/device/samsung/crespo/alsa-lib/src/mixer/ |
bag.c | 2 * Bag of pointers 24 int bag_new(bag_t **bag) 30 *bag = b; 34 void bag_free(bag_t *bag) 36 assert(list_empty(bag)); 37 free(bag); 40 int bag_empty(bag_t *bag) 42 return list_empty(bag); 45 int bag_add(bag_t *bag, void *ptr) 51 list_add_tail(&b->list, bag); [all...] |
mixer_local.h | 32 int bag_new(bag_t **bag); 33 void bag_free(bag_t *bag); 34 int bag_add(bag_t *bag, void *ptr); 35 int bag_del(bag_t *bag, void *ptr); 36 int bag_empty(bag_t *bag); 37 void bag_del_all(bag_t *bag); 42 #define bag_for_each(pos, bag) list_for_each(pos, bag) 43 #define bag_for_each_safe(pos, next, bag) list_for_each_safe(pos, next, bag) [all...] |
mixer.c | 94 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local 96 err = bag_add(bag, melem); 113 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local 115 err = bag_del(bag, melem); 137 bag_t *bag = snd_hctl_elem_get_callback_private(helem); local 142 bag_for_each_safe(i, n, bag) { 149 assert(bag_empty(bag)); 150 bag_free(bag); 156 bag_for_each_safe(i, n, bag) { 174 bag_t *bag; local [all...] |
/external/openssl/crypto/pkcs12/ |
p12_attr.c | 65 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, 68 if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, 90 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 93 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 101 int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, 104 if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, 111 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, 114 if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, 137 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) 140 if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL [all...] |
p12_crt.c | 64 static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag); 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) 74 if (!X509at_add1_attr(&bag->attrib, attr)) 86 PKCS12_SAFEBAG *bag = NULL; local 116 bag = PKCS12_add_cert(&bags, cert); 117 if(name && !PKCS12_add_friendlyname(bag, name, -1)) 119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 140 if (!bag) 143 if (!copy_bag_attr(bag, pkey, NID_ms_csp_name) 189 PKCS12_SAFEBAG *bag = NULL; local 232 PKCS12_SAFEBAG *bag = NULL; local [all...] |
p12_utl.c | 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) 135 if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; 136 if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); 140 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) 142 if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; 143 if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; 144 return ASN1_item_unpack(bag->value.bag->value.octet [all...] |
p12_add.c | 68 PKCS12_BAGS *bag; local 70 if (!(bag = PKCS12_BAGS_new())) { 74 bag->type = OBJ_nid2obj(nid1); 75 if (!ASN1_item_pack(obj, it, &bag->value.octet)) { 83 safebag->value.bag = bag; 92 PKCS12_SAFEBAG *bag; local 93 if (!(bag = PKCS12_SAFEBAG_new())) { 97 bag->type = OBJ_nid2obj(NID_keyBag); 98 bag->value.keybag = p8 108 PKCS12_SAFEBAG *bag; local [all...] |
p12_npas.c | 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 140 /* Repack bag in same form with new password */ 192 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) 198 if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 201 if (!alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, 206 X509_SIG_free(bag->value.shkeybag); 207 bag->value.shkeybag = p8new;
|
p12_kiss.c | 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 224 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 233 if ((attrib = PKCS12_get_attr (bag, NID_friendlyName))) 236 if ((attrib = PKCS12_get_attr (bag, NID_localKeyID))) 239 switch (M_PKCS12_bag_type(bag)) 244 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) 251 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) 259 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate ) 261 if (!(x509 = PKCS12_certbag2x509(bag))) 292 return parse_bags(bag->value.safes, pass, passlen [all...] |
pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon5588::__anon5589 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen) [all...] |
p12_asn.c | 103 ADB_ENTRY(NID_certBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 104 ADB_ENTRY(NID_crlBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0)), 105 ADB_ENTRY(NID_secretBag, ASN1_EXP(PKCS12_SAFEBAG, value.bag, PKCS12_BAGS, 0))
|
/cts/tests/tests/content/src/android/content/res/cts/ |
ConfigTest.java | 193 checkValue(res, R.configVarying.bag, 194 R.styleable.TestConfig, new String[]{"bag default"}); 200 checkValue(res, R.configVarying.bag, 201 R.styleable.TestConfig, new String[]{"bag xx"}); 208 checkValue(res, R.configVarying.bag, 209 R.styleable.TestConfig, new String[]{"bag xx-rYY"}); 215 checkValue(res, R.configVarying.bag, 216 R.styleable.TestConfig, new String[]{"bag mcc111"}); 222 checkValue(res, R.configVarying.bag, 223 R.styleable.TestConfig, new String[]{"bag mnc222"}) [all...] |
/external/openssl/include/openssl/ |
pkcs12.h | 114 struct pkcs12_bag_st *bag; /* secret, crl and certbag */ member in union:__anon5632::__anon5633 116 X509_SIG *shkeybag; /* shrouded key bag */ 134 ASN1_TYPE *other; /* Secret or other bag */ 158 #define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) 161 #define PKCS12_get_attr(bag, attr_nid) \ 162 PKCS12_get_attr_gen(bag->attrib, attr_nid) 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 173 X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 199 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen) [all...] |
/external/openssl/apps/ |
pkcs12.c | 753 int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass, 760 switch (M_PKCS12_bag_type(bag)) 763 if (options & INFO) BIO_printf (bio_err, "Key bag\n"); 765 print_attribs (out, bag->attrib, "Bag Attributes"); 766 p8 = bag->value.keybag; 776 alg_print (bio_err, bag->value.shkeybag->algor); 779 print_attribs (out, bag->attrib, "Bag Attributes"); 780 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)) [all...] |
/frameworks/base/libs/utils/ |
ResourceTypes.cpp | 1408 const bag_entry* bag; local 2883 const bag_entry* bag; local 3260 const bag_entry* bag; local 3299 const bag_entry* bag; local [all...] |
/frameworks/base/core/jni/ |
android_util_AssetManager.cpp | 992 // Retrieve the default style bag, if requested. 1001 // Retrieve the style class bag, if requested. 1461 const ResTable::bag_entry* bag = startOfBag; local 1519 const ResTable::bag_entry* bag = startOfBag; local 1585 const ResTable::bag_entry* bag = startOfBag; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 693 Pfx bag = new Pfx(obj); local 694 ContentInfo info = bag.getAuthSafe(); 699 if (bag.getMacData() != null) // check the mac code 701 MacData mData = bag.getMacData(); [all...] |
/frameworks/base/include/utils/ |
ResourceTypes.h | [all...] |
/external/v8/test/mjsunit/ |
unicode-test.js | [all...] |