/external/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl07.c | 32 key_serial_t key_id; in try_to_read_negative_key() local 62 &key_id, sizeof(key_id))); in try_to_read_negative_key() 65 if (TST_RET != sizeof(key_id)) { in try_to_read_negative_key() 67 TST_RET, sizeof(key_id)); in try_to_read_negative_key() 75 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
|
/external/u-boot/cmd/ |
D | ethsw.c | 608 static int keyword_match_gen(enum ethsw_keyword_id key_id, int argc, char 611 static int keyword_match_port(enum ethsw_keyword_id key_id, int argc, 614 static int keyword_match_vlan(enum ethsw_keyword_id key_id, int argc, 617 static int keyword_match_pvid(enum ethsw_keyword_id key_id, int argc, 620 static int keyword_match_mac_addr(enum ethsw_keyword_id key_id, int argc, 623 static int keyword_match_aggr(enum ethsw_keyword_id key_id, int argc, 633 int (*match)(enum ethsw_keyword_id key_id, int argc, char *const argv[], 750 static int keyword_match_gen(enum ethsw_keyword_id key_id, int argc, in keyword_match_gen() argument 754 if (strcmp(argv[*argc_nr], keyword[key_id].keyword_name) == 0) { in keyword_match_gen() 755 parsed_cmd->cmd_to_keywords[*argc_nr] = key_id; in keyword_match_gen() [all …]
|
/external/tensorflow/tensorflow/contrib/mpi/ |
D | mpi_rendezvous_mgr.h | 153 const std::string key_id = strings::StrCat(key, "_", step_id); in QueueRequest() local 154 recv_tensor_map_[key_id] = std::shared_ptr<MPIRequestTensorCall>(rCall); in QueueRequest() 198 const std::string key_id = strings::StrCat(key, "_", step_id); in GetRecvCall() local 199 if (recv_tensor_map_.find(key_id) == recv_tensor_map_.end()) { in GetRecvCall() 203 *call = recv_tensor_map_[key_id]; in GetRecvCall() 208 const std::string key_id = strings::StrCat(key, "_", step_id); in RemoveRecvCall() local 209 recv_tensor_map_.erase(key_id); in RemoveRecvCall()
|
/external/u-boot/lib/rsa/ |
D | rsa-sign.c | 125 char key_id[1024]; in rsa_engine_get_pub_key() local 136 snprintf(key_id, sizeof(key_id), in rsa_engine_get_pub_key() 140 snprintf(key_id, sizeof(key_id), in rsa_engine_get_pub_key() 148 key = ENGINE_load_public_key(engine, key_id, NULL, NULL); in rsa_engine_get_pub_key() 236 char key_id[1024]; in rsa_engine_get_priv_key() local 247 snprintf(key_id, sizeof(key_id), in rsa_engine_get_priv_key() 251 snprintf(key_id, sizeof(key_id), in rsa_engine_get_priv_key() 259 key = ENGINE_load_private_key(engine, key_id, NULL, NULL); in rsa_engine_get_priv_key()
|
/external/kmod/libkmod/ |
D | libkmod-signature.c | 107 sig_info->key_id = mem + size; in fill_default() 125 unsigned char *key_id; member 136 free(pvt->key_id); in pkcs7_free() 203 ASN1_OCTET_STRING *key_id; in fill_pkcs7() local 238 rc = CMS_SignerInfo_get0_signer_id(si, &key_id, &issuer, &sno); in fill_pkcs7() 261 sig_info->key_id = (const char *)key_id_str; in fill_pkcs7() 280 pvt->key_id = key_id_str; in fill_pkcs7()
|
/external/openssh/ |
D | krl.c | 66 char *key_id; member 114 return strcmp(a->key_id, b->key_id); in key_id_cmp() 155 free(rki->key_id); in revoked_certs_free() 337 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument 346 KRL_DBG(("%s: revoke %s", __func__, key_id)); in ssh_krl_revoke_cert_by_key_id() 348 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id() 354 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id() 434 key->cert->key_id); in ssh_krl_revoke_key() 688 KRL_DBG(("%s: key ID %s", __func__, rki->key_id)); in revoked_certs_generate() 689 if ((r = sshbuf_put_cstring(sect, rki->key_id)) != 0) in revoked_certs_generate() [all …]
|
D | krl.h | 52 const struct sshkey *ca_key, const char *key_id);
|
/external/tensorflow/tensorflow/python/distribute/ |
D | cross_device_utils.py | 299 key_id = ','.join(names) 301 if key_id not in self._group_key_table: 304 self._group_key_table[key_id] = new_key 305 return self._group_key_table[key_id] 307 def get_instance_key(self, key_id=None): argument 315 if key_id: 317 if key_id not in self._instance_key_id_to_key_table: 319 self._instance_key_id_to_key_table[key_id] = ( 321 return self._instance_key_id_to_key_table[key_id]
|
/external/tcpdump/ |
D | print-ntp.c | 128 uint32_t key_id; member 306 ND_TCHECK(bp->key_id); in ntp_print() 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print() 309 ND_TCHECK(bp->key_id); in ntp_print() 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
|
D | print-lisp.c | 196 nd_uint16_t key_id; member 239 uint16_t key_id; in lisp_print() local 271 key_id = EXTRACT_16BITS(&lisp_hdr->key_id); in lisp_print() 274 tok2str(auth_type, "unknown-type", key_id))); in lisp_print()
|
/external/python/oauth2client/oauth2client/ |
D | crypt.py | 74 def make_signed_jwt(signer, payload, key_id=None): argument 88 if key_id is not None: 89 header['kid'] = key_id
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_seed_N2F62_3.10.49/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/mesa3d/src/util/tests/hash_table/ |
D | clear.c | 31 static uint32_t key_id(const void *key) in key_id() function 85 assert(key_id(entry->key) < size); in main()
|
/external/python/cpython3/Doc/includes/ |
D | dbpickle.py | 36 type_tag, key_id = pid 39 cursor.execute("SELECT * FROM memos WHERE key=?", (str(key_id),))
|
/external/ltp/testcases/kernel/controllers/memcg/functional/ |
D | memcg_process.c | 52 static int key_id; /* used with opt_shm */ variable 87 key_id = atoi(optarg); in process_options() 233 key = ftok("/dev/null", key_id); in shm()
|
/external/iproute2/tc/ |
D | m_tunnel_key.c | 60 __be32 key_id; in tunnel_key_parse_key_id() local 63 ret = get_be32(&key_id, str, 10); in tunnel_key_parse_key_id() 65 addattr32(n, MAX_MSG, type, key_id); in tunnel_key_parse_key_id()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 946 static int add_bag_attributes(CBB *bag, const char *name, const uint8_t *key_id, in add_bag_attributes() argument 984 !CBB_add_bytes(&value, key_id, key_id_len)) { in add_bag_attributes() 993 const uint8_t *key_id, size_t key_id_len) { in add_cert_bag() argument 1015 !add_bag_attributes(&bag, name, key_id, key_id_len) || in add_cert_bag() 1024 const char *name, const uint8_t *key_id, in make_cert_safe_contents() argument 1031 !add_cert_bag(&safe_contents, cert, name, key_id, key_id_len))) { in make_cert_safe_contents() 1147 uint8_t key_id[EVP_MAX_MD_SIZE]; in PKCS12_create() local 1154 !X509_digest(cert, EVP_sha1(), key_id, &key_id_len)) { in PKCS12_create() 1186 if (!make_cert_safe_contents(&data, &len, cert, chain, name, key_id, in PKCS12_create() 1224 !add_bag_attributes(&bag, name, key_id, key_id_len) || in PKCS12_create()
|
/external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/ |
D | cpuset_memory_test.c | 58 static int key_id; /* used with opt_shm */ variable 106 key_id = atoi(optarg); in process_options() 257 key = ftok("/dev/null", key_id); in shm()
|
/external/epid-sdk/tools/extractkeys/src/ |
D | main.c | 43 unsigned char key_id[8]; ///< 8-byte Key Unique Id(Big Endian) member 52 unsigned char key_id[8]; ///< 8-byte Key Unique Id(Big Endian) member
|
/external/autotest/frontend/afe/ |
D | moblab_rpc_interface.py | 372 def _is_valid_boto_key(key_id, key_secret, directory): argument 374 _run_bucket_performance_test(key_id, key_secret, directory) 390 key_id = cloud_storage_info[_GS_ACCESS_KEY_ID] 393 key_id, key_secret, cloud_storage_info[_IMAGE_STORAGE_SERVER]) 942 def _run_bucket_performance_test(key_id, key_secret, bucket_name, argument 959 '-o', 'Credentials:gs_access_key_id=%s' % key_id,
|
/external/tensorflow/tensorflow/core/platform/cloud/ |
D | oauth_client.cc | 155 Status EncodeJwtHeader(StringPiece key_id, string* encoded) { in EncodeJwtHeader() argument 160 root["kid"] = Json::Value(key_id.begin(), key_id.end()); in EncodeJwtHeader()
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | openCryptoki.conf | 34 key_id="4"
|
/external/libxcam/modules/ocl/ |
D | cl_kernel.cpp | 80 get_string_key_id (const char *str, uint32_t len, uint8_t key_id[8]) in get_string_key_id() 97 memcpy (key_id, key, 8); in get_string_key_id() 101 key_id[i] ^= (uint8_t)str[i]; in get_string_key_id()
|