Home
last modified time | relevance | path

Searched refs:key_name (Results 1 – 25 of 37) sorted by relevance

12

/external/webrtc/webrtc/base/
Dwin32regkey.cc38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { in Create() argument
40 key_name, in Create()
48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { in Open() argument
49 return Open(parent_key, key_name, KEY_ALL_ACCESS); in Open()
221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { in DeleteSubKey() argument
222 ASSERT(key_name != NULL); in DeleteSubKey()
225 LONG res = ::RegDeleteKey(h_key_, key_name); in DeleteSubKey()
257 const wchar_t* key_name, in Create() argument
263 ASSERT(key_name != NULL); in Create()
268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options, in Create()
[all …]
Dwin32regkey.h45 HRESULT Create(HKEY parent_key, const wchar_t* key_name);
48 const wchar_t* key_name,
56 HRESULT Open(HKEY parent_key, const wchar_t* key_name);
58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired);
80 bool HasSubkey(const wchar_t* key_name) const;
91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name);
245 HRESULT DeleteSubKey(const wchar_t* key_name);
248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name);
282 static bool SafeKeyNameForDeletion(const wchar_t* key_name);
307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
/external/python/oauth2client/oauth2client/contrib/django_util/
Dstorage.py28 def __init__(self, model_class, key_name, key_value, property_name): argument
41 self.key_name = key_name
56 query = {self.key_name: self.key_value}
73 **{self.key_name: self.key_value})
80 query = {self.key_name: self.key_value}
/external/python/oauth2client/oauth2client/contrib/
Dsqlalchemy.py114 def __init__(self, session, model_class, key_name, argument
132 self.key_name = key_name
142 filters = {self.key_name: self.key_value}
160 filters = {self.key_name: self.key_value}
172 filters = {self.key_name: self.key_value}
Dappengine.py110 model = SiteXsrfSecretKey.get_or_insert(key_name='site')
309 def __init__(self, model, key_name, property_name, cache=None, user=None): argument
326 if key_name is None:
330 key_name = user.user_id()
333 self._key_name = key_name
/external/python/oauth2client/tests/contrib/django_util/
Dtest_django_storage.py45 self.key_name = 'id'
50 storage = Storage(FakeCredentialsModel, self.key_name,
54 self.assertEqual(storage.key_name, self.key_name)
69 storage = Storage(FakeCredentialsModelMock, self.key_name,
83 storage = Storage(FakeCredentialsModelMock, self.key_name,
99 storage = Storage(FakeCredentialsModelMockNoSet, self.key_name,
111 storage = Storage(FakeCredentialsModelMock, self.key_name,
131 storage = Storage(FakeCredentialsModelMock, self.key_name,
/external/autotest/client/site_tests/hardware_Keyboard/
Dhardware_Keyboard.py34 def _supported(self, event, key_name): argument
36 cmd += ' -s ' + key_name
39 logging.error('Unsupported Key : %s' % key_name)
41 logging.info('%s : %s' % (key_name, output))
65 if not all(self._supported(high_key_event, key_name)
66 for key_name in hardware_Keyboard.supported_keys):
/external/chromium-trace/catapult/common/py_utils/py_utils/
Ddiscover.py155 key_name = camel_case.ToUnderscore(obj.__name__)
157 key_name = module.__name__.split('.')[-1]
159 if key_name in classes and index_by_class_name:
160 assert classes[key_name] is obj, (
162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj))
164 classes[key_name] = obj
/external/autotest/client/tests/iozone/
Diozone.py100 key_name = "%d-%d-%s" % (fields[0], fields[1], l)
101 keylist[key_name] = v
125 key_name = '%s-%d-kids' % (section, w_count)
126 keylist[key_name] = match.group(3)
157 key_name = "%s-%d-%s" % (section, w_count, basekey)
158 keylist[key_name] = result
/external/autotest/frontend/migrations/
D037_db_constraints.py73 key_name = foreign_key_name(table, field)
76 (table, key_name, field, destination_table))
80 key_name = foreign_key_name(table, field)
81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
