Home
last modified time | relevance | path

Searched refs:rkey (Results 1 – 9 of 9) sorted by relevance

/external/marisa-trie/tests/
Dunit-test.cc202 marisa::Key<marisa::RString> rkey; in TestKey() local
204 ASSERT(rkey.str().length() == 0); in TestKey()
205 ASSERT(rkey.weight() == 0.0); in TestKey()
206 ASSERT(rkey.id() == 0); in TestKey()
207 ASSERT(rkey.terminal() == 0); in TestKey()
209 rkey.set_str(marisa::RString(str)); in TestKey()
210 rkey.set_weight(4.0); in TestKey()
211 rkey.set_id(5); in TestKey()
212 rkey.set_terminal(6); in TestKey()
214 ASSERT(rkey.str() == marisa::RString(str)); in TestKey()
[all …]
/external/marisa-trie/v0_1_5/tests/
Dunit-test.cc205 marisa_alpha::Key<marisa_alpha::RString> rkey; in TestKey() local
207 ASSERT(rkey.str().length() == 0); in TestKey()
208 ASSERT(rkey.weight() == 0.0); in TestKey()
209 ASSERT(rkey.id() == 0); in TestKey()
210 ASSERT(rkey.terminal() == 0); in TestKey()
212 rkey.set_str(marisa_alpha::RString(str)); in TestKey()
213 rkey.set_weight(4.0); in TestKey()
214 rkey.set_id(5); in TestKey()
215 rkey.set_terminal(6); in TestKey()
217 ASSERT(rkey.str() == marisa_alpha::RString(str)); in TestKey()
[all …]
/external/openssh/
Dauth-rsa.c165 const BIGNUM *client_n, Key **rkey) in rsa_key_allowed_in_file() argument
257 if (allowed && rkey != NULL) in rsa_key_allowed_in_file()
258 *rkey = key; in rsa_key_allowed_in_file()
271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument
281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed()
Dmonitor_wrap.c1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in mm_auth_rsa_key_allowed() argument
1106 if (allowed && rkey != NULL) { in mm_auth_rsa_key_allowed()
1110 *rkey = key; in mm_auth_rsa_key_allowed()
/external/openssl/apps/
Docsp.c108 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
142 EVP_PKEY *key = NULL, *rkey = NULL; in MAIN() local
677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, in MAIN()
679 if (!rkey) in MAIN()
749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) in MAIN()
764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); in MAIN()
905 EVP_PKEY_free(rkey); in MAIN()
1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, in make_ocsp_response() argument
1145 OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags); in make_ocsp_response()
/external/wpa_supplicant_8/src/drivers/
Ddriver_ndis.c918 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local
922 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key()
924 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key()
925 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key()
927 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key()
928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key()
930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key()
931 sizeof(rkey)); in wpa_driver_ndis_remove_key()
/external/icu4c/common/
Dserv.h823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
Dserv.cpp877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument
879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth.c286 u8 rkey[32]; in wpa_group_init_gmk_and_counter() local
301 if (random_get_bytes(rkey, sizeof(rkey)) < 0) in wpa_group_init_gmk_and_counter()
304 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf), in wpa_group_init_gmk_and_counter()