/third_party/alsa-utils/alsamixer/ |
H A D | curskey.c | 9 char *keyname; member 21 // Sorted by `keyname` 44 return strcmp(((struct curskey_key*) a)->keyname, in curskey_key_cmp() 45 ((struct curskey_key*) b)->keyname); in curskey_key_cmp() 56 cmp = strcasecmp(name, table[i].keyname); in curskey_find() 104 free(keynames[--keynames_count].keyname); in free_ncurses_keynames() 121 name = (char*) keyname(key); in create_ncurses_keynames() 131 keynames[keynames_count].keyname = cstrdup(name); in create_ncurses_keynames() 217 * - Curses keyname, no modifiers allowed (KEY_HOME, HOME, F1, F(1), ...)
|
/third_party/libinput/tools/ |
H A D | libinput-debug-events.c | 320 const char *keyname; in print_key_event() local 327 keyname = "***"; in print_key_event() 330 keyname = libevdev_event_code_get_name(EV_KEY, key); in print_key_event() 331 keyname = keyname ? keyname : "???"; in print_key_event() 334 keyname, in print_key_event() 803 const char *keyname; in print_tablet_pad_key_event() local 809 keyname = "***"; in print_tablet_pad_key_event() 812 keyname in print_tablet_pad_key_event() [all...] |
/kernel/linux/linux-5.10/drivers/staging/comedi/drivers/ni_routing/tools/ |
H A D | convert_csv_to_c.py | 78 keyname = 'src' 82 keyname = 'dest' 99 lines.append('{I1}{{\n{I2}.{keyname} = {D0_sig},\n' 101 .format(keyname=keyname, valname=valname, D0_sig=D0_sig, **indents) 109 lines.append('{I1}{{ /* Termination of list */\n{I2}.{keyname} = 0,\n{I1}}},' 110 .format(keyname=keyname, **indents))
|
/kernel/linux/linux-6.6/drivers/comedi/drivers/ni_routing/tools/ |
H A D | convert_csv_to_c.py | 77 keyname = 'src' 81 keyname = 'dest' 98 lines.append('{I1}{{\n{I2}.{keyname} = {D0_sig},\n' 100 .format(keyname=keyname, valname=valname, D0_sig=D0_sig, **indents) 108 lines.append('{I1}{{ /* Termination of list */\n{I2}.{keyname} = 0,\n{I1}}},' 109 .format(keyname=keyname, **indents))
|
/third_party/node/test/parallel/ |
H A D | test-tls-dhe.js | 51 const keyname = `dh${n}.pem`; 52 return fixtures.readKey(keyname);
|
H A D | test-http2-create-client-secure-session.js | 16 function loadKey(keyname) { 17 return fixtures.readKey(keyname, 'binary');
|
/third_party/libdrm/radeon/ |
H A D | bof.h | 60 extern bof_t *bof_object_get(bof_t *object, const char *keyname); 61 extern int bof_object_set(bof_t *object, const char *keyname, bof_t *value);
|
H A D | bof.c | 64 bof_t *bof_object_get(bof_t *object, const char *keyname) in bof_object_get() argument 69 if (!strcmp(object->array[i]->value, keyname)) { in bof_object_get() 76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) in bof_object_set() argument 86 key = bof_string(keyname); in bof_object_set()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/NVPTX/ |
H A D | NVPTXUtilities.cpp | 61 std::string keyname = prop->getString().str(); in cacheAnnotationFromMD() local 62 if (retval.find(keyname) != retval.end()) in cacheAnnotationFromMD() 63 retval[keyname].push_back(Val->getZExtValue()); in cacheAnnotationFromMD() 67 retval[keyname] = tmp; in cacheAnnotationFromMD()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_common.c | 247 if (tlvs->keyname) { in erp_parse_tlvs() 252 tlvs->keyname = pos; in erp_parse_tlvs()
|
H A D | eap_common.h | 15 const u8 *keyname; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_common.c | 247 if (tlvs->keyname) { in erp_parse_tlvs() 252 tlvs->keyname = pos; in erp_parse_tlvs()
|
H A D | eap_common.h | 15 const u8 *keyname; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 64 const char *keyname) in eap_erp_get_key() 67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key() 839 if (!parse.keyname) { in SM_STATE() 846 parse.keyname, parse.keyname_len); in SM_STATE() 852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 888 start = parse.keyname + parse.keyname_len; in SM_STATE() 2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity() 2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2061 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity() 63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument [all...] |
H A D | eap.h | 106 const char *keyname);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server.c | 63 const char *keyname) in eap_erp_get_key() 66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key() 848 if (!parse.keyname) { in SM_STATE() 855 parse.keyname, parse.keyname_len); in SM_STATE() 861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 897 start = parse.keyname + parse.keyname_len; in SM_STATE() 2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity() 2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2038 os_memcpy(sm->identity, parse.keyname, pars in eap_erp_update_identity() 62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) eap_erp_get_key() argument [all...] |
H A D | eap.h | 106 const char *keyname);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 60 const char *keyname);
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 284 keyname = opt_arg(); in pkcs12_main() 383 if (keyname != NULL) in pkcs12_main() 535 key = load_key(keyname ? keyname : infile, in pkcs12_main() 537 keyname ? in pkcs12_main()
|
/third_party/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 284 keyname = opt_arg(); in pkcs12_main() 383 if (keyname != NULL) in pkcs12_main() 535 key = load_key(keyname ? keyname : infile, in pkcs12_main() 537 keyname ? in pkcs12_main()
|
/kernel/linux/linux-5.10/fs/afs/ |
H A D | cell.c | 647 char keyname[4 + AFS_MAXCELLNAME + 1], *cp, *dp; in afs_alloc_anon_key() local 650 memcpy(keyname, "afs@", 4); in afs_alloc_anon_key() 651 dp = keyname + 4; in afs_alloc_anon_key() 657 key = rxrpc_get_null_key(keyname); in afs_alloc_anon_key()
|
/kernel/linux/linux-6.6/fs/afs/ |
H A D | cell.c | 646 char keyname[4 + AFS_MAXCELLNAME + 1], *cp, *dp; in afs_alloc_anon_key() local 649 memcpy(keyname, "afs@", 4); in afs_alloc_anon_key() 650 dp = keyname + 4; in afs_alloc_anon_key() 656 key = rxrpc_get_null_key(keyname); in afs_alloc_anon_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 84 const char *keyname);
|
/third_party/python/Lib/test/ |
H A D | test_curses.py | 1002 self.assertEqual(curses.keyname(65), b'A') 1003 self.assertEqual(curses.keyname(13), b'^M') 1004 self.assertEqual(curses.keyname(127), b'^?') 1005 self.assertEqual(curses.keyname(0), b'^@') 1006 self.assertRaises(ValueError, curses.keyname, -1) 1007 self.assertIsInstance(curses.keyname(256), bytes)
|
/third_party/node/src/quic/ |
H A D | sessionticket.cc | 119 const unsigned char* keyname, in DecryptedCallback() 117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
|