/bionic/libc/upstream-netbsd/lib/libc/resolv/ |
mtctxres.c | 15 static pthread_key_t key; variable 30 * Initialize the TSD key. By doing this at library load time, we're 38 pthread_keycreate_ret = pthread_key_create(&key, __res_destroy_ctx); 67 if (pthread_getspecific(key) != 0) { 79 if ((ret = pthread_setspecific(key, mt)) != 0) { 122 if (((mt = pthread_getspecific(key)) != 0) || 124 (mt = pthread_getspecific(key)) != 0)) {
|
/bionic/libc/upstream-openbsd/lib/libc/stdlib/ |
tsearch.c | 18 char *key; member in struct:node_t 28 char *key = (char *)vkey; local 36 if ((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */ 42 q = malloc(sizeof(node)); /* T5: key not found */ 45 q->key = key; /* initialize new node */ 51 /* delete node with given key */ 57 char *key = (char *)vkey; local 65 while ((cmp = (*compar)(key, (*rootp)->key)) != 0) [all...] |
/bionic/tests/ |
sys_sem_test.cpp | 44 key_t key = ftok(dir.dirname, 1); local 45 int id = semget(key, 1, IPC_CREAT|0666);
|
/device/generic/goldfish/camera/ |
EmulatedFakeCamera.cpp | 40 const char *key = "ro.kernel.qemu.camera.fake.rotating"; local 42 if (property_get(key, prop, nullptr) > 0) {
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/include/ |
cert.h | 13 #include "key.h" 39 int key; /* Key to be signed */ member in struct:cert_s
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/_sqlite/ |
cache.h | 35 PyObject* key;
member in struct:_pysqlite_Node
|
microprotocols.c | 57 PyObject* key;
local 62 key = Py_BuildValue("(OO)", (PyObject*)type, proto);
63 if (!key) {
67 rc = PyDict_SetItem(psyco_adapters, key, cast);
68 Py_DECREF(key);
78 PyObject *adapter, *key;
local 85 key = Py_BuildValue("(OO)", (PyObject*)obj->ob_type, proto);
86 if (!key) {
89 adapter = PyDict_GetItem(psyco_adapters, key);
90 Py_DECREF(key);
[all...] |
/external/ImageMagick/MagickCore/ |
artifact.c | 139 % "key=value" with per-image artifact. It is equivelent to 158 key[MagickPathExtent], 166 (void) CopyMagickString(key,artifact,MagickPathExtent-1); 167 for (p=key; *p != '\0'; p++) 174 return(SetImageArtifact(image,key,value)); 270 % const char *GetImageArtifact(const Image *image,const char *key) 276 % o key: the key. 454 % o artifact: the image artifact key. 470 Create tree if needed - specify how key,values are to be freed 155 key[MagickPathExtent], local [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 24 // Tests deriving a key using an empty password (specified both as NULL and as 30 uint8_t key[sizeof(kKey)]; local 33 EVP_sha1(), sizeof(kKey), key)); 34 EXPECT_EQ(Bytes(kKey), Bytes(key)); 37 EVP_sha1(), sizeof(kKey), key)); 38 EXPECT_EQ(Bytes(kKey), Bytes(key)); 41 // Tests deriving a key using an empty salt. Note that the expectation was 48 uint8_t key[sizeof(kKey)]; local 51 sizeof(kKey), key)); 52 EXPECT_EQ(Bytes(kKey), Bytes(key)); 70 uint8_t key[sizeof(kKey1)]; local 106 uint8_t key[sizeof(kKey2)]; local 132 uint8_t key[10] = {0}; local [all...] |
/external/boringssl/src/crypto/lhash/ |
lhash_test.cc | 48 std::map<std::string, std::unique_ptr<char[]>> *dummy_lh, const char *key) { 50 auto iter = dummy_lh->find(key); 103 std::unique_ptr<char[]> key = RandString(); local 104 void *value = lh_retrieve(lh.get(), key.get()); 105 EXPECT_EQ(Lookup(&dummy_lh, key.get()), value); 110 std::unique_ptr<char[]> key = RandString(); local 112 ASSERT_TRUE(lh_insert(lh.get(), &previous, key.get())); 113 EXPECT_EQ(Lookup(&dummy_lh, key.get()), previous); 114 dummy_lh[key.get()] = std::move(key); 119 std::unique_ptr<char[]> key = RandString(); local [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs12_test.cc | 28 // openssl pkcs12 -export -inkey key.pem -in cacert.pem 907 EVP_PKEY *key = nullptr; local 926 EVP_PKEY *key = nullptr; local [all...] |
/external/boringssl/src/decrepit/cfb/ |
cfb_test.cc | 24 uint8_t key[16]; member in struct:CFBTestCase 60 test.key, test.iv)); 82 nullptr, test.key, test.iv));
|
/external/boringssl/src/fipstools/ |
cavp_hmac_test.cc | 56 std::vector<uint8_t> key, msg; local 60 !t->GetBytes(&key, "Key") || 67 if (key.size() < k_len) { 72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) ==
|
/external/boringssl/src/tool/ |
pkcs12.cc | 52 "Dump the key and contents of the given file to stdout", 123 EVP_PKEY *key; local 126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) { 131 bssl::UniquePtr<EVP_PKEY> key_owned(key); 133 if (key != NULL) { 134 PEM_write_PrivateKey(stdout, key, NULL, NULL, 0, NULL, NULL);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/agreement/ |