/external/pdfium/testing/tools/
Dencode_pdf_filter.py31 key_name = name.lower()
32 if key_name and key_name[0] == '/':
33 key_name = key_name[:1]
35 filter_class = _PdfStream._filter_classes.get(key_name)
/external/python/oauth2client/tests/contrib/
Dtest_sqlalchemy.py74 key_name='key',
92 key_name='key',
114 key_name='key',
Dtest_appengine.py100 def __init__(self, key_name=None, sig_bytes=None, argument
104 self._key_name = key_name
212 key_name = b'1234567890'
215 key_name=key_name, sig_bytes=sig_bytes)
223 self.assertEqual(result, (key_name, sig_bytes))
297 key_name='foo'
342 key_name='foo'
1049 appengine.SiteXsrfSecretKey(key_name='site', secret=secret).put()
/external/boringssl/src/crypto/evp/
Devp_test.cc243 const std::string &key_name = t->GetParameter(); in ImportKey() local
244 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; in ImportKey()
245 (*key_map)[key_name] = std::move(pkey); in ImportKey()
373 const std::string &key_name = t->GetParameter(); in TestEVP() local
374 if (key_map->count(key_name) == 0) { in TestEVP()
375 ADD_FAILURE() << "Could not find key " << key_name; in TestEVP()
378 EVP_PKEY *key = (*key_map)[key_name].get(); in TestEVP()
/external/libxkbcommon/xkbcommon/src/xkbcomp/
Dast.h191 xkb_atom_t key_name; member
239 ExprKeyName key_name; member
Dast-build.c117 ExprCreateKeyName(xkb_atom_t key_name) in ExprCreateKeyName() argument
120 expr->key_name.key_name = key_name; in ExprCreateKeyName()
Dast-build.h43 ExprCreateKeyName(xkb_atom_t key_name);
Dsymbols.c235 bool report, xkb_layout_index_t group, xkb_atom_t key_name) in MergeGroups() argument
255 group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
298 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
320 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
1183 tmp.u.keyName = key->key_name.key_name; in HandleModMapDef()
/external/u-boot/tools/
Dkwbimage.c170 const char *key_name; member
419 unsigned int cfg_option, const char *key_name, in kwb_load_cfg_key() argument
430 fprintf(stderr, "%s not configured\n", key_name); in kwb_load_cfg_key()
434 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key()
436 fprintf(stderr, "Failed to load %s\n", key_name); in kwb_load_cfg_key()
1418 el->key_name = strdup(value1); in image_create_config_parse_oneline()
1421 el->key_name = strdup(value1); in image_create_config_parse_oneline()
/external/tensorflow/tensorflow/python/debug/wrappers/
Dlocal_cli_wrapper.py502 key_name = common.get_graph_element_name(key)
503 if key_name == tensor_name:
504 feed_key = key_name
/external/tensorflow/tensorflow/python/ops/
Dparsing_config.py503 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
505 default_value, dtype=dtype, name=key_name)
511 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
513 default_value, dtype=dtype, name=key_name)
/external/autotest/client/site_tests/hardware_Keyboard/src/
Devtest.c350 int is_key_supported(int fd, char *key_name) in is_key_supported() argument
353 int keycode = keycode_from_name(key_name); in is_key_supported()
364 printf("Invalid keycode %s", key_name); in is_key_supported()
/external/python/dateutil/dateutil/tz/
Dwin.py354 key_name, value, dtype = winreg.EnumValue(key, i)
368 dout[key_name] = value
/external/boringssl/src/ssl/
Dssl_session.cc480 uint8_t key_name[16]; in ssl_encrypt_ticket_with_cipher_ctx() local
482 if (tctx->ticket_key_cb(hs->ssl, key_name, iv, ctx.get(), hctx.get(), in ssl_encrypt_ticket_with_cipher_ctx()
499 OPENSSL_memcpy(key_name, tctx->ticket_key_current->name, 16); in ssl_encrypt_ticket_with_cipher_ctx()
503 if (!CBB_add_bytes(out, key_name, 16) || in ssl_encrypt_ticket_with_cipher_ctx()
/external/libxkbcommon/xkbcommon/src/x11/
Dkeymap.c991 xkb_atom_t *key_name = &keymap->keys[reply->firstKey + i].name; in get_key_names() local
994 *key_name = XKB_ATOM_NONE; in get_key_names()
997 *key_name = xkb_atom_intern(keymap->ctx, wire->name, in get_key_names()
1000 if (!*key_name) in get_key_names()

12