/external/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass, 66 passlen, p8->digest, 1);
|
H A D | p12_p8e.c | 68 X509_SIG *p8 = NULL; local 71 if (!(p8 = X509_SIG_new())) { 82 X509_ALGOR_free(p8->algor); 83 p8->algor = pbe; 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) { 92 return p8; 95 X509_SIG_free(p8);
|
H A D | p12_attr.c | 77 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage) argument 81 if (X509at_add1_attr_by_NID(&p8->attributes, NID_key_usage,
|
H A D | p12_crt.c | 233 PKCS8_PRIV_KEY_INFO *p8 = NULL; local 236 if(!(p8 = EVP_PKEY2PKCS8(key))) 238 if(key_usage && !PKCS8_add_keyusage(p8, key_usage)) 242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 243 PKCS8_PRIV_KEY_INFO_free(p8); 246 bag = PKCS12_MAKE_KEYBAG(p8);
|
H A D | pkcs12.h | 164 #define PKCS8_get_attr(p8, attr_nid) \ 165 PKCS12_get_attr_gen(p8->attributes, attr_nid) 177 PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8); 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 184 PKCS8_PRIV_KEY_INFO *p8); 188 PKCS8_PRIV_KEY_INFO *p8); 206 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage);
|
H A D | p12_npas.c | 194 PKCS8_PRIV_KEY_INFO *p8; local 200 if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; 205 p8_iter, p8))) return 0;
|
/external/openssl/crypto/asn1/ |
H A D | i2d_pr.c | 72 PKCS8_PRIV_KEY_INFO *p8 = EVP_PKEY2PKCS8(a); local 73 int ret = i2d_PKCS8_PRIV_KEY_INFO(p8,pp); 74 PKCS8_PRIV_KEY_INFO_free(p8);
|
H A D | p8_pkey.c | 127 PKCS8_PRIV_KEY_INFO *p8) 130 *ppkalg = p8->pkeyalg->algorithm; 131 if(p8->pkey->type == V_ASN1_OCTET_STRING) 133 p8->broken = PKCS8_OK; 136 *pk = p8->pkey->value.octet_string->data; 137 *ppklen = p8->pkey->value.octet_string->length; 140 else if (p8->pkey->type == V_ASN1_SEQUENCE) 142 p8->broken = PKCS8_NO_OCTET; 145 *pk = p8->pkey->value.sequence->data; 146 *ppklen = p8 [all...] |
H A D | d2i_pr.c | 107 PKCS8_PRIV_KEY_INFO *p8=NULL; local 108 p8=d2i_PKCS8_PRIV_KEY_INFO(NULL,pp,length); 109 if (!p8) goto err; 111 ret = EVP_PKCS82PKEY(p8); 112 PKCS8_PRIV_KEY_INFO_free(p8); 151 PKCS8_PRIV_KEY_INFO *p8 = d2i_PKCS8_PRIV_KEY_INFO(NULL,pp,length); local 155 if (!p8) 160 ret = EVP_PKCS82PKEY(p8); 161 PKCS8_PRIV_KEY_INFO_free(p8);
|
/external/openssl/crypto/evp/ |
H A D | evp_pkey.c | 68 EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8) argument 74 if (!PKCS8_pkey_get0(&algoid, NULL, NULL, NULL, p8)) 92 if (!pkey->ameth->priv_decode(pkey, p8)) 121 PKCS8_PRIV_KEY_INFO *p8; local 123 if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) { 127 p8->broken = broken; 133 if (!pkey->ameth->priv_encode(p8, pkey)) 153 RAND_add(p8->pkey->value.octet_string->data, 154 p8->pkey->value.octet_string->length, 0.0); 155 return p8; 161 PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken) argument [all...] |
/external/icu4c/test/perf/unisetperf/ |
H A D | unisetperf.pl | 37 my $p8 = "$p SpanUTF8"; 77 "SpanUTF8", ["$p8 --type Bv", 78 "$p8 --type BvF", 79 "$p8 --type Bvp", 80 "$p8 --type BvpF", 81 "$p8 --type L", 82 "$p8 --type Bvl"
|
/external/valgrind/main/memcheck/tests/ |
H A D | leak-cases.c | 15 // p8 -?-> AAA -?-> BBB (y)DR, (n)DL / P (y,y)IR, (n,y)IL, (_,n)DL / P 65 Node* p8; variable 87 p8 = mk(mk(NULL)); // Case 8: 16/1 possibly lost 88 (p8->next)++; // 16/1 possibly lost 89 p8++;
|
H A D | atomic_incs.c | 463 char* p8; local 479 p8 = (char*)(page+0); 484 assert( IS_8_ALIGNED(p8) ); 491 *p8 = 0; 506 atomic_add_8bit(p8, 1); 521 atomic_add_8bit(p8, 1); 534 (int)(*(signed char*)p8), (int)(*p16), *p32, *p64 ); 536 if (-74 == (int)(*(signed char*)p8)
|
/external/clang/test/SemaCXX/ |
H A D | cxx11-ast-print.cpp | 35 // CHECK: const char *p8 = 4.9_quux; 36 const char *p8 = 4.9_quux; variable
|
/external/openssl/crypto/pem/ |
