Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 7825) sorted by relevance

12345678910>>...313

/third_party/node/lib/internal/readline/
Dutils.js91 const key = { variable
216 key.ctrl = !!(modifier & 4);
217 key.meta = !!(modifier & 10);
218 key.shift = !!(modifier & 1);
219 key.code = code;
224 case '[P': key.name = 'f1'; break;
225 case '[Q': key.name = 'f2'; break;
226 case '[R': key.name = 'f3'; break;
227 case '[S': key.name = 'f4'; break;
230 case 'OP': key.name = 'f1'; break;
[all …]
/third_party/typescript/tests/baselines/reference/
DnoImplicitAnyStringIndexerOnObject.types17 >c : { get: (key: string) => string; }
18 >{ get: (key: string) => 'foobar'} : { get: (key: string) => string; }
20 get: (key: string) => 'foobar'
21 >get : (key: string) => string
22 >(key: string) => 'foobar' : (key: string) => string
23 >key : string
29 >c : { get: (key: string) => string; }
35 >c : { get: (key: string) => string; }
39 >d : { set: (key: string) => string; }
40 >{ set: (key: string) => 'foobar'} : { set: (key: string) => string; }
[all …]
DparserRealSource4.js26 add(key: string, data): boolean;
27 addOrUpdate(key: string, data): boolean;
32 lookup(key: string): any;
49 public add(key: string, data): boolean {
50 if (this.table[key] != undefined) {
53 this.table[key] = data;
58 public addOrUpdate(key: string, data): boolean {
59 if (this.table[key] != undefined) {
60 this.table[key] = data;
63 this.table[key] = data;
[all …]
DunusedVariablesWithUnderscoreInForOfLoop.types5 for (const [_a, b] of [['key', 1]]) {
8 >[['key', 1]] : (string | number)[][]
9 >['key', 1] : (string | number)[]
10 >'key' : "key"
21 for (const [a, _b] of [['key', 1]]) {
24 >[['key', 1]] : (string | number)[][]
25 >['key', 1] : (string | number)[]
26 >'key' : "key"
37 for (const [_a, _b] of [['key', 1]]) {}
40 >[['key', 1]] : (string | number)[][]
[all …]
DnoImplicitAnyStringIndexerOnObject.js6 get: (key: string) => 'foobar'
12 set: (key: string) => 'foobar'
18 get: (key: string) => 'foobar',
19 set: (key: string) => 'foobar'
29 get: (key: string) => 'foobar',
30 set: (key: string, value: string) => 'foobar'
40 get: (key: "hello" | "world") => 'foobar',
41 set: (key: "hello" | "world", value: string) => 'foobar'
50 ({ get: (key: string) => 'hello', set: (key: string, value: string) => {} })['hello'];
51 …({ get: (key: string) => 'hello', set: (key: string, value: string) => {} })['hello'] = 'modified';
[all …]
DjsdocTemplateTag5.types22 … * @param {K} key the key ok * @returns {V} the value ok */ get(key) { return …
23 >Multimap.prototype : { get(key: K): V; }
25 >prototype : { get(key: K): V; }
26 … * @param {K} key the key ok * @returns {V} the value ok */ get(key) { return …
29 * @param {K} key the key ok
32 get(key) {
33 >get : (key: K) => V
34 >key : K
36 return this._map[key + ''];
37 >this._map[key + ''] : V
[all …]
DesNextWeakRefs_IterableWeakMap.js18 constructor(iterable: Iterable<[key: K, value: V]> | null = null) {
20 for (const { 0: key, 1: value } of iterable) {
21 this.set(key, value);
26 set(key: K, value: V): this {
27 const entry = this.#weakMap.get(key);
31 const ref = new WeakRef(key);
33 this.#weakMap.set(key, { ref, value });
35 this.#finalizationGroup.register(key, {
43 has(key: K): boolean {
44 return this.#weakMap.has(key);
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Drsa.c63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local
67 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key()
68 if (key == NULL) in crypto_rsa_import_public_key()
71 key->n = bignum_init(); in crypto_rsa_import_public_key()
72 key->e = bignum_init(); in crypto_rsa_import_public_key()
73 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key()
74 crypto_rsa_free(key); in crypto_rsa_import_public_key()
93 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key()
94 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key()
106 return key; in crypto_rsa_import_public_key()
[all …]
/third_party/openssl/crypto/des/asm/
Ddest4-sparcv9.pl102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4));
129 ldd [$key + 0x00], %f4 ! load key schedule
130 ldd [$key + 0x08], %f6
131 ldd [$key + 0x10], %f8
132 ldd [$key + 0x18], %f10
133 ldd [$key + 0x20], %f12
134 ldd [$key + 0x28], %f14
135 ldd [$key + 0x30], %f16
136 ldd [$key + 0x38], %f18
137 ldd [$key + 0x40], %f20
[all …]
/third_party/node/deps/openssl/openssl/crypto/des/asm/
