/external/openssh/ |
D | auth-rsa.c | 165 const BIGNUM *client_n, Key **rkey) in rsa_key_allowed_in_file() argument 257 if (allowed && rkey != NULL) in rsa_key_allowed_in_file() 258 *rkey = key; in rsa_key_allowed_in_file() 271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed()
|
D | monitor_wrap.c | 1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in mm_auth_rsa_key_allowed() argument 1106 if (allowed && rkey != NULL) { in mm_auth_rsa_key_allowed() 1110 *rkey = key; in mm_auth_rsa_key_allowed()
|
/external/openssl/apps/ |
D | ocsp.c | 108 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 142 EVP_PKEY *key = NULL, *rkey = NULL; in MAIN() local 677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, in MAIN() 679 if (!rkey) in MAIN() 749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) in MAIN() 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); in MAIN() 905 EVP_PKEY_free(rkey); in MAIN() 1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, in make_ocsp_response() argument 1145 OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags); in make_ocsp_response()
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
D | driver_ralink.c | 1180 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ralink_remove_key() local 1186 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ralink_remove_key() 1188 rkey.Length = sizeof(rkey); in wpa_driver_ralink_remove_key() 1189 rkey.KeyIndex = key_idx; in wpa_driver_ralink_remove_key() 1192 rkey.KeyIndex |= 1 << 30; in wpa_driver_ralink_remove_key() 1194 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ralink_remove_key() 1196 res = ralink_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ralink_remove_key() 1197 sizeof(rkey)); in wpa_driver_ralink_remove_key()
|
D | driver_ndis.c | 855 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local 859 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key() 861 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key() 862 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key() 864 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key() 865 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key() 867 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key() 868 sizeof(rkey)); in wpa_driver_ndis_remove_key()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_ndis.c | 926 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local 930 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key() 932 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key() 933 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key() 935 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key() 936 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key() 938 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key() 939 sizeof(rkey)); in wpa_driver_ndis_remove_key()
|
/external/icu4c/common/ |
D | serv.h | 820 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
|
D | serv.cpp | 872 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument 874 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_internal.c | 662 struct crypto_rsa_key *rkey = (struct crypto_rsa_key *) key; in crypto_private_key_decrypt_pkcs1_v15() local 666 res = crypto_rsa_exptmod(in, inlen, out, outlen, rkey, 1); in crypto_private_key_decrypt_pkcs1_v15()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 304 u8 rkey[32]; in wpa_group_init_gmk_and_counter() local 317 if (random_get_bytes(rkey, sizeof(rkey)) < 0) in wpa_group_init_gmk_and_counter() 320 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf), in wpa_group_init_gmk_and_counter()
|