/external/marisa-trie/tests/ |
D | unit-test.cc | 202 marisa::Key<marisa::RString> rkey; in TestKey() local 204 ASSERT(rkey.str().length() == 0); in TestKey() 205 ASSERT(rkey.weight() == 0.0); in TestKey() 206 ASSERT(rkey.id() == 0); in TestKey() 207 ASSERT(rkey.terminal() == 0); in TestKey() 209 rkey.set_str(marisa::RString(str)); in TestKey() 210 rkey.set_weight(4.0); in TestKey() 211 rkey.set_id(5); in TestKey() 212 rkey.set_terminal(6); in TestKey() 214 ASSERT(rkey.str() == marisa::RString(str)); in TestKey() [all …]
|
/external/marisa-trie/v0_1_5/tests/ |
D | unit-test.cc | 205 marisa_alpha::Key<marisa_alpha::RString> rkey; in TestKey() local 207 ASSERT(rkey.str().length() == 0); in TestKey() 208 ASSERT(rkey.weight() == 0.0); in TestKey() 209 ASSERT(rkey.id() == 0); in TestKey() 210 ASSERT(rkey.terminal() == 0); in TestKey() 212 rkey.set_str(marisa_alpha::RString(str)); in TestKey() 213 rkey.set_weight(4.0); in TestKey() 214 rkey.set_id(5); in TestKey() 215 rkey.set_terminal(6); in TestKey() 217 ASSERT(rkey.str() == marisa_alpha::RString(str)); in TestKey() [all …]
|
/external/openssh/ |
D | auth-rsa.c | 165 const BIGNUM *client_n, Key **rkey) in rsa_key_allowed_in_file() argument 257 if (allowed && rkey != NULL) in rsa_key_allowed_in_file() 258 *rkey = key; in rsa_key_allowed_in_file() 271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed()
|
D | monitor_wrap.c | 1083 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in mm_auth_rsa_key_allowed() argument 1106 if (allowed && rkey != NULL) { in mm_auth_rsa_key_allowed() 1110 *rkey = key; in mm_auth_rsa_key_allowed()
|
/external/openssl/apps/ |
D | ocsp.c | 108 X509 *ca, X509 *rcert, EVP_PKEY *rkey, 142 EVP_PKEY *key = NULL, *rkey = NULL; in MAIN() local 677 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, in MAIN() 679 if (!rkey) in MAIN() 749 if (ridx_filename && (!rkey || !rsigner || !rca_cert)) in MAIN() 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); in MAIN() 905 EVP_PKEY_free(rkey); in MAIN() 1054 X509 *ca, X509 *rcert, EVP_PKEY *rkey, in make_ocsp_response() argument 1145 OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags); in make_ocsp_response()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_ndis.c | 918 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local 922 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key() 924 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key() 925 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key() 927 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key() 928 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key() 930 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key() 931 sizeof(rkey)); in wpa_driver_ndis_remove_key()
|
/external/icu4c/common/ |
D | serv.h | 823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
|
D | serv.cpp | 877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument 879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 286 u8 rkey[32]; in wpa_group_init_gmk_and_counter() local 301 if (random_get_bytes(rkey, sizeof(rkey)) < 0) in wpa_group_init_gmk_and_counter() 304 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf), in wpa_group_init_gmk_and_counter()
|