Ddest4-sparcv9.pl102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4));
129 ldd [$key + 0x00], %f4 ! load key schedule
130 ldd [$key + 0x08], %f6
131 ldd [$key + 0x10], %f8
132 ldd [$key + 0x18], %f10
133 ldd [$key + 0x20], %f12
134 ldd [$key + 0x28], %f14
135 ldd [$key + 0x30], %f16
136 ldd [$key + 0x38], %f18
137 ldd [$key + 0x40], %f20
[all …]
/third_party/selinux/libsepol/src/
Davtab.c93 avtab_insert_node(avtab_t * h, int hvalue, avtab_ptr_t prev, avtab_key_t * key, in avtab_insert_node() argument
103 newnode->key = *key; in avtab_insert_node()
105 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node()
136 int avtab_insert(avtab_t * h, avtab_key_t * key, avtab_datum_t * datum) in avtab_insert() argument
141 key->specified & ~(AVTAB_ENABLED | AVTAB_ENABLED_OLD); in avtab_insert()
146 hvalue = avtab_hash(key, h->mask); in avtab_insert()
149 if (key->source_type == cur->key.source_type && in avtab_insert()
150 key->target_type == cur->key.target_type && in avtab_insert()
151 key->target_class == cur->key.target_class && in avtab_insert()
152 (specified & cur->key.specified)) { in avtab_insert()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Drsa.c64 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local
68 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key()
69 if (key == NULL) in crypto_rsa_import_public_key()
72 key->n = bignum_init(); in crypto_rsa_import_public_key()
73 key->e = bignum_init(); in crypto_rsa_import_public_key()
74 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key()
75 crypto_rsa_free(key); in crypto_rsa_import_public_key()
98 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key()
99 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key()
111 return key; in crypto_rsa_import_public_key()
[all …]
/third_party/openssl/test/certs/
Dsetup.sh4 ./mkcert.sh genroot "Root CA" root-key root-cert
6 ./mkcert.sh genss "Root CA" root-key root-nonca
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired
11 ./mkcert.sh genroot "Cross Root" cross-key cross-root
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5
46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768
49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth
65 ./mkcert.sh genroot "Root CA" root-key sroot-cert serverAuth
[all …]
/third_party/protobuf/src/google/protobuf/testdata/
Dmap_test_data.txt2 key: 0
6 key: 1
10 key: 0
14 key: 1
18 key: 0
22 key: 1
26 key: 0
30 key: 1
34 key: 0
38 key: 1
[all …]
/third_party/typescript/tests/cases/conformance/parser/ecmascript5/
DparserRealSource4.ts25 add(key: string, data): boolean;
26 addOrUpdate(key: string, data): boolean;
31 lookup(key: string): any;
48 public add(key: string, data): boolean {
49 if (this.table[key] != undefined) {
52 this.table[key] = data;
57 public addOrUpdate(key: string, data): boolean {
58 if (this.table[key] != undefined) {
59 this.table[key] = data;
62 this.table[key] = data;
[all …]
/third_party/node/deps/openssl/openssl/crypto/evp/
De_rc4_hmac_md5.c39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out,
48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key()
57 key->tail = key->head; in rc4_hmac_md5_init_key()
58 key->md = key->head; in rc4_hmac_md5_init_key()
60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key()
79 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local
81 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher()
83 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher()
[all …]
/third_party/openssl/crypto/evp/
De_rc4_hmac_md5.c39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out,
48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key()
57 key->tail = key->head; in rc4_hmac_md5_init_key()
58 key->md = key->head; in rc4_hmac_md5_init_key()
60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key()
79 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local
81 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher()
83 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher()
[all …]
/third_party/mesa3d/src/gallium/drivers/v3d/
Dv3d_program.c42 struct v3d_key *key, size_t key_size);
45 struct v3d_key *key);
211 struct v3d_fs_key key = { in v3d_shader_precompile() local
217 key.cbufs |= 1 << 0; in v3d_shader_precompile()
219 key.cbufs |= 1 << (var->data.location - in v3d_shader_precompile()
224 key.logicop_func = PIPE_LOGICOP_COPY; in v3d_shader_precompile()
226 v3d_setup_shared_precompile_key(so, &key.base); in v3d_shader_precompile()
