Searched refs:SEC (Results 1 – 19 of 19) sorted by relevance
/third_party/ltp/testcases/kernel/syscalls/getitimer/ |
D | getitimer01.c | 17 #define SEC 100 macro 60 set_setitimer_value(SEC, USEC); in verify_getitimer() 66 TST_EXP_EQ_LI(value->it_interval.tv_sec, SEC); in verify_getitimer() 79 if (value->it_value.tv_sec == SEC) { in verify_getitimer() 86 value->it_value.tv_sec > SEC) in verify_getitimer()
|
/third_party/libbpf/ |
D | README_OH.md | 36 char LICENSE[] SEC("license") = "Dual BSD/GPL"; 38 SEC("kprobe/do_unlinkat") 50 SEC("kretprobe/do_unlinkat")
|
/third_party/libbpf/docs/ |
D | program_types.rst | 11 - ``type`` is an exact match, e.g. ``SEC("socket")`` 12 - ``type+`` means it can be either exact ``SEC("type")`` or well-formed ``SEC("type/extras")`` 16 format of ``extras`` depends on the program type, e.g. ``SEC("tracepoint/<category>/<name>")`` 17 for tracepoints or ``SEC("usdt/<path>:<provider>:<name>")`` for USDT probes. The extras are
|
/third_party/nghttp2/bpf/ |
D | reuseport_kern.c | 431 } cid_prefix_map SEC(".maps"); 438 } reuseport_array SEC(".maps"); 445 } sk_info SEC(".maps"); 573 SEC("sk_reuseport")
|
/third_party/libbpf/src/ |
D | usdt.bpf.h | 68 } __bpf_usdt_specs SEC(".maps") __weak; 75 } __bpf_usdt_ip_to_spec_id SEC(".maps") __weak;
|
D | bpf_helpers.h | 32 #define SEC(name) __attribute__((section(name), used)) macro 36 #define SEC(name) \ macro
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ecp.data | 352 Check ECP group metadata #1 secp192k1 (SEC 2) 356 Check ECP group metadata #2 secp192r1 (SEC 2) 360 Check ECP group metadata #3 secp224k1 (SEC 2) 364 Check ECP group metadata #4 secp224r1 (SEC 2) 368 Check ECP group metadata #5 secp256k1 (SEC 2) 372 Check ECP group metadata #6 secp256r1 (SEC 2) 376 Check ECP group metadata #7 secp384r1 (SEC 2) 380 Check ECP group metadata #8 secp521r1 (SEC 2)
|
/third_party/openssl/doc/man7/ |
D | EVP_PKEY-EC.pod | 64 operations. The encoding conforms with Sec. 2.3.3 of the SECG SEC 1 ("Elliptic Curve 114 2.3.4 of the SECG SEC 1 ("Elliptic Curve Cryptography") standard. 134 is expected to be a point conforming to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic
|
D | EVP_KDF-X963.pod | 83 "SEC 1: Elliptic Curve Cryptography"
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_set1_encoded_public_key.pod | 39 should be a point conforming to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic
|
D | EC_POINT_new.pod | 187 The encoding conforms with Sec. 2.3.3 of the SECG SEC 1 ("Elliptic Curve 191 to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic Curve Cryptography") standard.
|
/third_party/openssl/doc/man1/ |
D | openssl-ec.pod.in | 40 private key format specified in 'SEC 1: Elliptic Curve Cryptography'
|
/third_party/python/Lib/test/ |
D | datetimetester.py | 5560 SEC = timedelta(0, 1) variable 5586 offset = ti[0][0] // SEC 5590 lt[0][i] += ti[i-1][0] // SEC 5591 lt[1][i] += ti[i][0] // SEC 5879 s0 = (udt - datetime(1970, 1, 1)) // SEC 5880 ss = shift // SEC # shift seconds
|
/third_party/openssl/crypto/objects/ |
D | objects.txt | 102 # SECG curve OIDs from "SEC 2: Recommended Elliptic Curve Domain Parameters"
|
/third_party/node/deps/openssl/openssl/crypto/objects/ |
D | objects.txt | 102 # SECG curve OIDs from "SEC 2: Recommended Elliptic Curve Domain Parameters"
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | ChangeLog | 401 - do not allow 40 MHz co-ex PRI/SEC switch to force MCC
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | ChangeLog | 348 - do not allow 40 MHz co-ex PRI/SEC switch to force MCC
|
/third_party/elfutils/src/ |
D | ChangeLog | 4247 * unstrip.c (copy_elided_sections): Initialize SEC.
|
/third_party/tzdata/ |
D | northamerica | 293 # H.R. 6, Energy Policy Act of 2005, SEC. 110. DAYLIGHT SAVINGS.
|