/external/webrtc/webrtc/base/ |
D | win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { in Create() argument 40 key_name, in Create() 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { in Open() argument 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); in Open() 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { in DeleteSubKey() argument 222 ASSERT(key_name != NULL); in DeleteSubKey() 225 LONG res = ::RegDeleteKey(h_key_, key_name); in DeleteSubKey() 257 const wchar_t* key_name, in Create() argument 263 ASSERT(key_name != NULL); in Create() 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options, in Create() [all …]
|
D | win32regkey.h | 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 48 const wchar_t* key_name, 56 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 80 bool HasSubkey(const wchar_t* key_name) const; 91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 245 HRESULT DeleteSubKey(const wchar_t* key_name); 248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 282 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
|
/external/python/oauth2client/oauth2client/contrib/django_util/ |
D | storage.py | 28 def __init__(self, model_class, key_name, key_value, property_name): argument 41 self.key_name = key_name 56 query = {self.key_name: self.key_value} 73 **{self.key_name: self.key_value}) 80 query = {self.key_name: self.key_value}
|
/external/python/oauth2client/oauth2client/contrib/ |
D | sqlalchemy.py | 114 def __init__(self, session, model_class, key_name, argument 132 self.key_name = key_name 142 filters = {self.key_name: self.key_value} 160 filters = {self.key_name: self.key_value} 172 filters = {self.key_name: self.key_value}
|
D | appengine.py | 110 model = SiteXsrfSecretKey.get_or_insert(key_name='site') 309 def __init__(self, model, key_name, property_name, cache=None, user=None): argument 326 if key_name is None: 330 key_name = user.user_id() 333 self._key_name = key_name
|
/external/python/oauth2client/tests/contrib/django_util/ |
D | test_django_storage.py | 45 self.key_name = 'id' 50 storage = Storage(FakeCredentialsModel, self.key_name, 54 self.assertEqual(storage.key_name, self.key_name) 69 storage = Storage(FakeCredentialsModelMock, self.key_name, 83 storage = Storage(FakeCredentialsModelMock, self.key_name, 99 storage = Storage(FakeCredentialsModelMockNoSet, self.key_name, 111 storage = Storage(FakeCredentialsModelMock, self.key_name, 131 storage = Storage(FakeCredentialsModelMock, self.key_name,
|
/external/autotest/client/site_tests/hardware_Keyboard/ |
D | hardware_Keyboard.py | 34 def _supported(self, event, key_name): argument 36 cmd += ' -s ' + key_name 39 logging.error('Unsupported Key : %s' % key_name) 41 logging.info('%s : %s' % (key_name, output)) 65 if not all(self._supported(high_key_event, key_name) 66 for key_name in hardware_Keyboard.supported_keys):
|
/external/chromium-trace/catapult/common/py_utils/py_utils/ |
D | discover.py | 155 key_name = camel_case.ToUnderscore(obj.__name__) 157 key_name = module.__name__.split('.')[-1] 159 if key_name in classes and index_by_class_name: 160 assert classes[key_name] is obj, ( 162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj)) 164 classes[key_name] = obj
|
/external/autotest/client/tests/iozone/ |
D | iozone.py | 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l) 101 keylist[key_name] = v 125 key_name = '%s-%d-kids' % (section, w_count) 126 keylist[key_name] = match.group(3) 157 key_name = "%s-%d-%s" % (section, w_count, basekey) 158 keylist[key_name] = result
|
/external/autotest/frontend/migrations/ |
D | 037_db_constraints.py | 73 key_name = foreign_key_name(table, field) 76 (table, key_name, field, destination_table)) 80 key_name = foreign_key_name(table, field) 81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
|
/external/pdfium/testing/tools/ |
D | encode_pdf_filter.py | 31 key_name = name.lower() 32 if key_name and key_name[0] == '/': 33 key_name = key_name[:1] 35 filter_class = _PdfStream._filter_classes.get(key_name)
