/dports/lang/rust/rustc-1.58.1-src/src/tools/rustfmt/tests/source/ |
H A D | fn-simple.rs | 46 pub fn start_export_thread<C: CryptoSchemee + 'static>(database: &Database, crypto_scheme: &C, bloc… in start_export_thread()
|
/dports/lang/rust/rustc-1.58.1-src/src/tools/rustfmt/tests/target/ |
H A D | fn-simple.rs | 82 crypto_scheme: &C, in start_export_thread()
|
/dports/databases/percona57-server/percona-server-5.7.36-39/sql/ |
H A D | log_event.h | 1758 crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 1760 assert(crypto_scheme == 1); in Start_encryption_log_event() 1761 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 1767 uchar scheme_buf= crypto_scheme; in write_data_body() 1791 uint crypto_scheme; variable
|
H A D | log_event.cc | 5611 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 5618 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 5620 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 5652 my_b_printf(head,"Encryption scheme: %d", crypto_scheme); in print() 5758 if (crypto_data.init(sele->crypto_scheme, sele->key_version, sele->nonce)) in start_decryption()
|
/dports/databases/percona57-client/percona-server-5.7.36-39/sql/ |
H A D | log_event.h | 1758 crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 1760 assert(crypto_scheme == 1); in Start_encryption_log_event() 1761 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 1767 uchar scheme_buf= crypto_scheme; in write_data_body() 1791 uint crypto_scheme; variable
|
H A D | log_event.cc | 5611 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 5618 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 5620 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 5652 my_b_printf(head,"Encryption scheme: %d", crypto_scheme); in print() 5758 if (crypto_data.init(sele->crypto_scheme, sele->key_version, sele->nonce)) in start_decryption()
|
/dports/databases/percona57-pam-for-mysql/percona-server-5.7.36-39/sql/ |
H A D | log_event.h | 1758 crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 1760 assert(crypto_scheme == 1); in Start_encryption_log_event() 1761 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 1767 uchar scheme_buf= crypto_scheme; in write_data_body() 1791 uint crypto_scheme; variable
|
H A D | log_event.cc | 5611 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 5618 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 5620 is_valid_param= crypto_scheme == 1; in Start_encryption_log_event() 5652 my_b_printf(head,"Encryption scheme: %d", crypto_scheme); in print() 5758 if (crypto_data.init(sele->crypto_scheme, sele->key_version, sele->nonce)) in start_decryption()
|
/dports/databases/mariadb103-client/mariadb-10.3.34/sql/ |
H A D | log_event.h | 2699 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2702 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2708 uchar scheme_buf= crypto_scheme; in write_data_body() 2723 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2733 uint crypto_scheme; variable
|
H A D | log_event.cc | 6612 return crypto_data.init(sele->crypto_scheme, sele->key_version); in start_decryption() 6731 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 6738 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 6766 buf.append_ulonglong(crypto_scheme); in print()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/sql/ |
H A D | log_event.h | 2699 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2702 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2708 uchar scheme_buf= crypto_scheme; in write_data_body() 2723 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2733 uint crypto_scheme; variable
|
H A D | log_event.cc | 6612 return crypto_data.init(sele->crypto_scheme, sele->key_version); 6731 crypto_scheme = *(uchar*)buf; 6738 crypto_scheme= ~0; // invalid 6766 buf.append_ulonglong(crypto_scheme);
|
/dports/databases/mariadb104-server/mariadb-10.4.24/sql/ |
H A D | log_event.h | 2699 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2702 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2708 uchar scheme_buf= crypto_scheme; in write_data_body() 2723 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2733 uint crypto_scheme; variable
|
H A D | log_event.cc | 6655 return crypto_data.init(sele->crypto_scheme, sele->key_version); in start_decryption() 6772 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 6779 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 6807 buf.append_ulonglong(crypto_scheme); in print()
|
H A D | log.cc | 3608 if (crypto.init(sele.crypto_scheme, key_version)) in open()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/sql/ |
H A D | log_event.h | 2699 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2702 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2708 uchar scheme_buf= crypto_scheme; in write_data_body() 2723 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2733 uint crypto_scheme; variable
|
H A D | log_event.cc | 6655 return crypto_data.init(sele->crypto_scheme, sele->key_version); in start_decryption() 6772 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 6779 crypto_scheme= ~0; // invalid in Start_encryption_log_event() 6807 buf.append_ulonglong(crypto_scheme); in print()
|
H A D | log.cc | 3608 if (crypto.init(sele.crypto_scheme, key_version)) in open()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/sql/ |
H A D | log_event.h | 2706 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2709 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2715 uchar scheme_buf= crypto_scheme; in write_data_body() 2730 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2740 uint crypto_scheme; variable
|
H A D | log_event.cc | 2271 return crypto_data.init(sele->crypto_scheme, sele->key_version); in start_decryption() 2388 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 2395 crypto_scheme= ~0; // invalid in Start_encryption_log_event()
|
H A D | log_event_client.cc | 2118 buf.append_ulonglong(crypto_scheme); in print()
|
H A D | log.cc | 3743 if (crypto.init(sele.crypto_scheme, key_version)) in open()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/sql/ |
H A D | log_event.h | 2706 : crypto_scheme(crypto_scheme_arg), key_version(key_version_arg) in Start_encryption_log_event() 2709 DBUG_ASSERT(crypto_scheme == 1); in Start_encryption_log_event() 2715 uchar scheme_buf= crypto_scheme; in write_data_body() 2730 bool is_valid() const { return crypto_scheme == 1; } in is_valid() 2740 uint crypto_scheme; variable
|
H A D | log_event.cc | 2271 return crypto_data.init(sele->crypto_scheme, sele->key_version); in start_decryption() 2388 crypto_scheme = *(uchar*)buf; in Start_encryption_log_event() 2395 crypto_scheme= ~0; // invalid in Start_encryption_log_event()
|
H A D | log_event_client.cc | 2118 buf.append_ulonglong(crypto_scheme); in print()
|