HomeSort by relevance Sort by last modified time
    Searched refs:bag (Results 1 - 19 of 19) sorted by null

  /device/samsung/crespo/alsa-lib/src/mixer/
bag.c 2 * Bag of pointers
24 int bag_new(bag_t **bag)
30 *bag = b;
34 void bag_free(bag_t *bag)
36 assert(list_empty(bag));
37 free(bag);
40 int bag_empty(bag_t *bag)
42 return list_empty(bag);
45 int bag_add(bag_t *bag, void *ptr)
51 list_add_tail(&b->list, bag);
    [all...]
mixer_local.h 32 int bag_new(bag_t **bag);
33 void bag_free(bag_t *bag);
34 int bag_add(bag_t *bag, void *ptr);
35 int bag_del(bag_t *bag, void *ptr);
36 int bag_empty(bag_t *bag);
37 void bag_del_all(bag_t *bag);
42 #define bag_for_each(pos, bag) list_for_each(pos, bag)
43 #define bag_for_each_safe(pos, next, bag) list_for_each_safe(pos, next, bag)
    [all...]
mixer.c 94 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local
96 err = bag_add(bag, melem);
113 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local
115 err = bag_del(bag, melem);
137 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local
142 bag_for_each_safe(i, n, bag) {
149 assert(bag_empty(bag));
150 bag_free(bag);
156 bag_for_each_safe(i, n, bag) {
174 bag_t *bag; local
    [all...]
  /external/openssl/crypto/pkcs12/
p12_attr.c 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name,
68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID,
90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name,
93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag,
104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName,
111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name,
114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name,
137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag)
140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL
    [all...]
p12_crt.c 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag);
66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid)
74 if (!X509at_add1_attr(&bag->attrib, attr))
86 PKCS12_SAFEBAG *bag = NULL; local
116 bag = PKCS12_add_cert(&bags, cert);
117 if(name && !PKCS12_add_friendlyname(bag, name, -1))
119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
140 if (!bag)
143 if (!copy_bag_attr(bag, pkey, NID_ms_csp_name)
189 PKCS12_SAFEBAG *bag = NULL; local
232 PKCS12_SAFEBAG *bag = NULL; local
    [all...]
p12_utl.c 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag)
135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL;
136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL;
137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509));
140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag)
142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL;
143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL;
144 return ASN1_item_unpack(bag->value.bag->value.octet
    [all...]
p12_add.c 68 PKCS12_BAGS *bag; local
70 if (!(bag = PKCS12_BAGS_new())) {
74 bag->type = OBJ_nid2obj(nid1);
75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
83 safebag->value.bag = bag;
92 PKCS12_SAFEBAG *bag; local
93 if (!(bag = PKCS12_SAFEBAG_new())) {
97 bag->type = OBJ_nid2obj(NID_keyBag);
98 bag->value.keybag = p8
108 PKCS12_SAFEBAG *bag; local
    [all...]
p12_npas.c 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
140 /* Repack bag in same form with new password */
192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass)
198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1;
200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0;
201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter,
206 X509_SIG_free(bag->value.shkeybag);
207 bag->value.shkeybag = p8new;
p12_kiss.c 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName)))
236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID)))
239 switch (M_PKCS12_bag_type(bag))
244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag)))
251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate )
261 if (!(x509 = PKCS12_certbag2x509(bag)))
292 return parse_bags(bag->value.safes, pass, passlen
    [all...]
pkcs12.h 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon5588::__anon5589
116 X509_SIG *shkeybag; /* shrouded key bag */
134 ASN1_TYPE *other; /* Secret or other bag */
158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
161 #define PKCS12_get_attr(bag, attr_nid) \
162 PKCS12_get_attr_gen(bag->attrib, attr_nid)
172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen)
    [all...]
p12_asn.c 103 ADB_ENTRY(NID_certBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)),
104 ADB_ENTRY(NID_crlBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)),
105 ADB_ENTRY(NID_secretBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0))
  /cts/tests/tests/content/src/android/content/res/cts/
ConfigTest.java 193 checkValue(res, R.configVarying.bag,
194 R.styleable.TestConfig, new String[]{"bag default"});
200 checkValue(res, R.configVarying.bag,
201 R.styleable.TestConfig, new String[]{"bag xx"});
208 checkValue(res, R.configVarying.bag,
209 R.styleable.TestConfig, new String[]{"bag xx-rYY"});
215 checkValue(res, R.configVarying.bag,
216 R.styleable.TestConfig, new String[]{"bag mcc111"});
222 checkValue(res, R.configVarying.bag,
223 R.styleable.TestConfig, new String[]{"bag mnc222"})
    [all...]
  /external/openssl/include/openssl/
pkcs12.h 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon5632::__anon5633
116 X509_SIG *shkeybag; /* shrouded key bag */
134 ASN1_TYPE *other; /* Secret or other bag */
158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type)
161 #define PKCS12_get_attr(bag, attr_nid) \
162 PKCS12_get_attr_gen(bag->attrib, attr_nid)
172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag);
173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen)
    [all...]
  /external/openssl/apps/
pkcs12.c 753 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
760 switch (M_PKCS12_bag_type(bag))
763 if (options & INFO) BIO_printf (bio_err, "Key bag\n");
765 print_attribs (out, bag->attrib, "Bag Attributes");
766 p8 = bag->value.keybag;
776 alg_print (bio_err, bag->value.shkeybag->algor);
779 print_attribs (out, bag->attrib, "Bag Attributes");
780 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))
    [all...]
  /frameworks/base/libs/utils/
ResourceTypes.cpp 1408 const bag_entry* bag; local
2883 const bag_entry* bag; local
3260 const bag_entry* bag; local
3299 const bag_entry* bag; local
    [all...]
  /frameworks/base/core/jni/
android_util_AssetManager.cpp 992 // Retrieve the default style bag, if requested.
1001 // Retrieve the style class bag, if requested.
1461 const ResTable::bag_entry* bag = startOfBag; local
1519 const ResTable::bag_entry* bag = startOfBag; local
1585 const ResTable::bag_entry* bag = startOfBag; local
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JDKPKCS12KeyStore.java 693 Pfx bag = new Pfx(obj); local
694 ContentInfo info = bag.getAuthSafe();
699 if (bag.getMacData() != null) // check the mac code
701 MacData mData = bag.getMacData();
    [all...]
  /frameworks/base/include/utils/
ResourceTypes.h     [all...]
  /external/v8/test/mjsunit/
unicode-test.js     [all...]

Completed in 1578 milliseconds