/third_party/node/lib/internal/readline/ |
D | utils.js | 91 const key = { variable 216 key.ctrl = !!(modifier & 4); 217 key.meta = !!(modifier & 10); 218 key.shift = !!(modifier & 1); 219 key.code = code; 224 case '[P': key.name = 'f1'; break; 225 case '[Q': key.name = 'f2'; break; 226 case '[R': key.name = 'f3'; break; 227 case '[S': key.name = 'f4'; break; 230 case 'OP': key.name = 'f1'; break; [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | noImplicitAnyStringIndexerOnObject.types | 17 >c : { get: (key: string) => string; } 18 >{ get: (key: string) => 'foobar'} : { get: (key: string) => string; } 20 get: (key: string) => 'foobar' 21 >get : (key: string) => string 22 >(key: string) => 'foobar' : (key: string) => string 23 >key : string 29 >c : { get: (key: string) => string; } 35 >c : { get: (key: string) => string; } 39 >d : { set: (key: string) => string; } 40 >{ set: (key: string) => 'foobar'} : { set: (key: string) => string; } [all …]
|
D | parserRealSource4.js | 26 add(key: string, data): boolean; 27 addOrUpdate(key: string, data): boolean; 32 lookup(key: string): any; 49 public add(key: string, data): boolean { 50 if (this.table[key] != undefined) { 53 this.table[key] = data; 58 public addOrUpdate(key: string, data): boolean { 59 if (this.table[key] != undefined) { 60 this.table[key] = data; 63 this.table[key] = data; [all …]
|
D | unusedVariablesWithUnderscoreInForOfLoop.types | 5 for (const [_a, b] of [['key', 1]]) { 8 >[['key', 1]] : (string | number)[][] 9 >['key', 1] : (string | number)[] 10 >'key' : "key" 21 for (const [a, _b] of [['key', 1]]) { 24 >[['key', 1]] : (string | number)[][] 25 >['key', 1] : (string | number)[] 26 >'key' : "key" 37 for (const [_a, _b] of [['key', 1]]) {} 40 >[['key', 1]] : (string | number)[][] [all …]
|
D | noImplicitAnyStringIndexerOnObject.js | 6 get: (key: string) => 'foobar' 12 set: (key: string) => 'foobar' 18 get: (key: string) => 'foobar', 19 set: (key: string) => 'foobar' 29 get: (key: string) => 'foobar', 30 set: (key: string, value: string) => 'foobar' 40 get: (key: "hello" | "world") => 'foobar', 41 set: (key: "hello" | "world", value: string) => 'foobar' 50 ({ get: (key: string) => 'hello', set: (key: string, value: string) => {} })['hello']; 51 …({ get: (key: string) => 'hello', set: (key: string, value: string) => {} })['hello'] = 'modified'; [all …]
|
D | jsdocTemplateTag5.types | 22 … * @param {K} key the key ok * @returns {V} the value ok */ get(key) { return … 23 >Multimap.prototype : { get(key: K): V; } 25 >prototype : { get(key: K): V; } 26 … * @param {K} key the key ok * @returns {V} the value ok */ get(key) { return … 29 * @param {K} key the key ok 32 get(key) { 33 >get : (key: K) => V 34 >key : K 36 return this._map[key + '']; 37 >this._map[key + ''] : V [all …]
|
D | esNextWeakRefs_IterableWeakMap.js | 18 constructor(iterable: Iterable<[key: K, value: V]> | null = null) { 20 for (const { 0: key, 1: value } of iterable) { 21 this.set(key, value); 26 set(key: K, value: V): this { 27 const entry = this.#weakMap.get(key); 31 const ref = new WeakRef(key); 33 this.#weakMap.set(key, { ref, value }); 35 this.#finalizationGroup.register(key, { 43 has(key: K): boolean { 44 return this.#weakMap.has(key); [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | rsa.c | 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local 67 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key() 68 if (key == NULL) in crypto_rsa_import_public_key() 71 key->n = bignum_init(); in crypto_rsa_import_public_key() 72 key->e = bignum_init(); in crypto_rsa_import_public_key() 73 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key() 74 crypto_rsa_free(key); in crypto_rsa_import_public_key() 93 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key() 94 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key() 106 return key; in crypto_rsa_import_public_key() [all …]
|
/third_party/openssl/crypto/des/asm/ |
D | dest4-sparcv9.pl | 102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4)); 129 ldd [$key + 0x00], %f4 ! load key schedule 130 ldd [$key + 0x08], %f6 131 ldd [$key + 0x10], %f8 132 ldd [$key + 0x18], %f10 133 ldd [$key + 0x20], %f12 134 ldd [$key + 0x28], %f14 135 ldd [$key + 0x30], %f16 136 ldd [$key + 0x38], %f18 137 ldd [$key + 0x40], %f20 [all …]
|
/third_party/node/deps/openssl/openssl/crypto/des/asm/ |
D | dest4-sparcv9.pl | 102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4)); 129 ldd [$key + 0x00], %f4 ! load key schedule 130 ldd [$key + 0x08], %f6 131 ldd [$key + 0x10], %f8 132 ldd [$key + 0x18], %f10 133 ldd [$key + 0x20], %f12 134 ldd [$key + 0x28], %f14 135 ldd [$key + 0x30], %f16 136 ldd [$key + 0x38], %f18 137 ldd [$key + 0x40], %f20 [all …]
|
/third_party/selinux/libsepol/src/ |
D | avtab.c | 93 avtab_insert_node(avtab_t * h, int hvalue, avtab_ptr_t prev, avtab_key_t * key, in avtab_insert_node() argument 103 newnode->key = *key; in avtab_insert_node() 105 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node() 136 int avtab_insert(avtab_t * h, avtab_key_t * key, avtab_datum_t * datum) in avtab_insert() argument 141 key->specified & ~(AVTAB_ENABLED | AVTAB_ENABLED_OLD); in avtab_insert() 146 hvalue = avtab_hash(key, h->mask); in avtab_insert() 149 if (key->source_type == cur->key.source_type && in avtab_insert() 150 key->target_type == cur->key.target_type && in avtab_insert() 151 key->target_class == cur->key.target_class && in avtab_insert() 152 (specified & cur->key.specified)) { in avtab_insert() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | rsa.c | 64 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local 68 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key() 69 if (key == NULL) in crypto_rsa_import_public_key() 72 key->n = bignum_init(); in crypto_rsa_import_public_key() 73 key->e = bignum_init(); in crypto_rsa_import_public_key() 74 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key() 75 crypto_rsa_free(key); in crypto_rsa_import_public_key() 98 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key() 99 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key() 111 return key; in crypto_rsa_import_public_key() [all …]
|
/third_party/openssl/test/certs/ |
D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth 65 ./mkcert.sh genroot "Root CA" root-key sroot-cert serverAuth [all …]
|
/third_party/protobuf/src/google/protobuf/testdata/ |
D | map_test_data.txt | 2 key: 0 6 key: 1 10 key: 0 14 key: 1 18 key: 0 22 key: 1 26 key: 0 30 key: 1 34 key: 0 38 key: 1 [all …]
|
/third_party/typescript/tests/cases/conformance/parser/ecmascript5/ |
D | parserRealSource4.ts | 25 add(key: string, data): boolean; 26 addOrUpdate(key: string, data): boolean; 31 lookup(key: string): any; 48 public add(key: string, data): boolean { 49 if (this.table[key] != undefined) { 52 this.table[key] = data; 57 public addOrUpdate(key: string, data): boolean { 58 if (this.table[key] != undefined) { 59 this.table[key] = data; 62 this.table[key] = data; [all …]
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
D | e_rc4_hmac_md5.c | 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key() 57 key->tail = key->head; in rc4_hmac_md5_init_key() 58 key->md = key->head; in rc4_hmac_md5_init_key() 60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key() 79 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local 81 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher() 83 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher() [all …]
|
/third_party/openssl/crypto/evp/ |
D | e_rc4_hmac_md5.c | 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key() 57 key->tail = key->head; in rc4_hmac_md5_init_key() 58 key->md = key->head; in rc4_hmac_md5_init_key() 60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key() 79 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local 81 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher() 83 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher() [all …]
|
/third_party/mesa3d/src/gallium/drivers/v3d/ |
D | v3d_program.c | 42 struct v3d_key *key, size_t key_size); 45 struct v3d_key *key); 211 struct v3d_fs_key key = { in v3d_shader_precompile() local 217 key.cbufs |= 1 << 0; in v3d_shader_precompile() 219 key.cbufs |= 1 << (var->data.location - in v3d_shader_precompile() 224 key.logicop_func = PIPE_LOGICOP_COPY; in v3d_shader_precompile() 226 v3d_setup_shared_precompile_key(so, &key.base); in v3d_shader_precompile() 227 v3d_get_compiled_shader(v3d, &key.base, sizeof(key)); in v3d_shader_precompile() 229 struct v3d_gs_key key = { in v3d_shader_precompile() local 234 v3d_setup_shared_precompile_key(so, &key.base); in v3d_shader_precompile() [all …]
