HomeSort by relevance Sort by last modified time
    Searched defs:key (Results 151 - 175 of 6954) sorted by null

1 2 3 4 5 67 8 91011>>

  /bionic/libc/upstream-netbsd/lib/libc/resolv/
mtctxres.c 15 static pthread_key_t key; variable
30 * Initialize the TSD key. By doing this at library load time, we're
38 pthread_keycreate_ret = pthread_key_create(&key, __res_destroy_ctx);
67 if (pthread_getspecific(key) != 0) {
79 if ((ret = pthread_setspecific(key, mt)) != 0) {
122 if (((mt = pthread_getspecific(key)) != 0) ||
124 (mt = pthread_getspecific(key)) != 0)) {
  /bionic/libc/upstream-openbsd/lib/libc/stdlib/
tsearch.c 18 char *key; member in struct:node_t
28 char *key = (char *)vkey; local
36 if ((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */
42 q = malloc(sizeof(node)); /* T5: key not found */
45 q->key = key; /* initialize new node */
51 /* delete node with given key */
57 char *key = (char *)vkey; local
65 while ((cmp = (*compar)(key, (*rootp)->key)) != 0)
    [all...]
  /bionic/tests/
sys_sem_test.cpp 44 key_t key = ftok(dir.dirname, 1); local
45 int id = semget(key, 1, IPC_CREAT|0666);
  /device/generic/goldfish/camera/
EmulatedFakeCamera.cpp 40 const char *key = "ro.kernel.qemu.camera.fake.rotating"; local
42 if (property_get(key, prop, nullptr) > 0) {
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/include/
cert.h 13 #include "key.h"
39 int key; /* Key to be signed */ member in struct:cert_s
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/_sqlite/
cache.h 35 PyObject* key; member in struct:_pysqlite_Node
microprotocols.c 57 PyObject* key; local
62 key = Py_BuildValue("(OO)", (PyObject*)type, proto);
63 if (!key) {
67 rc = PyDict_SetItem(psyco_adapters, key, cast);
68 Py_DECREF(key);
78 PyObject *adapter, *key; local
85 key = Py_BuildValue("(OO)", (PyObject*)obj->ob_type, proto);
86 if (!key) {
89 adapter = PyDict_GetItem(psyco_adapters, key);
90 Py_DECREF(key);
    [all...]
  /external/ImageMagick/MagickCore/
artifact.c 139 % "key=value" with per-image artifact. It is equivelent to
158 key[MagickPathExtent],
166 (void) CopyMagickString(key,artifact,MagickPathExtent-1);
167 for (p=key; *p != '\0'; p++)
174 return(SetImageArtifact(image,key,value));
270 % const char *GetImageArtifact(const Image *image,const char *key)
276 % o key: the key.
454 % o artifact: the image artifact key.
470 Create tree if needed - specify how key,values are to be freed
155 key[MagickPathExtent], local
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf_test.cc 24 // Tests deriving a key using an empty password (specified both as NULL and as
30 uint8_t key[sizeof(kKey)]; local
33 EVP_sha1(), sizeof(kKey), key));
34 EXPECT_EQ(Bytes(kKey), Bytes(key));
37 EVP_sha1(), sizeof(kKey), key));
38 EXPECT_EQ(Bytes(kKey), Bytes(key));
41 // Tests deriving a key using an empty salt. Note that the expectation was
48 uint8_t key[sizeof(kKey)]; local
51 sizeof(kKey), key));
52 EXPECT_EQ(Bytes(kKey), Bytes(key));
70 uint8_t key[sizeof(kKey1)]; local
106 uint8_t key[sizeof(kKey2)]; local
132 uint8_t key[10] = {0}; local
    [all...]
  /external/boringssl/src/crypto/lhash/
lhash_test.cc 48 std::map<std::string, std::unique_ptr<char[]>> *dummy_lh, const char *key) {
50 auto iter = dummy_lh->find(key);
103 std::unique_ptr<char[]> key = RandString(); local
104 void *value = lh_retrieve(lh.get(), key.get());
105 EXPECT_EQ(Lookup(&dummy_lh, key.get()), value);
110 std::unique_ptr<char[]> key = RandString(); local
112 ASSERT_TRUE(lh_insert(lh.get(), &previous, key.get()));
113 EXPECT_EQ(Lookup(&dummy_lh, key.get()), previous);
114 dummy_lh[key.get()] = std::move(key);
119 std::unique_ptr<char[]> key = RandString(); local
    [all...]
  /external/boringssl/src/crypto/pkcs8/
pkcs12_test.cc 28 // openssl pkcs12 -export -inkey key.pem -in cacert.pem
907 EVP_PKEY *key = nullptr; local
926 EVP_PKEY *key = nullptr; local
    [all...]
  /external/boringssl/src/decrepit/cfb/
cfb_test.cc 24 uint8_t key[16]; member in struct:CFBTestCase
60 test.key, test.iv));
82 nullptr, test.key, test.iv));
  /external/boringssl/src/fipstools/
cavp_hmac_test.cc 56 std::vector<uint8_t> key, msg; local
60 !t->GetBytes(&key, "Key") ||
67 if (key.size() < k_len) {
72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) ==
  /external/boringssl/src/tool/
pkcs12.cc 52 "Dump the key and contents of the given file to stdout",
123 EVP_PKEY *key; local
126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) {
