/third_party/python/Lib/test/ |
H A D | test_dictviews.py | 10 kt = type({}.keys()) 22 keys = d.keys() 23 self.assertEqual(len(keys), 2) 24 self.assertEqual(set(keys), {1, "a"}) 25 self.assertEqual(keys, {1, "a"}) 26 self.assertNotEqual(keys, {1, "a", "b"}) 27 self.assertNotEqual(keys, {1, "b"}) 28 self.assertNotEqual(keys, {1}) 29 self.assertNotEqual(keys, 4 [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 441 const u8 *SK_a = initiator ? keys->SK_ai : keys in ikev2_decrypt_payload() 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) ikev2_derive_auth_data() argument 428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument 530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) ikev2_build_encrypted() argument 608 ikev2_keys_set(struct ikev2_keys *keys) ikev2_keys_set() argument 615 ikev2_free_keys(struct ikev2_keys *keys) ikev2_free_keys() argument 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 441 const u8 *SK_a = initiator ? keys->SK_ai : keys in ikev2_decrypt_payload() 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) ikev2_derive_auth_data() argument 428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument 530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) ikev2_build_encrypted() argument 608 ikev2_keys_set(struct ikev2_keys *keys) ikev2_keys_set() argument 615 ikev2_free_keys(struct ikev2_keys *keys) ikev2_free_keys() argument 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument [all...] |
/third_party/typescript/tests/baselines/reference/ |
H A D | inferStringLiteralUnionForBindingElement.js | 2 declare function func<T extends string>(arg: { keys: T[] }): { readonly keys: T[]; readonly firstKey: T; }; 5 const { firstKey } = func({keys: ["aa", "bb"]}) 8 const { keys } = func({keys: ["aa", "bb"]}) 9 const b: ("aa" | "bb")[] = keys; 13 const { keys, firstKey } = func({keys: ["aa", "bb"]}) 15 const b: ("aa" | "bb")[] = keys; 19 const x = func({keys [all...] |
/third_party/jerryscript/tests/jerry/es2015/ |
H A D | reflect-own-keys.js | 54 var keys = Reflect.ownKeys (obj); variable 55 assert (2 === keys.length); 56 assert ("a" === keys[0]); 57 assert ("b" === keys[1]); 60 var keys = Reflect.ownKeys (obj); variable 61 assert (2 === keys.length); 62 assert ("a" === keys[0]); 63 assert ("b" === keys[1]); 68 var keys = Reflect.ownKeys (obj) variable 69 assert (2 === keys 74 var keys = Reflect.ownKeys ([1, 2]); global() variable [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | asfcrypt.c | 50 * @brief read keys from keybuf into keys 51 * @param keybuf buffer containing the keys 52 * @param keys output key array containing the keys for encryption in 55 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) in multiswap_init() argument 59 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; in multiswap_init() 63 * @brief invert the keys so that encryption become decryption keys and 65 * @param keys ke 67 multiswap_invert_keys(uint32_t keys[12]) multiswap_invert_keys() argument 76 multiswap_step(const uint32_t keys[12], uint32_t v) multiswap_step() argument 88 multiswap_inv_step(const uint32_t keys[12], uint32_t v) multiswap_inv_step() argument 108 multiswap_enc(const uint32_t keys[12], uint64_t key, uint64_t data) multiswap_enc() argument 132 multiswap_dec(const uint32_t keys[12], uint64_t key, uint64_t data) multiswap_dec() argument [all...] |
/third_party/ltp/pan/ |