|
/third_party/node/test/fixtures/ |
D | aead-vectors.js | 3 key: '6970787039613669314d623455536234', property 8 key: '6970787039613669314d623455536234', property 13 key: '6970787039613669314d623455536234', property 18 key: '337a54767a7233703637564336316a6d56353472495975313534357834546c59', property 23 key: '337a54767a7233703637564336316a6d56353472495975313534357834546c59', property 28 key: '1ed2233fa2223ef5d7df08546049406c7305220bca40d4c9', property 39 key: '00000000000000000000000000000000', property 48 key: '00000000000000000000000000000000', property 57 key: 'feffe9928665731c6d6a8f9467308308', property 72 key: 'feffe9928665731c6d6a8f9467308308', property [all …]
|
/third_party/openssl/include/openssl/ |
D | params.h | 27 # define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument 28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED } 31 # define OSSL_PARAM_int(key, addr) \ argument 32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int)) 33 # define OSSL_PARAM_uint(key, addr) \ argument 34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ 36 # define OSSL_PARAM_long(key, addr) \ argument 37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int)) 38 # define OSSL_PARAM_ulong(key, addr) \ argument 39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ [all …]
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
D | params.h | 27 # define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument 28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED } 31 # define OSSL_PARAM_int(key, addr) \ argument 32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int)) 33 # define OSSL_PARAM_uint(key, addr) \ argument 34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ 36 # define OSSL_PARAM_long(key, addr) \ argument 37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int)) 38 # define OSSL_PARAM_ulong(key, addr) \ argument 39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ [all …]
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_chk.c | 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument 29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime() 30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime() 36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime() 37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime() 39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime() 50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime() 58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime() 62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime() 68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime() [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_chk.c | 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument 29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime() 30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime() 36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime() 37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime() 39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime() 50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime() 58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime() 62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime() 68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime() [all …]
|
/third_party/node/lib/internal/crypto/ |
D | keys.js | 126 static from(key) { argument 127 if (!isCryptoKey(key)) 128 throw new ERR_INVALID_ARG_TYPE('key', 'CryptoKey', key); 129 return key[kKeyObject]; 380 function getKeyObjectHandle(key, ctx) { argument 385 key, 389 if (key.type !== 'private') { 391 throw new ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE(key.type, 'private'); 392 if (key.type !== 'public') { 393 throw new ERR_CRYPTO_INVALID_KEY_OBJECT_TYPE(key.type, [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-client-auth.js | 34 key: client.key, property 40 key: server.key, property 57 key: server.key, property 74 key: server.key, property 94 key: server.key, property 117 key: client.key, property 123 key: server.key, property 136 key: client.key, property 142 key: server.key, property 155 key: client.key, property [all …]
|