/third_party/openssl/test/ |
H A D | igetest.c | 30 static unsigned char rkey[16]; variable 231 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec() 234 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec() 248 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining() 256 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining() 270 AES_set_encrypt_key(rkey, in test_ige_dec_chaining() [all...] |
/third_party/openssl/demos/cms/ |
H A D | cms_ddec.c | 22 EVP_PKEY *rkey = NULL; in main() local 39 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 41 if (!rcert || !rkey) in main() 68 if (!CMS_decrypt(cms, rkey, rcert, dcont, out, 0)) in main() 82 EVP_PKEY_free(rkey); in main()
|
H A D | cms_dec.c | 19 EVP_PKEY *rkey = NULL; in main() local 36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 38 if (!rcert || !rkey) in main() 59 if (!CMS_decrypt(cms, rkey, rcert, NULL, out, 0)) in main() 73 EVP_PKEY_free(rkey); in main()
|
/third_party/openssl/demos/smime/ |
H A D | smdec.c | 19 EVP_PKEY *rkey = NULL; in main() local 36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 38 if (!rcert || !rkey) in main() 59 if (!PKCS7_decrypt(p7, rkey, rcert, out, 0)) in main() 71 EVP_PKEY_free(rkey); in main()
|
/third_party/eudev/src/shared/ |
H A D | hashmap.h | 204 void *hashmap_get2(Hashmap *h, const void *key, void **rkey); 205 static inline void *ordered_hashmap_get2(OrderedHashmap *h, const void *key, void **rkey) { in ordered_hashmap_get2() argument 206 return hashmap_get2(PLAIN_HASHMAP(h), key, rkey); in ordered_hashmap_get2() 225 void *hashmap_remove2(Hashmap *h, const void *key, void **rkey); 226 static inline void *ordered_hashmap_remove2(OrderedHashmap *h, const void *key, void **rkey) { in ordered_hashmap_remove2() argument 227 return hashmap_remove2(PLAIN_HASHMAP(h), key, rkey); in ordered_hashmap_remove2()
|
H A D | hashmap.c | 1391 void *hashmap_remove2(Hashmap *h, const void *key, void **rkey) { in hashmap_remove2() argument 1397 if (rkey) in hashmap_remove2() 1398 *rkey = NULL; in hashmap_remove2() 1405 if (rkey) in hashmap_remove2() 1406 *rkey = NULL; in hashmap_remove2() 1412 if (rkey) in hashmap_remove2() 1413 *rkey = (void*) e->b.key; in hashmap_remove2()
|
/third_party/python/Lib/ |
H A D | hashlib.py | 240 rkey = from_bytes(prev) 243 # rkey = rkey ^ prev 244 rkey ^= from_bytes(prev) 246 dkey += rkey.to_bytes(inner.digest_size)
|
/third_party/python/Modules/ |
H A D | _abc.c | 851 PyObject *rkey = PyWeakref_GetObject(copy[i]); in subclasscheck_check_registry() local 852 if (rkey == NULL) { in subclasscheck_check_registry() 857 if (rkey == Py_None) { in subclasscheck_check_registry() 860 Py_INCREF(rkey); in subclasscheck_check_registry() 861 int r = PyObject_IsSubclass(subclass, rkey); in subclasscheck_check_registry() 862 Py_DECREF(rkey); in subclasscheck_check_registry()
|
/third_party/ffmpeg/libavutil/tests/ |
H A D | aes.c | 34 static const uint8_t rkey[2][16] = { in main() local 62 av_aes_init(b, rkey[i], 128, 1); in main()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ocsp.c | 71 EVP_PKEY *rkey, const EVP_MD *md, 151 {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"}, 221 EVP_PKEY *key = NULL, *rkey = NULL; in ocsp_main() local 607 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main() 609 if (rkey == NULL) in ocsp_main() 614 && (rkey == NULL || rsigner == NULL || rca_cert == NULL)) { in ocsp_main() 724 make_ocsp_response(bio_err, &resp, req, rdb, rca_cert, rsigner, rkey, in ocsp_main() 856 EVP_PKEY_free(rkey); in ocsp_main() 1030 EVP_PKEY *rkey, const EVP_MD *rmd, in make_ocsp_response() 1142 if ( mctx == NULL || !EVP_DigestSignInit(mctx, &pkctx, rmd, NULL, rkey)) { in make_ocsp_response() 1028 make_ocsp_response(BIO *err, OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, STACK_OF(X509) *ca, X509 *rcert, EVP_PKEY *rkey, const EVP_MD *rmd, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays, int badsig, const EVP_MD *resp_md) make_ocsp_response() argument [all...] |
/third_party/openssl/apps/ |
H A D | ocsp.c | 71 EVP_PKEY *rkey, const EVP_MD *md, 151 {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"}, 221 EVP_PKEY *key = NULL, *rkey = NULL; in ocsp_main() local 607 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main() 609 if (rkey == NULL) in ocsp_main() 614 && (rkey == NULL || rsigner == NULL || rca_cert == NULL)) { in ocsp_main() 724 make_ocsp_response(bio_err, &resp, req, rdb, rca_cert, rsigner, rkey, in ocsp_main() 856 EVP_PKEY_free(rkey); in ocsp_main() 1030 EVP_PKEY *rkey, const EVP_MD *rmd, in make_ocsp_response() 1142 if ( mctx == NULL || !EVP_DigestSignInit(mctx, &pkctx, rmd, NULL, rkey)) { in make_ocsp_response() 1028 make_ocsp_response(BIO *err, OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, STACK_OF(X509) *ca, X509 *rcert, EVP_PKEY *rkey, const EVP_MD *rmd, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays, int badsig, const EVP_MD *resp_md) make_ocsp_response() argument [all...] |