131 bssl::UniquePtr<EVP_PKEY> key_owned(key);
133 if (key != NULL) {
134 PEM_write_PrivateKey(stdout, key, NULL, NULL, 0, NULL, NULL);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/agreement/
DHBasicAgreement.java 14 * a Diffie-Hellman key agreement class.
25 private DHPrivateKeyParameters key; field in class:DHBasicAgreement
48 this.key = (DHPrivateKeyParameters)kParam;
49 this.dhParams = key.getParameters();
54 return (key.getParameters().getP().bitLength() + 7) / 8;
58 * given a short term public key from a given party calculate the next
68 throw new IllegalArgumentException("Diffie-Hellman public key has wrong parameters.");
71 BigInteger result = pub.getY().modPow(key.getX(), dhParams.getP());
74 throw new IllegalStateException("Shared key can't be 1");
ECDHBasicAgreement.java 20 * party's private key and another party's public key, where both have
23 * primitive can be invoked by a scheme to derive a shared secret key;
31 private ECPrivateKeyParameters key; field in class:ECDHBasicAgreement
34 CipherParameters key)
36 this.key = (ECPrivateKeyParameters)key;
41 return (key.getParameters().getCurve().getFieldSize() + 7) / 8;
49 ECCurve myCurve = key.getParameters().getCurve();
51 throw new IllegalStateException("Infinity is not a valid public key for ECDH")
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
AEADParameters.java 10 private KeyParameter key; field in class:AEADParameters
16 * @param key key to be used by underlying cipher
20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce)
22 this(key, macSize, nonce, null);
28 * @param key key to be used by underlying cipher
33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText)
35 this.key = key;
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
KeyFactory.java 4 import java.security.Key;
30 PrivateKey key = BouncyCastleProvider.getPrivateKey(info); local
32 if (key != null)
34 return key;
57 PublicKey key = BouncyCastleProvider.getPublicKey(info); local
59 if (key != null)
61 return key;
75 protected KeySpec engineGetKeySpec(Key key, Class keySpec)
78 if (keySpec.isAssignableFrom(PKCS8EncodedKeySpec.class) && key.getFormat().equals("PKCS#8")
    [all...]
  /external/cmockery/cmockery_0_1_2/src/example/
key_value_test.c 25 unsigned int key; member in struct:KeyValue
58 assert_int_equal(found->key, key_values[i].key);
68 assert_true(kv[i - 1].key < kv[i].key);
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_posix_test.cc 25 static pthread_key_t key; member in namespace:__sanitizer
32 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void *>(iter - 1)));
40 return reinterpret_cast<void*>(pthread_setspecific(key, arg));
54 ASSERT_EQ(0, pthread_key_create(&key, &destructor));
59 ASSERT_EQ(0, pthread_key_delete(key));
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLECKeyPairGenerator.java 70 final OpenSSLKey key = new OpenSSLKey( local
72 return new KeyPair(new OpenSSLECPublicKey(group, key), new OpenSSLECPrivateKey(group, key));
79 throw new InvalidParameterException("unknown key size " + keysize);
OpenSSLRSAKeyPairGenerator.java 45 * Default RSA key size 2048 bits.
51 final OpenSSLKey key = new OpenSSLKey(NativeCrypto.RSA_generate_key_ex(modulusBits, local
54 PrivateKey privKey = OpenSSLRSAPrivateKey.getInstance(key);
55 PublicKey pubKey = new OpenSSLRSAPublicKey(key);
  /external/conscrypt/openjdk/src/test/java/org/conscrypt/
OpenSSLKeyTest.java 25 "-----BEGIN PUBLIC KEY-----\n" +
28 "-----END PUBLIC KEY-----";
31 "-----BEGIN RSA PRIVATE KEY-----\n" +
39 "-----END RSA PRIVATE KEY-----";
52 OpenSSLKey key = OpenSSLKey.fromPublicKeyPemInputStream(is); local
53 OpenSSLRSAPublicKey publicKey = (OpenSSLRSAPublicKey)key.getPublicKey();
60 OpenSSLKey key = OpenSSLKey.fromPrivateKeyPemInputStream(is); local
61 OpenSSLRSAPrivateKey privateKey = (OpenSSLRSAPrivateKey)key.getPrivateKey();
  /external/curl/tests/unit/
unit1309.c 51 printf("%ld.%ld[%d]", (long)t->key.tv_sec,
52 (long)t->key.tv_usec, i);
82 struct curltime key; variable in typeref:struct:curltime
85 key.tv_sec = 0;
86 key.tv_usec = (541*i)%1023;
87 payload = (size_t) key.tv_usec;
90 root = Curl_splayinsert(key, root, &nodes[i]);
114 struct curltime key; variable in typeref:struct:curltime
116 key.tv_sec = 0;
117 key.tv_usec = (541*i)%1023
    [all...]
unit1602.c 56 int key = 20; variable
63 nodep = Curl_hash_add(&hash_static, &key, klen, value);
69 /* Attempt to add another key/value pair */

Completed in 342 milliseconds

1 2 3 4 5 67 8 91011>>