DHBasicAgreement.java | 14 * a Diffie-Hellman key agreement class. 25 private DHPrivateKeyParameters key; field in class:DHBasicAgreement 48 this.key = (DHPrivateKeyParameters)kParam; 49 this.dhParams = key.getParameters(); 54 return (key.getParameters().getP().bitLength() + 7) / 8; 58 * given a short term public key from a given party calculate the next 68 throw new IllegalArgumentException("Diffie-Hellman public key has wrong parameters."); 71 BigInteger result = pub.getY().modPow(key.getX(), dhParams.getP()); 74 throw new IllegalStateException("Shared key can't be 1");
|
ECDHBasicAgreement.java | 20 * party's private key and another party's public key, where both have 23 * primitive can be invoked by a scheme to derive a shared secret key; 31 private ECPrivateKeyParameters key; field in class:ECDHBasicAgreement 34 CipherParameters key) 36 this.key = (ECPrivateKeyParameters)key; 41 return (key.getParameters().getCurve().getFieldSize() + 7) / 8; 49 ECCurve myCurve = key.getParameters().getCurve(); 51 throw new IllegalStateException("Infinity is not a valid public key for ECDH") [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 10 private KeyParameter key; field in class:AEADParameters 16 * @param key key to be used by underlying cipher 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 22 this(key, macSize, nonce, null); 28 * @param key key to be used by underlying cipher 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 35 this.key = key; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
KeyFactory.java | 4 import java.security.Key; 30 PrivateKey key = BouncyCastleProvider.getPrivateKey(info); local 32 if (key != null) 34 return key; 57 PublicKey key = BouncyCastleProvider.getPublicKey(info); local 59 if (key != null) 61 return key; 75 protected KeySpec engineGetKeySpec(Key key, Class keySpec) 78 if (keySpec.isAssignableFrom(PKCS8EncodedKeySpec.class) && key.getFormat().equals("PKCS#8") [all...] |
/external/cmockery/cmockery_0_1_2/src/example/ |
key_value_test.c | 25 unsigned int key; member in struct:KeyValue 58 assert_int_equal(found->key, key_values[i].key); 68 assert_true(kv[i - 1].key < kv[i].key);
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_posix_test.cc | 25 static pthread_key_t key; member in namespace:__sanitizer 32 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void *>(iter - 1))); 40 return reinterpret_cast<void*>(pthread_setspecific(key, arg)); 54 ASSERT_EQ(0, pthread_key_create(&key, &destructor)); 59 ASSERT_EQ(0, pthread_key_delete(key));
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLECKeyPairGenerator.java | 70 final OpenSSLKey key = new OpenSSLKey( local 72 return new KeyPair(new OpenSSLECPublicKey(group, key), new OpenSSLECPrivateKey(group, key)); 79 throw new InvalidParameterException("unknown key size " + keysize);
|
OpenSSLRSAKeyPairGenerator.java | 45 * Default RSA key size 2048 bits. 51 final OpenSSLKey key = new OpenSSLKey(NativeCrypto.RSA_generate_key_ex(modulusBits, local 54 PrivateKey privKey = OpenSSLRSAPrivateKey.getInstance(key); 55 PublicKey pubKey = new OpenSSLRSAPublicKey(key);
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
OpenSSLKeyTest.java | 25 "-----BEGIN PUBLIC KEY-----\n" + 28 "-----END PUBLIC KEY-----"; 31 "-----BEGIN RSA PRIVATE KEY-----\n" + 39 "-----END RSA PRIVATE KEY-----"; 52 OpenSSLKey key = OpenSSLKey.fromPublicKeyPemInputStream(is); local 53 OpenSSLRSAPublicKey publicKey = (OpenSSLRSAPublicKey)key.getPublicKey(); 60 OpenSSLKey key = OpenSSLKey.fromPrivateKeyPemInputStream(is); local 61 OpenSSLRSAPrivateKey privateKey = (OpenSSLRSAPrivateKey)key.getPrivateKey();
|
/external/curl/tests/unit/ |
unit1309.c | 51 printf("%ld.%ld[%d]", (long)t->key.tv_sec, 52 (long)t->key.tv_usec, i); 82 struct curltime key; variable in typeref:struct:curltime 85 key.tv_sec = 0; 86 key.tv_usec = (541*i)%1023; 87 payload = (size_t) key.tv_usec; 90 root = Curl_splayinsert(key, root, &nodes[i]); 114 struct curltime key; variable in typeref:struct:curltime 116 key.tv_sec = 0; 117 key.tv_usec = (541*i)%1023 [all...] |
unit1602.c | 56 int key = 20; variable 63 nodep = Curl_hash_add(&hash_static, &key, klen, value); 69 /* Attempt to add another key/value pair */
|