Home
last modified time | relevance | path

Searched refs:key_name (Results 1 – 25 of 30) sorted by relevance

12

/external/webrtc/webrtc/base/
Dwin32regkey.cc38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { in Create() argument
40 key_name, in Create()
48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { in Open() argument
49 return Open(parent_key, key_name, KEY_ALL_ACCESS); in Open()
221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { in DeleteSubKey() argument
222 ASSERT(key_name != NULL); in DeleteSubKey()
225 LONG res = ::RegDeleteKey(h_key_, key_name); in DeleteSubKey()
257 const wchar_t* key_name, in Create() argument
263 ASSERT(key_name != NULL); in Create()
268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options, in Create()
[all …]
Dwin32regkey.h45 HRESULT Create(HKEY parent_key, const wchar_t* key_name);
48 const wchar_t* key_name,
56 HRESULT Open(HKEY parent_key, const wchar_t* key_name);
58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired);
80 bool HasSubkey(const wchar_t* key_name) const;
91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name);
245 HRESULT DeleteSubKey(const wchar_t* key_name);
248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name);
282 static bool SafeKeyNameForDeletion(const wchar_t* key_name);
307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
/external/autotest/client/site_tests/hardware_Keyboard/
Dhardware_Keyboard.py34 def _supported(self, event, key_name): argument
36 cmd += ' -s ' + key_name
39 logging.error('Unsupported Key : %s' % key_name)
41 logging.info('%s : %s' % (key_name, output))
65 if not all(self._supported(high_key_event, key_name)
66 for key_name in hardware_Keyboard.supported_keys):
/external/chromium-trace/catapult/common/py_utils/py_utils/
Ddiscover.py155 key_name = camel_case.ToUnderscore(obj.__name__)
157 key_name = module.__name__.split('.')[-1]
159 if key_name in classes and index_by_class_name:
160 assert classes[key_name] is obj, (
162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj))
164 classes[key_name] = obj
/external/autotest/client/tests/iozone/
Diozone.py100 key_name = "%d-%d-%s" % (fields[0], fields[1], l)
101 keylist[key_name] = v
125 key_name = '%s-%d-kids' % (section, w_count)
126 keylist[key_name] = match.group(3)
157 key_name = "%s-%d-%s" % (section, w_count, basekey)
158 keylist[key_name] = result
/external/boringssl/src/crypto/evp/
Devp_test.cc183 const std::string &key_name = t->GetParameter(); in ImportKey() local
184 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; in ImportKey()
185 (*key_map)[key_name] = std::move(pkey); in ImportKey()
273 const std::string &key_name = t->GetParameter(); in TestEVP() local
274 if (key_map->count(key_name) == 0) { in TestEVP()
275 ADD_FAILURE() << "Could not find key " << key_name; in TestEVP()
278 EVP_PKEY *key = (*key_map)[key_name].get(); in TestEVP()
/external/autotest/frontend/migrations/
D037_db_constraints.py73 key_name = foreign_key_name(table, field)
76 (table, key_name, field, destination_table))
80 key_name = foreign_key_name(table, field)
81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
/external/tensorflow/tensorflow/python/ops/
Dparsing_ops.py685 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
687 default_value, dtype=dense_types[i], name=key_name)
693 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
695 default_value, dtype=dense_types[i], name=key_name)
1122 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
1124 default_value, dtype=context_dense_types[i], name=key_name)
1376 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
1378 default_value, dtype=dense_types[i], name=key_name)
1384 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
1386 default_value, dtype=dense_types[i], name=key_name)
/external/libchrome/base/trace_event/
Dtrace_event_argument.cc58 std::string key_name; in ReadKeyName() local
62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value)); in ReadKeyName()
64 res = pickle_iterator.ReadString(&key_name); in ReadKeyName()
67 return key_name; in ReadKeyName()