/third_party/node/lib/ |
H A D | url.js | 751 const rkey = rkeys[rk]; 752 if (rkey !== 'protocol') 753 result[rkey] = relative[rkey];
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_capi.c | 646 RSA *rkey = NULL; in capi_get_pkey() local 686 rkey = RSA_new_method(eng); in capi_get_pkey() 687 if (!rkey) in capi_get_pkey() 699 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey() 708 RSA_set_ex_data(rkey, rsa_capi_idx, key); in capi_get_pkey() 713 EVP_PKEY_assign_RSA(ret, rkey); in capi_get_pkey() 714 rkey = NULL; in capi_get_pkey() 782 RSA_free(rkey); in capi_get_pkey()
|
/third_party/openssl/engines/ |
H A D | e_capi.c | 646 RSA *rkey = NULL; in capi_get_pkey() local 686 rkey = RSA_new_method(eng); in capi_get_pkey() 687 if (!rkey) in capi_get_pkey() 699 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey() 708 RSA_set_ex_data(rkey, rsa_capi_idx, key); in capi_get_pkey() 713 EVP_PKEY_assign_RSA(ret, rkey); in capi_get_pkey() 714 rkey = NULL; in capi_get_pkey() 782 RSA_free(rkey); in capi_get_pkey()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_ndis.c | 906 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local 910 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key() 912 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key() 913 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key() 915 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key() 916 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key() 918 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key() 919 sizeof(rkey)); in wpa_driver_ndis_remove_key() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_ndis.c | 906 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local 910 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key() 912 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key() 913 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key() 915 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key() 916 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key() 918 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key() 919 sizeof(rkey)); in wpa_driver_ndis_remove_key() [all...] |
/third_party/python/Tools/i18n/ |
H A D | pygettext.py | 483 for rkey in rkeys: 484 rentries = reverse[rkey]
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_client.c | 561 EVP_PKEY *rkey = ossl_cmp_ctx_get0_newPubkey(ctx); in cert_response() local 623 if (rkey != NULL in cert_response() 624 /* X509_check_private_key() also works if rkey is just public key */ in cert_response() 625 && !(X509_check_private_key(ctx->newCert, rkey))) { in cert_response()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_client.c | 564 EVP_PKEY *rkey = ossl_cmp_ctx_get0_newPubkey(ctx); in cert_response() local 626 if (rkey != NULL in cert_response() 627 /* X509_check_private_key() also works if rkey is just public key */ in cert_response() 628 && !(X509_check_private_key(ctx->newCert, rkey))) { in cert_response()
|
/third_party/ffmpeg/libavutil/ |
H A D | opt.h | 517 * @param rkey parsed key; must be freed using av_free() 528 char **rkey, char **rval);
|
H A D | opt.c | 1623 static int get_key(const char **ropts, const char *delim, char **rkey) in get_key() argument 1636 if (!(*rkey = av_malloc(key_end - key_start + 1))) in get_key() 1638 memcpy(*rkey, key_start, key_end - key_start); in get_key() 1639 (*rkey)[key_end - key_start] = 0; in get_key() 1647 char **rkey, char **rval) in av_opt_get_key_value() 1661 *rkey = key; in av_opt_get_key_value() 1644 av_opt_get_key_value(const char **ropts, const char *key_val_sep, const char *pairs_sep, unsigned flags, char **rkey, char **rval) av_opt_get_key_value() argument
|
/third_party/icu/icu4c/source/common/ |
H A D | serv.cpp | 864 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument 866 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
|
H A D | serv.h | 821 * @param rkey the registry key. 825 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
|
/third_party/node/deps/icu-small/source/common/ |
H A D | serv.cpp | 864 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument 866 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
|
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | serv.cpp | 878 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument 880 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
|