/external/webrtc/webrtc/base/ |
D | win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { in Create() argument 40 key_name, in Create() 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { in Open() argument 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); in Open() 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { in DeleteSubKey() argument 222 ASSERT(key_name != NULL); in DeleteSubKey() 225 LONG res = ::RegDeleteKey(h_key_, key_name); in DeleteSubKey() 257 const wchar_t* key_name, in Create() argument 263 ASSERT(key_name != NULL); in Create() 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options, in Create() [all …]
|
D | win32regkey.h | 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 48 const wchar_t* key_name, 56 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 80 bool HasSubkey(const wchar_t* key_name) const; 91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 245 HRESULT DeleteSubKey(const wchar_t* key_name); 248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 282 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
|
/external/autotest/client/site_tests/hardware_Keyboard/ |
D | hardware_Keyboard.py | 34 def _supported(self, event, key_name): argument 36 cmd += ' -s ' + key_name 39 logging.error('Unsupported Key : %s' % key_name) 41 logging.info('%s : %s' % (key_name, output)) 65 if not all(self._supported(high_key_event, key_name) 66 for key_name in hardware_Keyboard.supported_keys):
|
/external/chromium-trace/catapult/common/py_utils/py_utils/ |
D | discover.py | 155 key_name = camel_case.ToUnderscore(obj.__name__) 157 key_name = module.__name__.split('.')[-1] 159 if key_name in classes and index_by_class_name: 160 assert classes[key_name] is obj, ( 162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj)) 164 classes[key_name] = obj
|
/external/autotest/client/tests/iozone/ |
D | iozone.py | 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l) 101 keylist[key_name] = v 125 key_name = '%s-%d-kids' % (section, w_count) 126 keylist[key_name] = match.group(3) 157 key_name = "%s-%d-%s" % (section, w_count, basekey) 158 keylist[key_name] = result
|
/external/boringssl/src/crypto/evp/ |
D | evp_test.cc | 183 const std::string &key_name = t->GetParameter(); in ImportKey() local 184 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; in ImportKey() 185 (*key_map)[key_name] = std::move(pkey); in ImportKey() 273 const std::string &key_name = t->GetParameter(); in TestEVP() local 274 if (key_map->count(key_name) == 0) { in TestEVP() 275 ADD_FAILURE() << "Could not find key " << key_name; in TestEVP() 278 EVP_PKEY *key = (*key_map)[key_name].get(); in TestEVP()
|
/external/autotest/frontend/migrations/ |
D | 037_db_constraints.py | 73 key_name = foreign_key_name(table, field) 76 (table, key_name, field, destination_table)) 80 key_name = foreign_key_name(table, field) 81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
|
/external/tensorflow/tensorflow/python/ops/ |
D | parsing_ops.py | 685 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 687 default_value, dtype=dense_types[i], name=key_name) 693 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 695 default_value, dtype=dense_types[i], name=key_name) 1122 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 1124 default_value, dtype=context_dense_types[i], name=key_name) 1376 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 1378 default_value, dtype=dense_types[i], name=key_name) 1384 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 1386 default_value, dtype=dense_types[i], name=key_name)
|
/external/libchrome/base/trace_event/ |
D | trace_event_argument.cc | 58 std::string key_name; in ReadKeyName() local 62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value)); in ReadKeyName() 64 res = pickle_iterator.ReadString(&key_name); in ReadKeyName() 67 return key_name; in ReadKeyName()
|
/external/libxkbcommon/xkbcommon/src/xkbcomp/ |
D | ast.h | 191 xkb_atom_t key_name; member 239 ExprKeyName key_name; member
|