227 v3d_get_compiled_shader(v3d, &key.base, sizeof(key)); in v3d_shader_precompile()
229 struct v3d_gs_key key = { in v3d_shader_precompile() local
234 v3d_setup_shared_precompile_key(so, &key.base); in v3d_shader_precompile()
[all …]
/third_party/node/test/fixtures/
Daead-vectors.js3 key: '6970787039613669314d623455536234', property
8 key: '6970787039613669314d623455536234', property
13 key: '6970787039613669314d623455536234', property
18 key: '337a54767a7233703637564336316a6d56353472495975313534357834546c59', property
23 key: '337a54767a7233703637564336316a6d56353472495975313534357834546c59', property
28 key: '1ed2233fa2223ef5d7df08546049406c7305220bca40d4c9', property
39 key: '00000000000000000000000000000000', property
48 key: '00000000000000000000000000000000', property
57 key: 'feffe9928665731c6d6a8f9467308308', property
72 key: 'feffe9928665731c6d6a8f9467308308', property
[all …]
/third_party/openssl/include/openssl/
Dparams.h27 # define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument
28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED }
31 # define OSSL_PARAM_int(key, addr) \ argument
32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int))
33 # define OSSL_PARAM_uint(key, addr) \ argument
34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \
36 # define OSSL_PARAM_long(key, addr) \ argument
37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int))
38 # define OSSL_PARAM_ulong(key, addr) \ argument
39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \
[all …]
/third_party/node/deps/openssl/openssl/include/openssl/
Dparams.h27 # define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument
28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED }
31 # define OSSL_PARAM_int(key, addr) \ argument
32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int))
33 # define OSSL_PARAM_uint(key, addr) \ argument
34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \
36 # define OSSL_PARAM_long(key, addr) \ argument
37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int))
38 # define OSSL_PARAM_ulong(key, addr) \ argument
39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \
[all …]
/third_party/node/deps/openssl/openssl/crypto/rsa/
Drsa_chk.c22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument
29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime()
30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime()
36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime()
37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime()
39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime()
50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime()
58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime()
62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime()
68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime()
[all …]
/third_party/openssl/crypto/rsa/
Drsa_chk.c22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument
29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime()
30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime()
36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime()
37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime()
39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime()
50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime()
58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime()
62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime()
68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime()
[all …]
/third_party/node/lib/internal/crypto/
Dkeys.js126 static from(key) { argument
127 if (!isCryptoKey(key))
128 throw new ERR_INVALID_ARG_TYPE('key', 'CryptoKey', key);
129 return key[kKeyObject];
380 function getKeyObjectHandle(key, ctx) { argument
385 key,
389 if (key.type !== 'private') {
391 throw new ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE(key.type, 'private');
392 if (key.type !== 'public') {
393 throw new ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE(key.type,
[all …]
/third_party/node/test/parallel/
Dtest-tls-client-auth.js34 key: client.key, property
40 key: server.key, property
57 key: server.key, property
74 key: server.key, property
94 key: server.key, property
117 key: client.key, property
123 key: server.key, property
136 key: client.key, property
142 key: server.key, property
155 key: client.key, property
[all …]

12345678910>>...313