/external/libxkbcommon/xkbcommon/src/xkbcomp/
Dast.h191 xkb_atom_t key_name; member
239 ExprKeyName key_name; member
Dast-build.c117 ExprCreateKeyName(xkb_atom_t key_name) in ExprCreateKeyName() argument
120 expr->key_name.key_name = key_name; in ExprCreateKeyName()
Dast-build.h43 ExprCreateKeyName(xkb_atom_t key_name);
Dsymbols.c235 bool report, xkb_layout_index_t group, xkb_atom_t key_name) in MergeGroups() argument
255 group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
298 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
320 i + 1, group + 1, KeyNameText(info->ctx, key_name), in MergeGroups()
1183 tmp.u.keyName = key->key_name.key_name; in HandleModMapDef()
/external/tensorflow/tensorflow/contrib/training/python/training/
Dsequence_queueing_state_saver_test.py430 key_name = got_key[i].decode("ascii").split(":")[1]
432 self.assertTrue(key_name in original_values)
434 self.assertEqual(key_name,
437 stored_state = original_values[key_name]
440 (sequence[i], sequence_count[i], key_name),
/external/boringssl/src/tool/
Dspeed.cc143 static bool SpeedRSA(const std::string &key_name, RSA *key, in SpeedRSA() argument
145 if (!selected.empty() && key_name.find(selected) == std::string::npos) { in SpeedRSA()
166 results.Print(key_name + " signing"); in SpeedRSA()
192 results.Print(key_name + " verify"); in SpeedRSA()
/external/tensorflow/tensorflow/python/debug/wrappers/
Dlocal_cli_wrapper.py469 key_name = common.get_graph_element_name(key)
470 if key_name == tensor_name:
471 feed_key = key_name
/external/autotest/client/site_tests/hardware_Keyboard/src/
Devtest.c350 int is_key_supported(int fd, char *key_name) in is_key_supported() argument
353 int keycode = keycode_from_name(key_name); in is_key_supported()
364 printf("Invalid keycode %s", key_name); in is_key_supported()
/external/boringssl/src/ssl/
Dssl_session.cc498 uint8_t key_name[16]; in ssl_encrypt_ticket_with_cipher_ctx() local
500 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, ctx.get(), hctx.get(), in ssl_encrypt_ticket_with_cipher_ctx()
517 OPENSSL_memcpy(key_name, tctx->tlsext_ticket_key_current->name, 16); in ssl_encrypt_ticket_with_cipher_ctx()
521 if (!CBB_add_bytes(out, key_name, 16) || in ssl_encrypt_ticket_with_cipher_ctx()
/external/syslinux/com32/menu/
Dreadconfig.c753 char *key_name, *k, *ek; in parse_config_file() local
756 p = get_word(skipspace(p + 9), &key_name); in parse_config_file()
758 k = key_name; in parse_config_file()
772 refstr_put(key_name); in parse_config_file()
/external/libxkbcommon/xkbcommon/src/x11/
Dkeymap.c991 xkb_atom_t *key_name = &keymap->keys[reply->firstKey + i].name; in get_key_names() local
994 *key_name = XKB_ATOM_NONE; in get_key_names()
997 *key_name = xkb_atom_intern(keymap->ctx, wire->name, in get_key_names()
1000 if (!*key_name) in get_key_names()
/external/python/cpython3/PC/
Dlauncher.c211 wchar_t *key_name = (root == HKEY_LOCAL_MACHINE) ? L"HKLM" : L"HKCU"; in locate_pythons_for_key() local
215 key_name); in locate_pythons_for_key()
238 debug(L"%ls\\%ls: %ls", key_name, ip_path, message); in locate_pythons_for_key()
247 debug(L"%ls\\%ls: %ls\n", key_name, ip_path, message); in locate_pythons_for_key()
/external/toolchain-utils/cros_utils/
Dtabulator.py101 def __init__(self, d, l, sort=SORT_BY_KEYS, key_name='keys'): argument
105 self._key_name = key_name
/external/python/cpython2/PC/bdist_wininst/
Dinstall.c2153 char key_name[80]; in NeedAutoUAC() local
2158 wsprintf(key_name, in NeedAutoUAC()
2162 key_name, 0, KEY_READ, &hk)) in NeedAutoUAC()
/external/python/cpython3/PC/bdist_wininst/
Dinstall.c2197 char key_name[80]; in NeedAutoUAC() local
2202 wsprintf(key_name, in NeedAutoUAC()
2206 key_name, 0, KEY_READ, &hk)) in NeedAutoUAC()
/external/boringssl/src/ssl/test/
Dbssl_shim.cc921 static int TicketKeyCallback(SSL *ssl, uint8_t *key_name, uint8_t *iv, in TicketKeyCallback() argument
937 OPENSSL_memcpy(key_name, kZeros, sizeof(kZeros)); in TicketKeyCallback()
939 } else if (OPENSSL_memcmp(key_name, kZeros, 16) != 0) { in TicketKeyCallback()

12