H A D | tag_report.c | 109 int cuts_report(SYM tags, SYM keys, char *at, char *tag) in cuts_report() argument 187 (char *)Data.data, keys); in cuts_report() 193 test_result(tag, "*", "*", result, keys); in cuts_report() 196 test_result(tag, "-", "-", "TC count wrong", keys); in cuts_report() 211 * I could get a key (tag), get it's sub-keys (TCIDs), then get the key 225 int tag_report(SYM alltags, SYM ctag, SYM keys) in tag_report() argument 239 if ((tag = (char *)sym_get(keys, key_get)) == NULL) { in tag_report() 245 if ((is = (char *)sym_get(keys, key_get)) == NULL) { in tag_report() 246 test_result(tag, NULL, NULL, "no init status", keys); in tag_report() 251 test_result(tag, NULL, NULL, is, keys); in tag_report() 418 cuts_testcase(SYM tag, SYM keys) cuts_testcase() argument [all...] |
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
H A D | root.js | 16 * The top-level role and metadata file signed by the root keys. 17 * This role specifies trusted keys for all other top-level roles, which may further delegate trust. 23 this.keys = options.keys || {}; 32 const roleNames = new Set(Object.keys(options.roles)); 46 this.keys[key.keyID] = key; 54 util_1.default.isDeepStrictEqual(this.keys, other.keys) && 63 keys: keysToJSON(this.keys), [all...] |
H A D | delegations.js | 20 this.keys = options.keys; 23 if (Object.keys(options.roles).some((roleName) => role_1.TOP_LEVEL_ROLE_NAMES.includes(roleName))) { 34 return (util_1.default.isDeepStrictEqual(this.keys, other.keys) && 56 keys: keysToJSON(this.keys), 68 const { keys, roles, succinct_roles, ...unrecognizedFields } = data; 74 keys: keysFromJSON(keys), [all...] |
/third_party/libphonenumber/metadata/src/test/java/com/google/i18n/phonenumbers/metadata/table/ |
H A D | RangeKeyTest.java | 35 ImmutableList<RangeKey> keys = RangeKey.decompose(RangeTree.empty()); in testEmpty() 36 assertThat(keys).isEmpty(); in testEmpty() 41 ImmutableList<RangeKey> keys = RangeKey.decompose(RangeTree.from(RangeSpecification.empty())); in testZeroLengthMatch() 42 assertThat(keys).containsExactly(key("", 0)); in testZeroLengthMatch() 47 ImmutableList<RangeKey> keys = RangeKey.decompose(ranges("xxx", "xxxx", "xxxxx")); in testOnlyAnyPath() 48 assertThat(keys).containsExactly(key("", 3, 4, 5)); in testOnlyAnyPath() 53 ImmutableList<RangeKey> keys = RangeKey.decompose(ranges("123xxx", "123xxxx", "123xxxxx")); in testSimple() 54 assertThat(keys).containsExactly(key("123", 6, 7, 8)); in testSimple() 59 ImmutableList<RangeKey> keys = in testEmbeddedRanges() 61 assertThat(keys) in testEmbeddedRanges() [all...] |
/third_party/libwebsockets/plugins/ssh-base/crypto/ |
H A D | chacha.c | 238 lws_chacha_activate(struct lws_ssh_keys *keys) in lws_chacha_activate() argument 240 if (keys->cipher) { in lws_chacha_activate() 241 free(keys->cipher); in lws_chacha_activate() 242 keys->cipher = NULL; in lws_chacha_activate() 245 keys->cipher = malloc(sizeof(struct lws_cipher_chacha)); in lws_chacha_activate() 246 if (!keys->cipher) in lws_chacha_activate() 249 memset(keys->cipher, 0, sizeof(struct lws_cipher_chacha)); in lws_chacha_activate() 251 /* uses 2 x 256-bit keys, so 512 bits (64 bytes) needed */ in lws_chacha_activate() 252 chacha_keysetup(K_2(keys), keys in lws_chacha_activate() 264 lws_chacha_destroy(struct lws_ssh_keys *keys) lws_chacha_destroy() argument 273 lws_chachapoly_get_length(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *in4) lws_chachapoly_get_length() argument 302 chachapoly_crypt(struct lws_ssh_keys *keys, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) chachapoly_crypt() argument 355 lws_chacha_decrypt(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *ct, uint32_t len, uint8_t *pt) lws_chacha_decrypt() argument 363 lws_chacha_encrypt(struct lws_ssh_keys *keys, uint32_t seq, const uint8_t *ct, uint32_t len, uint8_t *pt) lws_chacha_encrypt() argument [all...] |
/third_party/skia/experimental/tools/ |
H A D | get_examples.py | 52 keys = parse_fiddle_sk(match.group(1)) 55 width = keys.get('width', '256') 56 height = keys.get('height', '256') 57 source_image = keys.get('source', 256) 58 duration = keys.get('duration', '0') 59 textonly = 'textonly' in keys 60 srgb = not textonly and 'srgb' in keys 61 f16 = srgb and 'f16' in keys 62 offscreen = 'offscreen' in keys 82 keys [all...] |
/third_party/mesa3d/src/panfrost/bifrost/ |
H A D | gen_disasm.py | 56 options = [n for n in instructions.keys() if (n[0] == '*') == is_fma] 131 keys = set() 134 keys |= find_context_keys_expr(test) 139 keys |= find_context_keys_expr(val) 141 return keys 152 def compile_derived_inner(expr, keys): 158 args = [compile_derived_inner(arg, keys) for arg in expr[1:]] 165 return "ctx[{}]".format(keys.index(expr)) 167 def compile_derived(expr, keys): 168 return eval('lambda ctx, ordering: ' + compile_derived_inner(expr, keys)) [all...] |
/third_party/rust/crates/clap/src/util/ |
H A D | flat_map.rs | 10 keys: Vec<K>, 20 for (index, existing) in self.keys.iter().enumerate() { 32 self.keys.push(key); 47 for existing in &self.keys { in contains_key() 69 .keys in remove_entry() 73 let key = self.keys.remove(index); in remove_entry() 79 self.keys.is_empty() 83 for (index, existing) in self.keys.iter().enumerate() { in entry() 96 for (index, existing) in self.keys.iter().enumerate() { in get() 109 for (index, existing) in self.keys in get_mut() 117 pub fn keys(&self) -> std::slice::Iter<'_, K> { keys() functions [all...] |
/third_party/node/test/parallel/ |
H A D | test-webcrypto-wrap-unwrap.js | 48 return Promise.all(Object.keys(kWrappingData).map(async (name) => { 49 const keys = await subtle.generateKey( 54 kWrappingData[name].wrappingKey = keys.publicKey; 55 kWrappingData[name].unwrappingKey = keys.privateKey; 57 kWrappingData[name].wrappingKey = keys; 58 kWrappingData[name].unwrappingKey = keys; 195 const keys = await subtle.generateKey(params.algorithm, true, usages); 202 key: keys.publicKey, 207 key: keys.privateKey, 215 key: keys, [all...] |
/third_party/node/benchmark/crypto/ |
H A D | oneshot-verify.js | 7 const fixtures_keydir = path.resolve(__dirname, '../../test/fixtures/keys/'); 45 function measureSync(n, digest, signature, publicKey, keys) { 51 publicKey || keys[i], 57 function measureAsync(n, digest, signature, publicKey, keys) { 70 publicKey || keys[n - remaining], 78 function measureAsyncParallel(n, digest, signature, publicKey, keys) { 89 publicKey || keys[i], 99 let publicKey, keys, digest; 128 keys = keyObjects; 140 measureSync(n, digest, signature, publicKey, keys); [all...] |
H A D | oneshot-sign.js | 7 const fixtures_keydir = path.resolve(__dirname, '../../test/fixtures/keys/'); 34 function measureSync(n, digest, privateKey, keys) { 40 privateKey || keys[i]); 45 function measureAsync(n, digest, privateKey, keys) { 58 privateKey || keys[n - remaining], 65 function measureAsyncParallel(n, digest, privateKey, keys) { 76 privateKey || keys[i], 85 let privateKey, keys, digest; 114 keys = keyObjects; 122 measureSync(n, digest, privateKey, keys); [all...] |
/third_party/python/Tools/scripts/ |
H A D | parse_html5_entities.py | 34 added = new.keys() - old.keys() 39 removed = old.keys() - new.keys() 45 for name in (old.keys() & new.keys()): 55 # The keys in the generated dictionary should be sorted 56 # in a case-insensitive way, however, when two keys are equal, 61 # Since the sorting is stable the uppercase keys will eventually 63 keys [all...] |
/third_party/icu/icu4c/source/samples/legacy/ |
H A D | legacy.cpp | 31 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]); 32 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]); 55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys() argument 60 currentKey = keys[i]; in printKeys() 94 static uint8_t keys[4][32]; in main() local 102 test_current(uTest, 4, 5, keys); in main() 104 printKeys("Current keys", keys, 4); in main() 110 test_legacy(uTest, 4, 5, keys); in main() 112 printKeys("Legacy keys", key in main() [all...] |
/third_party/skia/third_party/externals/icu/source/samples/legacy/ |
H A D | legacy.cpp | 31 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]); 32 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]); 55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys() argument 60 currentKey = keys[i]; in printKeys() 94 static uint8_t keys[4][32]; in main() local 102 test_current(uTest, 4, 5, keys); in main() 104 printKeys("Current keys", keys, 4); in main() 110 test_legacy(uTest, 4, 5, keys); in main() 112 printKeys("Legacy keys", key in main() [all...] |
/third_party/mbedtls/tests/scripts/ |
H A D | generate_tls13_compat_tests.py | 111 self._cert_sig_algs = list(CERTIFICATES.keys()) 580 parser.add_argument('server', choices=SERVER_CLASSES.keys(), nargs='?', 581 default=list(SERVER_CLASSES.keys())[0], 583 parser.add_argument('client', choices=CLIENT_CLASSES.keys(), nargs='?', 584 default=list(CLIENT_CLASSES.keys())[0], 586 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?', 587 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0], 589 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?', 590 default=list(SIG_ALG_IANA_VALUE.keys())[0], 592 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), narg [all...] |
/third_party/skia/src/core/ |
H A D | SkScalar.cpp | 12 SkScalar SkScalarInterpFunc(SkScalar searchKey, const SkScalar keys[], in SkScalarInterpFunc() argument 15 SkASSERT(keys != nullptr); in SkScalarInterpFunc() 19 SkASSERT(keys[i-1] <= keys[i]); in SkScalarInterpFunc() 23 while (right < length && keys[right] < searchKey) { in SkScalarInterpFunc() 35 SkScalar leftKey = keys[right-1]; in SkScalarInterpFunc() 36 SkScalar rightKey = keys[right]; in SkScalarInterpFunc()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_test_common_source.c | 23 eap_tls_keys *keys = (eap_tls_keys *) p_expkey; in eap_tls_key_derivation() local 29 if (secret_len != sizeof(keys->master_secret)) { in eap_tls_key_derivation() 33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation() 34 memcpy(keys->randbytes, client_random, 32); in eap_tls_key_derivation() 35 memcpy(keys->randbytes + 32, server_random, 32); in eap_tls_key_derivation() 36 keys->tls_prf_type = tls_prf_type; in eap_tls_key_derivation() 117 dtls_srtp_keys *keys = (dtls_srtp_keys *) p_expkey; in dtls_srtp_key_derivation() local 123 if (secret_len != sizeof(keys->master_secret)) { in dtls_srtp_key_derivation() 127 memcpy(keys in dtls_srtp_key_derivation() [all...] |
/third_party/jerryscript/tests/jerry-test-suite/15/15.02/15.02.03/ |
H A D | 15.02.03-004.js | 22 var keys = Object.keys(object); 24 assert(keys[0] == "prop1" && 25 keys[1] == "prop2" && 26 keys[2] == "prop3" && 27 keys[3] == "prop4");
|
/third_party/libinput/tools/ |
H A D | libinput-record-verify-yaml.py | 44 def dict_key_crosscheck(self, d, keys): 45 """Check that each key in d is in keys, and that each key is in d""" 46 self.assertEqual(sorted(d.keys()), sorted(keys)) 292 keys = ["type", "seat", "logical_seat"] 294 self.dict_key_crosscheck(e, keys) 299 keys = ["type", "time", "delta", "unaccel"] 301 self.dict_key_crosscheck(e, keys) 314 keys = ["type", "time", "button", "state", "seat_count"] 316 self.dict_key_crosscheck(e, keys) [all...] |