Home
last modified time | relevance | path

Searched refs:SEC (Results 1 – 19 of 19) sorted by relevance

/third_party/ltp/testcases/kernel/syscalls/getitimer/
Dgetitimer01.c17 #define SEC 100 macro
60 set_setitimer_value(SEC, USEC); in verify_getitimer()
66 TST_EXP_EQ_LI(value->it_interval.tv_sec, SEC); in verify_getitimer()
79 if (value->it_value.tv_sec == SEC) { in verify_getitimer()
86 value->it_value.tv_sec > SEC) in verify_getitimer()
/third_party/libbpf/
DREADME_OH.md36 char LICENSE[] SEC("license") = "Dual BSD/GPL";
38 SEC("kprobe/do_unlinkat")
50 SEC("kretprobe/do_unlinkat")
/third_party/libbpf/docs/
Dprogram_types.rst11 - ``type`` is an exact match, e.g. ``SEC("socket")``
12 - ``type+`` means it can be either exact ``SEC("type")`` or well-formed ``SEC("type/extras")``
16 format of ``extras`` depends on the program type, e.g. ``SEC("tracepoint/<category>/<name>")``
17 for tracepoints or ``SEC("usdt/<path>:<provider>:<name>")`` for USDT probes. The extras are
/third_party/nghttp2/bpf/
Dreuseport_kern.c431 } cid_prefix_map SEC(".maps");
438 } reuseport_array SEC(".maps");
445 } sk_info SEC(".maps");
573 SEC("sk_reuseport")
/third_party/libbpf/src/
Dusdt.bpf.h68 } __bpf_usdt_specs SEC(".maps") __weak;
75 } __bpf_usdt_ip_to_spec_id SEC(".maps") __weak;
Dbpf_helpers.h32 #define SEC(name) __attribute__((section(name), used)) macro
36 #define SEC(name) \ macro
/third_party/mbedtls/tests/suites/
Dtest_suite_ecp.data352 Check ECP group metadata #1 secp192k1 (SEC 2)
356 Check ECP group metadata #2 secp192r1 (SEC 2)
360 Check ECP group metadata #3 secp224k1 (SEC 2)
364 Check ECP group metadata #4 secp224r1 (SEC 2)
368 Check ECP group metadata #5 secp256k1 (SEC 2)
372 Check ECP group metadata #6 secp256r1 (SEC 2)
376 Check ECP group metadata #7 secp384r1 (SEC 2)
380 Check ECP group metadata #8 secp521r1 (SEC 2)
/third_party/openssl/doc/man7/
DEVP_PKEY-EC.pod64 operations. The encoding conforms with Sec. 2.3.3 of the SECG SEC 1 ("Elliptic Curve
114 2.3.4 of the SECG SEC 1 ("Elliptic Curve Cryptography") standard.
134 is expected to be a point conforming to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic
DEVP_KDF-X963.pod83 "SEC 1: Elliptic Curve Cryptography"
/third_party/openssl/doc/man3/
DEVP_PKEY_set1_encoded_public_key.pod39 should be a point conforming to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic
DEC_POINT_new.pod187 The encoding conforms with Sec. 2.3.3 of the SECG SEC 1 ("Elliptic Curve
191 to Sec. 2.3.4 of the SECG SEC 1 ("Elliptic Curve Cryptography") standard.
/third_party/openssl/doc/man1/
Dopenssl-ec.pod.in40 private key format specified in 'SEC 1: Elliptic Curve Cryptography'
/third_party/python/Lib/test/
Ddatetimetester.py5560 SEC = timedelta(0, 1) variable
5586 offset = ti[0][0] // SEC
5590 lt[0][i] += ti[i-1][0] // SEC
5591 lt[1][i] += ti[i][0] // SEC
5879 s0 = (udt - datetime(1970, 1, 1)) // SEC
5880 ss = shift // SEC # shift seconds
/third_party/openssl/crypto/objects/
Dobjects.txt102 # SECG curve OIDs from "SEC 2: Recommended Elliptic Curve Domain Parameters"
/third_party/node/deps/openssl/openssl/crypto/objects/
Dobjects.txt102 # SECG curve OIDs from "SEC 2: Recommended Elliptic Curve Domain Parameters"
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
DChangeLog401 - do not allow 40 MHz co-ex PRI/SEC switch to force MCC
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
DChangeLog348 - do not allow 40 MHz co-ex PRI/SEC switch to force MCC
/third_party/elfutils/src/
DChangeLog4247 * unstrip.c (copy_elided_sections): Initialize SEC.
/third_party/tzdata/
Dnorthamerica293 # H.R. 6, Energy Policy Act of 2005, SEC. 110. DAYLIGHT SAVINGS.