/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | ocsp-responder.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -text
|
H A D | ocsp-responder-ica.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/cacert.pem -resp_no_certs -text
|
/external/fio/engines/ |
H A D | rdma.c | 18 * includes memory information, such as rkey, address. 60 uint32_t rkey; member in struct:remote_u 138 rd->rmt_us[i].rkey = ntohl(rd->recv_buf.rmt_us[i].rkey); 142 "fio: Received rkey %x addr %" PRIx64 143 " len %d from peer\n", rd->rmt_us[i].rkey, 611 r_io_u_d->sq_wr.wr.rdma.rkey = rd->rmt_us[index].rkey; 621 r_io_u_d->sq_wr.wr.rdma.rkey = rd->rmt_us[index].rkey; [all...] |
/external/openssl/apps/ |
H A D | ocsp.c | 108 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 143 EVP_PKEY *key = NULL, *rkey = NULL; local 553 else if (!strcmp(*args, "-rkey")) 623 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n"); 687 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, 689 if (!rkey) 759 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) 774 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 915 EVP_PKEY_free(rkey); 1064 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 1063 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument [all...] |
/external/kernel-headers/original/uapi/rdma/ |
H A D | ib_user_verbs.h | 276 __u32 rkey; member in struct:ib_uverbs_reg_mr_resp 292 __u32 rkey; member in struct:ib_uverbs_alloc_mw_resp 610 __u32 rkey; member in struct:ib_uverbs_send_wr::__anon23513::__anon23514 617 __u32 rkey; member in struct:ib_uverbs_send_wr::__anon23513::__anon23515
|
/external/chromium_org/third_party/icu/source/common/ |
H A D | serv.h | 819 * @param rkey the registry key. 823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
|
H A D | serv.cpp | 877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument 879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
|
/external/icu/icu4c/source/common/ |
H A D | serv.h | 819 * @param rkey the registry key. 823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
|
H A D | serv.cpp | 877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument 879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; local 922 os_memset(&rkey, 0, sizeof(rkey)); 924 rkey.Length = sizeof(rkey); 925 rkey.KeyIndex = key_idx; 927 rkey.KeyIndex |= 1 << 30; 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, 931 sizeof(rkey)); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 292 u8 rkey[32]; local 307 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 310 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 292 u8 rkey[32]; local 307 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 310 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 292 u8 rkey[32]; local 307 if (random_get_bytes(rkey, sizeof(rkey)) < 0) 310 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
|