H A D | pem_pk8.c | 116 X509_SIG *p8; local 137 p8 = PKCS8_encrypt(nid, enc, kstr, klen, NULL, 0, 0, p8inf); 140 if(isder) ret = i2d_PKCS8_bio(bp, p8); 141 else ret = PEM_write_bio_PKCS8(bp, p8); 142 X509_SIG_free(p8); 155 X509_SIG *p8 = NULL; local 159 p8 = d2i_PKCS8_bio(bp, NULL); 160 if(!p8) return NULL; 165 X509_SIG_free(p8); 168 p8inf = PKCS8_decrypt(p8, psbu [all...] |
H A D | pem_pkey.c | 100 X509_SIG *p8; local 103 p8 = d2i_X509_SIG(NULL, &p, len); 104 if(!p8) goto p8err; 110 X509_SIG_free(p8); 113 p8inf = PKCS8_decrypt(p8, psbuf, klen); 114 X509_SIG_free(p8);
|
/external/openssl/apps/ |
H A D | pkcs8.c | 83 X509_SIG *p8 = NULL; local 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher, 321 PEM_write_bio_PKCS8(out, p8); 323 i2d_PKCS8_bio(out, p8); 350 p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL); 352 p8 = d2i_PKCS8_bio(in, NULL); 359 if (!p8) 372 p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass)); 428 X509_SIG_free(p8);
|
/external/ceres-solver/include/ceres/internal/ |
H A D | manual_constructor.h | 166 const T5& p5, const T6& p6, const T7& p7, const T8& p8) { 167 new(space()) Type(p1, p2, p3, p4, p5, p6, p7, p8); 173 const T5& p5, const T6& p6, const T7& p7, const T8& p8, 175 new(space()) Type(p1, p2, p3, p4, p5, p6, p7, p8, p9); 181 const T5& p5, const T6& p6, const T7& p7, const T8& p8, 183 new(space()) Type(p1, p2, p3, p4, p5, p6, p7, p8, p9, p10); 190 const T5& p5, const T6& p6, const T7& p7, const T8& p8, 192 new(space()) Type(p1, p2, p3, p4, p5, p6, p7, p8, p9, p10, p11); 165 Init(const T1& p1, const T2& p2, const T3& p3, const T4& p4, const T5& p5, const T6& p6, const T7& p7, const T8& p8) argument 172 Init(const T1& p1, const T2& p2, const T3& p3, const T4& p4, const T5& p5, const T6& p6, const T7& p7, const T8& p8, const T9& p9) argument 180 Init(const T1& p1, const T2& p2, const T3& p3, const T4& p4, const T5& p5, const T6& p6, const T7& p7, const T8& p8, const T9& p9, const T10& p10) argument 189 Init(const T1& p1, const T2& p2, const T3& p3, const T4& p4, const T5& p5, const T6& p6, const T7& p7, const T8& p8, const T9& p9, const T10& p10, const T11& p11) argument
|
/external/clang/test/CXX/lex/lex.charset/ |
H A D | p2-cxx11.cpp | 41 const char16_t *p8 = u"foo \U0000dfff bar"; // expected-error {{invalid universal character}} variable
|
/external/libffi/src/ia64/ |
H A D | unix.S | 181 cmp.lt p8, p0 = 24, in3 191 (p8) st8 [r18] = r11 208 cmp.lt p8, p0 = 12, in3 211 (p8) stfs [r16] = f11, 8 232 cmp.lt p8, p0 = 24, in3 235 (p8) stfd [r16] = f11, 16 256 cmp.lt p8, p0 = 48, in3 259 (p8) stfe [r16] = f11, 32 416 cmp.lt p8, p0 = 24, r8 422 (p8) ld [all...] |
/external/v8/test/mjsunit/compiler/ |
H A D | regress-loadfield.js | 58 a.p8 = "";
|
/external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.type/dcl.spec.auto/ |
H A D | p6.cpp | 75 auto S::*p8 = &S::m; member in class:S::S 82 only<int (S::*)> test8 = p8;
|
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 164 #define PKCS8_get_attr(p8, attr_nid) \ 165 PKCS12_get_attr_gen(p8->attributes, attr_nid) 177 PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8); 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 184 PKCS8_PRIV_KEY_INFO *p8); 188 PKCS8_PRIV_KEY_INFO *p8); 206 int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage);
|
/external/llvm/test/MC/ARM/ |
H A D | neont2-mul-encoding.s | 13 vmul.p8 d16, d16, d17 14 vmul.p8 q8, q8, q9 25 @ CHECK: vmul.p8 d16, d16, d17 @ encoding: [0x40,0xff,0xb1,0x09] 26 @ CHECK: vmul.p8 q8, q8, q9 @ encoding: [0x40,0xff,0xf2,0x09] 60 vmull.p8 q8, d16, d17 68 @ CHECK: vmull.p8 q8, d16, d17 @ encoding: [0xc0,0xef,0xa1,0x0e]
|
/external/icu4c/tools/toolutil/ |
H A D | writesrc.c | 105 const uint8_t *p8; local 111 p8=NULL; 116 p8=(const uint8_t *)p; 142 value=p8[i];
|