname, 'binary');
/third_party/libdrm/radeon/
H A Dbof.h60 extern bof_t *bof_object_get(bof_t *object, const char *keyname);
61 extern int bof_object_set(bof_t *object, const char *keyname, bof_t *value);
H A Dbof.c64 bof_t *bof_object_get(bof_t *object, const char *keyname) in bof_object_get() argument
69 if (!strcmp(object->array[i]->value, keyname)) { in bof_object_get()
76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) in bof_object_set() argument
86 key = bof_string(keyname); in bof_object_set()
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp61 std::string keyname = prop->getString().str(); in cacheAnnotationFromMD() local
62 if (retval.find(keyname) != retval.end()) in cacheAnnotationFromMD()
63 retval[keyname].push_back(Val->getZExtValue()); in cacheAnnotationFromMD()
67 retval[keyname] = tmp; in cacheAnnotationFromMD()
/test/testfwk/xdevice/src/xdevice/_core/resource/template/static/components/
H A DcaseTable.js84 props: ["list", "keyword", "keyname"],
112 if (this.keyname) {
114 return item[0] == this.keyname;
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_common.c247 if (tlvs->keyname) { in erp_parse_tlvs()
252 tlvs->keyname = pos; in erp_parse_tlvs()
H A Deap_common.h15 const u8 *keyname; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_common.c247 if (tlvs->keyname) { in erp_parse_tlvs()
252 tlvs->keyname = pos; in erp_parse_tlvs()
H A Deap_common.h15 const u8 *keyname; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/
H A Deapol_auth_sm.h60 const char *keyname);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server.c64 const char *keyname) in eap_erp_get_key()
67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key()
839 if (!parse.keyname) { in SM_STATE()
846 parse.keyname, parse.keyname_len); in SM_STATE()
852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
888 start = parse.keyname + parse.keyname_len; in SM_STATE()
2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity()
2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2061 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity()
63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument
[all...]
H A Deap.h106 const char *keyname);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server.c63 const char *keyname) in eap_erp_get_key()
66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key()
848 if (!parse.keyname) { in SM_STATE()
855 parse.keyname, parse.keyname_len); in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
897 start = parse.keyname + parse.keyname_len; in SM_STATE()
2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity()
2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2038 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity()
62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument
[all...]
H A Deap.h106 const char *keyname);
/third_party/node/deps/openssl/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local
284 keyname = opt_arg(); in pkcs12_main()
383 if (keyname != NULL) in pkcs12_main()
535 key = load_key(keyname ? keyname : infile, in pkcs12_main()
537 keyname ? in pkcs12_main()
/third_party/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local
284 keyname = opt_arg(); in pkcs12_main()
383 if (keyname != NULL) in pkcs12_main()
535 key = load_key(keyname ? keyname : infile, in pkcs12_main()
537 keyname ? in pkcs12_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/
H A Deapol_auth_sm.h84 const char *keyname);
/third_party/node/src/quic/
H A Dsessionticket.cc119 const unsigned char* keyname, in DecryptedCallback()
117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
/third_party/python/Lib/curses/
H A Dhas_key.py189 % (_curses.keyname( key ), system, python) )
/third_party/python/Lib/test/
H A Dtest_curses.py1002 self.assertEqual(curses.keyname(65), b'A')
1003 self.assertEqual(curses.keyname(13), b'^M')
1004 self.assertEqual(curses.keyname(127), b'^?')
1005 self.assertEqual(curses.keyname(0), b'^@')
1006 self.assertRaises(ValueError, curses.keyname, -1)
1007 self.assertIsInstance(curses.keyname(256), bytes)
/third_party/openssl/test/
H A Devp_test.c3056 char *keyname; /* Key name to store key or NULL */ member
3086 data->keyname = NULL; in keygen_test_init()
3101 OPENSSL_free(keygen->keyname); in keygen_test_cleanup()
3112 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse()
3130 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run()
3133 if (keygen->keyname != NULL) { in keygen_test_run()
3137 if (find_key(NULL, keygen->keyname, private_keys)) { in keygen_test_run()
3138 TEST_info("Duplicate key %s", keygen->keyname); in keygen_test_run()
3144 key->name = keygen->keyname; in keygen_test_run()
3145 keygen->keyname in keygen_test_run()
[all...]

Completed in 21 milliseconds

1234