/external/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl07.c | 20 key_serial_t key_id; in try_to_read_negative_key() local 50 &key_id, sizeof(key_id))); in try_to_read_negative_key() 53 if (TST_RET != sizeof(key_id)) { in try_to_read_negative_key() 55 TST_RET, sizeof(key_id)); in try_to_read_negative_key() 63 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
|
/external/libwebm/webm_parser/tests/ |
D | content_encryption_parser_test.cc | 39 EXPECT_FALSE(content_encryption.key_id.is_present()); in TEST_F() 40 EXPECT_EQ(std::vector<std::uint8_t>{}, content_encryption.key_id.value()); in TEST_F() 65 EXPECT_TRUE(content_encryption.key_id.is_present()); in TEST_F() 66 EXPECT_EQ(std::vector<std::uint8_t>{}, content_encryption.key_id.value()); in TEST_F() 97 EXPECT_TRUE(content_encryption.key_id.is_present()); in TEST_F() 98 EXPECT_EQ(std::vector<std::uint8_t>{0x00}, content_encryption.key_id.value()); in TEST_F()
|
/external/marisa-trie/bindings/ruby/ |
D | sample.rb | 20 print(agent.query_str(), ": ", agent.key_id(), "\n") 24 print(agent.query_str(), ": ", agent.key_id(), "\n") 55 print(agent.query_str(), ": ", agent.key_str(), " (", agent.key_id(), ")\n") 60 print(agent.query_str(), ": ", agent.key_str(), " (", agent.key_id(), ")\n")
|
/external/marisa-trie/lib/marisa/grimoire/trie/ |
D | history.h | 32 void set_key_id(std::size_t key_id) { in set_key_id() argument 33 MARISA_DEBUG_IF(key_id > MARISA_UINT32_MAX, MARISA_SIZE_ERROR); in set_key_id() 34 key_id_ = (UInt32)key_id; in set_key_id() 49 std::size_t key_id() const { in key_id() function
|
/external/marisa-trie/bindings/perl/ |
D | sample.pl | 20 print($agent->query_str(), ": ", $agent->key_id(), "\n"); 24 print($agent->query_str(), ": ", $agent->key_id(), "\n"); 55 $agent->key_id(), ")\n"); 61 $agent->key_id(), ")\n");
|
/external/marisa-trie/bindings/python/ |
D | sample.py | 20 print("%s: %d" % (agent.query_str(), agent.key_id())) 24 print("%s: %d" % (agent.query_str(), agent.key_id())) 53 print("%s: %s (%d)" % (agent.query_str(), agent.key_str(), agent.key_id())) 57 print("%s: %s (%d)" % (agent.query_str(), agent.key_str(), agent.key_id()))
|
/external/marisa-trie/tools/ |
D | marisa-reverse-lookup.cc | 52 std::size_t key_id; in reverse_lookup() local 53 while (std::cin >> key_id) { in reverse_lookup() 55 agent.set_query(key_id); in reverse_lookup() 62 << key_id << std::endl; in reverse_lookup()
|
/external/perfetto/src/trace_processor/importers/json/ |
D | json_utils.cc | 190 auto key_id = storage->InternString(key); in AddJsonValueToArgs() local 196 inserter->AddArg(flat_key_id, key_id, Variadic::Integer(value.asInt64())); in AddJsonValueToArgs() 199 inserter->AddArg(flat_key_id, key_id, in AddJsonValueToArgs() 203 inserter->AddArg(flat_key_id, key_id, Variadic::Real(value.asDouble())); in AddJsonValueToArgs() 206 inserter->AddArg(flat_key_id, key_id, in AddJsonValueToArgs() 211 inserter->AddArg(flat_key_id, key_id, Variadic::Boolean(value.asBool())); in AddJsonValueToArgs()
|
/external/openssh/ |
D | krl.c | 68 char *key_id; member 117 return strcmp(a->key_id, b->key_id); in key_id_cmp() 159 free(rki->key_id); in revoked_certs_free() 346 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument 355 KRL_DBG(("%s: revoke %s", __func__, key_id)); in ssh_krl_revoke_cert_by_key_id() 357 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id() 363 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id() 465 key->cert->key_id); in ssh_krl_revoke_key() 719 KRL_DBG(("%s: key ID %s", __func__, rki->key_id)); in revoked_certs_generate() 720 if ((r = sshbuf_put_cstring(sect, rki->key_id)) != 0) in revoked_certs_generate() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/trust_token/ |
D | trust_token.c | 159 uint32_t key_id; in TRUST_TOKEN_CLIENT_add_key() local 160 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_CLIENT_add_key() 166 key_s->id = key_id; in TRUST_TOKEN_CLIENT_add_key() 223 uint32_t key_id; in STACK_OF() local 225 !CBS_get_u32(&in, &key_id)) { in STACK_OF() 233 if (ctx->keys[i].id == key_id) { in STACK_OF() 251 ctx->method->unblind(&key->key, ctx->pretokens, &in, count, key_id); in STACK_OF() 374 uint32_t key_id; in TRUST_TOKEN_ISSUER_add_key() local 375 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_ISSUER_add_key() 382 key_s->id = key_id; in TRUST_TOKEN_ISSUER_add_key() [all …]
|
D | internal.h | 95 CBS *cbs, size_t count, uint32_t key_id); 124 CBS *cbs, size_t count, uint32_t key_id); 185 size_t count, uint32_t key_id);
|
/external/boringssl/src/crypto/trust_token/ |
D | trust_token.c | 182 uint32_t key_id; in TRUST_TOKEN_CLIENT_add_key() local 183 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_CLIENT_add_key() 189 key_s->id = key_id; in TRUST_TOKEN_CLIENT_add_key() 249 uint32_t key_id; in STACK_OF() local 251 !CBS_get_u32(&in, &key_id)) { in STACK_OF() 259 if (ctx->keys[i].id == key_id) { in STACK_OF() 277 ctx->method->unblind(&key->key, ctx->pretokens, &in, count, key_id); in STACK_OF() 413 uint32_t key_id; in TRUST_TOKEN_ISSUER_add_key() local 414 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_ISSUER_add_key() 421 key_s->id = key_id; in TRUST_TOKEN_ISSUER_add_key() [all …]
|
D | internal.h | 107 CBS *cbs, size_t count, uint32_t key_id); 132 CBS *cbs, size_t count, uint32_t key_id); 167 CBS *cbs, size_t count, uint32_t key_id); 224 size_t count, uint32_t key_id);
|
/external/tcpdump/ |
D | print-ntp.c | 128 uint32_t key_id; member 306 ND_TCHECK(bp->key_id); in ntp_print() 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print() 309 ND_TCHECK(bp->key_id); in ntp_print() 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
|
D | print-lisp.c | 196 nd_uint16_t key_id; member 239 uint16_t key_id; in lisp_print() local 271 key_id = EXTRACT_16BITS(&lisp_hdr->key_id); in lisp_print() 274 tok2str(auth_type, "unknown-type", key_id))); in lisp_print()
|
/external/kmod/libkmod/ |
D | libkmod-signature.c | 107 sig_info->key_id = mem + size; in fill_default() 125 unsigned char *key_id; member 136 free(pvt->key_id); in pkcs7_free() 262 sig_info->key_id = (const char *)key_id_str; in fill_pkcs7() 281 pvt->key_id = key_id_str; in fill_pkcs7()
|
/external/python/oauth2client/oauth2client/ |
D | crypt.py | 74 def make_signed_jwt(signer, payload, key_id=None): argument 88 if key_id is not None: 89 header['kid'] = key_id
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_seed_N2F62_3.10.49/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/marisa-trie/lib/marisa/ |
D | agent.cc | 28 void Agent::set_query(std::size_t key_id) { in set_query() argument 32 query_.set_id(key_id); in set_query()
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/cfg80211/cfg80211_michael_mic_failure/ |
D | format | 13 field:int key_id; offset:40; size:4; signed:1; 16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
|
/external/mesa3d/src/util/tests/hash_table/ |
D | clear.c | 35 static uint32_t key_id(const void *key) in key_id() function 87 assert(key_id(entry->key) < SIZE); in main()
|
/external/python/cpython3/Doc/includes/ |
D | dbpickle.py | 36 type_tag, key_id = pid 39 cursor.execute("SELECT * FROM memos WHERE key=?", (str(key_id),))
|
/external/ltp/testcases/kernel/controllers/memcg/functional/ |
D | memcg_process.c | 36 static int key_id; /* used with opt_shm */ variable 71 key_id = atoi(optarg); in process_options() 217 key = ftok("/dev/null", key_id); in shm()
|
/external/iproute2/tc/ |
D | m_tunnel_key.c | 60 __be32 key_id; in tunnel_key_parse_key_id() local 63 ret = get_be32(&key_id, str, 10); in tunnel_key_parse_key_id() 65 addattr32(n, MAX_MSG, type, key_id); in tunnel_key_parse_key_id()
|