Home
last modified time | relevance | path

Searched refs:rkey (Results 1 – 10 of 10) sorted by relevance

/external/openssh/
Dauth-rsa.c165 const BIGNUM *client_n, Key **rkey) in rsa_key_allowed_in_file() argument
257 if (allowed && rkey != NULL) in rsa_key_allowed_in_file()
258 *rkey = key; in rsa_key_allowed_in_file()
271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument
281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed()
Dmonitor_wrap.c1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in mm_auth_rsa_key_allowed() argument
1106 if (allowed && rkey != NULL) { in mm_auth_rsa_key_allowed()
1110 *rkey = key; in mm_auth_rsa_key_allowed()
/external/openssl/apps/
Docsp.c108 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
142 EVP_PKEY *key = NULL, *rkey = NULL; in MAIN() local
677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, in MAIN()
679 if (!rkey) in MAIN()
749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) in MAIN()
764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); in MAIN()
905 EVP_PKEY_free(rkey); in MAIN()
1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, in make_ocsp_response() argument
1145 OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags); in make_ocsp_response()
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_ralink.c1180 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ralink_remove_key() local
1186 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ralink_remove_key()
1188 rkey.Length = sizeof(rkey); in wpa_driver_ralink_remove_key()
1189 rkey.KeyIndex = key_idx; in wpa_driver_ralink_remove_key()
1192 rkey.KeyIndex |= 1 << 30; in wpa_driver_ralink_remove_key()
1194 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ralink_remove_key()
1196 res = ralink_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ralink_remove_key()
1197 sizeof(rkey)); in wpa_driver_ralink_remove_key()
Ddriver_ndis.c855 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local
859 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key()
861 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key()
862 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key()
864 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key()
865 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key()
867 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key()
868 sizeof(rkey)); in wpa_driver_ndis_remove_key()
/external/wpa_supplicant_8/src/drivers/
Ddriver_ndis.c926 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local
930 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key()
932 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key()
933 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key()
935 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key()
936 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key()
938 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key()
939 sizeof(rkey)); in wpa_driver_ndis_remove_key()
/external/icu4c/common/
Dserv.h820 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
Dserv.cpp872 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument
874 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dcrypto_internal.c662 struct crypto_rsa_key *rkey = (struct crypto_rsa_key *) key; in crypto_private_key_decrypt_pkcs1_v15() local
666 res = crypto_rsa_exptmod(in, inlen, out, outlen, rkey, 1); in crypto_private_key_decrypt_pkcs1_v15()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth.c304 u8 rkey[32]; in wpa_group_init_gmk_and_counter() local
317 if (random_get_bytes(rkey, sizeof(rkey)) < 0) in wpa_group_init_gmk_and_counter()
320 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf), in wpa_group_init_gmk_and_counter()