|
/external/python/oauth2client/tests/contrib/ |
D | test_sqlalchemy.py | 74 key_name='key', 92 key_name='key', 114 key_name='key',
|
D | test_appengine.py | 100 def __init__(self, key_name=None, sig_bytes=None, argument 104 self._key_name = key_name 212 key_name = b'1234567890' 215 key_name=key_name, sig_bytes=sig_bytes) 223 self.assertEqual(result, (key_name, sig_bytes)) 297 key_name='foo' 342 key_name='foo' 1049 appengine.SiteXsrfSecretKey(key_name='site', secret=secret).put()
|
/external/boringssl/src/crypto/evp/ |
D | evp_test.cc | 243 const std::string &key_name = t->GetParameter(); in ImportKey() local 244 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; in ImportKey() 245 (*key_map)[key_name] = std::move(pkey); in ImportKey() 373 const std::string &key_name = t->GetParameter(); in TestEVP() local 374 if (key_map->count(key_name) == 0) { in TestEVP() 375 ADD_FAILURE() << "Could not find key " << key_name; in TestEVP() 378 EVP_PKEY *key = (*key_map)[key_name].get(); in TestEVP()
|
/external/libxkbcommon/xkbcommon/src/xkbcomp/ |
D | ast.h | 191 xkb_atom_t key_name; member 239 ExprKeyName key_name; member
|
D | ast-build.c | 117 ExprCreateKeyName(xkb_atom_t key_name) in ExprCreateKeyName() argument 120 expr->key_name.key_name = key_name; in ExprCreateKeyName()
|
D | ast-build.h | 43 ExprCreateKeyName(xkb_atom_t key_name);
|
D | symbols.c | 235 bool report, xkb_layout_index_t group, xkb_atom_t key_name) in MergeGroups() argument 255 group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 298 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 320 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 1183 tmp.u.keyName = key->key_name.key_name; in HandleModMapDef()
|
/external/u-boot/tools/ |
D | kwbimage.c | 170 const char *key_name; member 419 unsigned int cfg_option, const char *key_name, in kwb_load_cfg_key() argument 430 fprintf(stderr, "%s not configured\n", key_name); in kwb_load_cfg_key() 434 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key() 436 fprintf(stderr, "Failed to load %s\n", key_name); in kwb_load_cfg_key() 1418 el->key_name = strdup(value1); in image_create_config_parse_oneline() 1421 el->key_name = strdup(value1); in image_create_config_parse_oneline()
|
/external/tensorflow/tensorflow/python/debug/wrappers/ |
D | local_cli_wrapper.py | 502 key_name = common.get_graph_element_name(key) 503 if key_name == tensor_name: 504 feed_key = key_name
|
/external/tensorflow/tensorflow/python/ops/ |
D | parsing_config.py | 503 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 505 default_value, dtype=dtype, name=key_name) 511 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 513 default_value, dtype=dtype, name=key_name)
|
/external/autotest/client/site_tests/hardware_Keyboard/src/ |
D | evtest.c | 350 int is_key_supported(int fd, char *key_name) in is_key_supported() argument 353 int keycode = keycode_from_name(key_name); in is_key_supported() 364 printf("Invalid keycode %s", key_name); in is_key_supported()
|
/external/python/dateutil/dateutil/tz/ |
D | win.py | 354 key_name, value, dtype = winreg.EnumValue(key, i) 368 dout[key_name] = value
|
/external/boringssl/src/ssl/ |
D | ssl_session.cc | 480 uint8_t key_name[16]; in ssl_encrypt_ticket_with_cipher_ctx() local 482 if (tctx->ticket_key_cb(hs->ssl, key_name, iv, ctx.get(), hctx.get(), in ssl_encrypt_ticket_with_cipher_ctx() 499 OPENSSL_memcpy(key_name, tctx->ticket_key_current->name, 16); in ssl_encrypt_ticket_with_cipher_ctx() 503 if (!CBB_add_bytes(out, key_name, 16) || in ssl_encrypt_ticket_with_cipher_ctx()
|
/external/libxkbcommon/xkbcommon/src/x11/ |
D | keymap.c | 991 xkb_atom_t *key_name = &keymap->keys[reply->firstKey + i].name; in get_key_names() local 994 *key_name = XKB_ATOM_NONE; in get_key_names() 997 *key_name = xkb_atom_intern(keymap->ctx, wire->name, in get_key_names() 1000 if (!*key_name) in get_key_names()
|