/external/marisa-trie/tests/ |
H A D | unit-test.cc | 202 marisa::Key<marisa::RString> rkey; local 204 ASSERT(rkey.str().length() == 0); 205 ASSERT(rkey.weight() == 0.0); 206 ASSERT(rkey.id() == 0); 207 ASSERT(rkey.terminal() == 0); 209 rkey.set_str(marisa::RString(str)); 210 rkey.set_weight(4.0); 211 rkey.set_id(5); 212 rkey.set_terminal(6); 214 ASSERT(rkey [all...] |
/external/marisa-trie/v0_1_5/tests/ |
H A D | unit-test.cc | 205 marisa_alpha::Key<marisa_alpha::RString> rkey; local 207 ASSERT(rkey.str().length() == 0); 208 ASSERT(rkey.weight() == 0.0); 209 ASSERT(rkey.id() == 0); 210 ASSERT(rkey.terminal() == 0); 212 rkey.set_str(marisa_alpha::RString(str)); 213 rkey.set_weight(4.0); 214 rkey.set_id(5); 215 rkey.set_terminal(6); 217 ASSERT(rkey [all...] |
/external/openssh/ |
H A D | auth-rsa.c | 165 const BIGNUM *client_n, Key **rkey) 257 if (allowed && rkey != NULL) 258 *rkey = key; 271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); 164 rsa_key_allowed_in_file(struct passwd *pw, char *file, const BIGNUM *client_n, Key **rkey) argument
|
H A D | monitor_wrap.c | 1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument 1106 if (allowed && rkey != NULL) { 1110 *rkey = key;
|
/external/chromium_org/third_party/icu/source/common/ |
H A D | serv.cpp | 877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument 879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | ocsp.c | 108 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 142 EVP_PKEY *key = NULL, *rkey = NULL; local 543 else if (!strcmp(*args, "-rkey")) 613 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n"); 677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, 679 if (!rkey) 749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 905 EVP_PKEY_free(rkey); 1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument [all...] |
/external/icu4c/common/ |
H A D | serv.cpp | 877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument 879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
|
/external/openssl/apps/ |
H A D | ocsp.c | 108 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 142 EVP_PKEY *key = NULL, *rkey = NULL; local 543 else if (!strcmp(*args, "-rkey")) 613 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n"); 677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, 679 if (!rkey) 749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 905 EVP_PKEY_free(rkey); 1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 289 u8 rkey[32]; local 304 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 289 u8 rkey[32]; local 304 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 289 u8 rkey[32]; local 304 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |