Searched refs:rkey (Results 1 - 16 of 16) sorted by relevance

/external/marisa-trie/tests/
H A Dunit-test.cc202 marisa::Key<marisa::RString> rkey; local
204 ASSERT(rkey.str().length() == 0);
205 ASSERT(rkey.weight() == 0.0);
206 ASSERT(rkey.id() == 0);
207 ASSERT(rkey.terminal() == 0);
209 rkey.set_str(marisa::RString(str));
210 rkey.set_weight(4.0);
211 rkey.set_id(5);
212 rkey.set_terminal(6);
214 ASSERT(rkey
[all...]
/external/marisa-trie/v0_1_5/tests/
H A Dunit-test.cc205 marisa_alpha::Key<marisa_alpha::RString> rkey; local
207 ASSERT(rkey.str().length() == 0);
208 ASSERT(rkey.weight() == 0.0);
209 ASSERT(rkey.id() == 0);
210 ASSERT(rkey.terminal() == 0);
212 rkey.set_str(marisa_alpha::RString(str));
213 rkey.set_weight(4.0);
214 rkey.set_id(5);
215 rkey.set_terminal(6);
217 ASSERT(rkey
[all...]
/external/openssh/
H A Dauth-rsa.c165 const BIGNUM *client_n, Key **rkey)
257 if (allowed && rkey != NULL)
258 *rkey = key;
271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument
281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey);
164 rsa_key_allowed_in_file(struct passwd *pw, char *file, const BIGNUM *client_n, Key **rkey) argument
H A Dmonitor_wrap.c1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument
1106 if (allowed && rkey != NULL) {
1110 *rkey = key;
/external/chromium_org/third_party/openssl/openssl/apps/
H A Docsp.c108 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
142 EVP_PKEY *key = NULL, *rkey = NULL; local
543 else if (!strcmp(*args, "-rkey"))
613 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n");
677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL,
679 if (!rkey)
749 if (ridx_filename && (!rkey || !rsigner || !rca_cert))
764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
905 EVP_PKEY_free(rkey);
1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument
[all...]
/external/openssl/apps/
H A Docsp.c108 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
142 EVP_PKEY *key = NULL, *rkey = NULL; local
543 else if (!strcmp(*args, "-rkey"))
613 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n");
677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL,
679 if (!rkey)
749 if (ridx_filename && (!rkey || !rsigner || !rca_cert))
764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
905 EVP_PKEY_free(rkey);
1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument
[all...]
/external/chromium_org/third_party/icu/source/common/
H A Dserv.h821 * @param rkey the registry key.
825 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
H A Dserv.cpp877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument
879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
/external/icu4c/common/
H A Dserv.h819 * @param rkey the registry key.
823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
H A Dserv.cpp877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument
879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_ndis.c918 NDIS_802_11_REMOVE_KEY rkey; local
922 os_memset(&rkey, 0, sizeof(rkey));
924 rkey.Length = sizeof(rkey);
925 rkey.KeyIndex = key_idx;
927 rkey.KeyIndex |= 1 << 30;
928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN);
930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
931 sizeof(rkey));
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_ndis.c918 NDIS_802_11_REMOVE_KEY rkey; local
922 os_memset(&rkey, 0, sizeof(rkey));
924 rkey.Length = sizeof(rkey);
925 rkey.KeyIndex = key_idx;
927 rkey.KeyIndex |= 1 << 30;
928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN);
930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
931 sizeof(rkey));
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_ndis.c918 NDIS_802_11_REMOVE_KEY rkey; local
922 os_memset(&rkey, 0, sizeof(rkey));
924 rkey.Length = sizeof(rkey);
925 rkey.KeyIndex = key_idx;
927 rkey.KeyIndex |= 1 << 30;
928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN);
930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
931 sizeof(rkey));
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c289 u8 rkey[32]; local
304 if (random_get_bytes(rkey, sizeof(rkey)) < 0)
307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.c289 u8 rkey[32]; local
304 if (random_get_bytes(rkey, sizeof(rkey)) < 0)
307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth.c289 u8 rkey[32]; local
304 if (random_get_bytes(rkey, sizeof(rkey)) < 0)
307 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),

Completed in 505 milliseconds