D | ast-build.c | 117 ExprCreateKeyName(xkb_atom_t key_name) in ExprCreateKeyName() argument 120 expr->key_name.key_name = key_name; in ExprCreateKeyName()
|
D | ast-build.h | 43 ExprCreateKeyName(xkb_atom_t key_name);
|
D | symbols.c | 235 bool report, xkb_layout_index_t group, xkb_atom_t key_name) in MergeGroups() argument 255 group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 298 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 320 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups() 1183 tmp.u.keyName = key->key_name.key_name; in HandleModMapDef()
|
/external/tensorflow/tensorflow/contrib/training/python/training/ |
D | sequence_queueing_state_saver_test.py | 430 key_name = got_key[i].decode("ascii").split(":")[1] 432 self.assertTrue(key_name in original_values) 434 self.assertEqual(key_name, 437 stored_state = original_values[key_name] 440 (sequence[i], sequence_count[i], key_name),
|
/external/boringssl/src/tool/ |
D | speed.cc | 143 static bool SpeedRSA(const std::string &key_name, RSA *key, in SpeedRSA() argument 145 if (!selected.empty() && key_name.find(selected) == std::string::npos) { in SpeedRSA() 166 results.Print(key_name + " signing"); in SpeedRSA() 192 results.Print(key_name + " verify"); in SpeedRSA()
|
/external/tensorflow/tensorflow/python/debug/wrappers/ |
D | local_cli_wrapper.py | 469 key_name = common.get_graph_element_name(key) 470 if key_name == tensor_name: 471 feed_key = key_name
|
/external/autotest/client/site_tests/hardware_Keyboard/src/ |
D | evtest.c | 350 int is_key_supported(int fd, char *key_name) in is_key_supported() argument 353 int keycode = keycode_from_name(key_name); in is_key_supported() 364 printf("Invalid keycode %s", key_name); in is_key_supported()
|
/external/boringssl/src/ssl/ |
D | ssl_session.cc | 498 uint8_t key_name[16]; in ssl_encrypt_ticket_with_cipher_ctx() local 500 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, ctx.get(), hctx.get(), in ssl_encrypt_ticket_with_cipher_ctx() 517 OPENSSL_memcpy(key_name, tctx->tlsext_ticket_key_current->name, 16); in ssl_encrypt_ticket_with_cipher_ctx() 521 if (!CBB_add_bytes(out, key_name, 16) || in ssl_encrypt_ticket_with_cipher_ctx()
|
/external/syslinux/com32/menu/ |
D | readconfig.c | 753 char *key_name, *k, *ek; in parse_config_file() local 756 p = get_word(skipspace(p + 9), &key_name); in parse_config_file() 758 k = key_name; in parse_config_file() 772 refstr_put(key_name); in parse_config_file()
|
/external/libxkbcommon/xkbcommon/src/x11/ |
D | keymap.c | 991 xkb_atom_t *key_name = &keymap->keys[reply->firstKey + i].name; in get_key_names() local 994 *key_name = XKB_ATOM_NONE; in get_key_names() 997 *key_name = xkb_atom_intern(keymap->ctx, wire->name, in get_key_names() 1000 if (!*key_name) in get_key_names()
|
/external/python/cpython3/PC/ |
D | launcher.c | 211 wchar_t *key_name = (root == HKEY_LOCAL_MACHINE) ? L"HKLM" : L"HKCU"; in locate_pythons_for_key() local 215 key_name); in locate_pythons_for_key() 238 debug(L"%ls\\%ls: %ls", key_name, ip_path, message); in locate_pythons_for_key() 247 debug(L"%ls\\%ls: %ls\n", key_name, ip_path, message); in locate_pythons_for_key()
|
/external/toolchain-utils/cros_utils/ |
D | tabulator.py | 101 def __init__(self, d, l, sort=SORT_BY_KEYS, key_name='keys'): argument 105 self._key_name = key_name
|
/external/python/cpython2/PC/bdist_wininst/ |
D | install.c | 2153 char key_name[80]; in NeedAutoUAC() local 2158 wsprintf(key_name, in NeedAutoUAC() 2162 key_name, 0, KEY_READ, &hk)) in NeedAutoUAC()
|
/external/python/cpython3/PC/bdist_wininst/ |
D | install.c | 2197 char key_name[80]; in NeedAutoUAC() local 2202 wsprintf(key_name, in NeedAutoUAC() 2206 key_name, 0, KEY_READ, &hk)) in NeedAutoUAC()
|
/external/boringssl/src/ssl/test/ |
D | bssl_shim.cc | 921 static int TicketKeyCallback(SSL *ssl, uint8_t *key_name, uint8_t *iv, in TicketKeyCallback() argument 937 OPENSSL_memcpy(key_name, kZeros, sizeof(kZeros)); in TicketKeyCallback() 939 } else if (OPENSSL_memcmp(key_name, kZeros, 16) != 0) { in TicketKeyCallback()
|