Home
last modified time | relevance | path

Searched refs:rkey (Results 1 - 25 of 31) sorted by relevance

12

/third_party/openssl/test/
H A Digetest.c30 static unsigned char rkey[16]; variable
231 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec()
234 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec()
248 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining()
256 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining()
270 AES_set_encrypt_key(rkey, in test_ige_dec_chaining()
[all...]
/third_party/openssl/demos/cms/
H A Dcms_ddec.c22 EVP_PKEY *rkey = NULL; in main() local
39 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
41 if (!rcert || !rkey) in main()
68 if (!CMS_decrypt(cms, rkey, rcert, dcont, out, 0)) in main()
82 EVP_PKEY_free(rkey); in main()
H A Dcms_dec.c19 EVP_PKEY *rkey = NULL; in main() local
36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
38 if (!rcert || !rkey) in main()
59 if (!CMS_decrypt(cms, rkey, rcert, NULL, out, 0)) in main()
73 EVP_PKEY_free(rkey); in main()
/third_party/openssl/demos/smime/
H A Dsmdec.c19 EVP_PKEY *rkey = NULL; in main() local
36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
38 if (!rcert || !rkey) in main()
59 if (!PKCS7_decrypt(p7, rkey, rcert, out, 0)) in main()
71 EVP_PKEY_free(rkey); in main()
/third_party/eudev/src/shared/
H A Dhashmap.h204 void *hashmap_get2(Hashmap *h, const void *key, void **rkey);
205 static inline void *ordered_hashmap_get2(OrderedHashmap *h, const void *key, void **rkey) { in ordered_hashmap_get2() argument
206 return hashmap_get2(PLAIN_HASHMAP(h), key, rkey); in ordered_hashmap_get2()
225 void *hashmap_remove2(Hashmap *h, const void *key, void **rkey);
226 static inline void *ordered_hashmap_remove2(OrderedHashmap *h, const void *key, void **rkey) { in ordered_hashmap_remove2() argument
227 return hashmap_remove2(PLAIN_HASHMAP(h), key, rkey); in ordered_hashmap_remove2()
H A Dhashmap.c1391 void *hashmap_remove2(Hashmap *h, const void *key, void **rkey) { in hashmap_remove2() argument
1397 if (rkey) in hashmap_remove2()
1398 *rkey = NULL; in hashmap_remove2()
1405 if (rkey) in hashmap_remove2()
1406 *rkey = NULL; in hashmap_remove2()
1412 if (rkey) in hashmap_remove2()
1413 *rkey = (void*) e->b.key; in hashmap_remove2()
/third_party/python/Lib/
H A Dhashlib.py240 rkey = from_bytes(prev)
243 # rkey = rkey ^ prev
244 rkey ^= from_bytes(prev)
246 dkey += rkey.to_bytes(inner.digest_size)
/third_party/python/Modules/
H A D_abc.c851 PyObject *rkey = PyWeakref_GetObject(copy[i]); in subclasscheck_check_registry() local
852 if (rkey == NULL) { in subclasscheck_check_registry()
857 if (rkey == Py_None) { in subclasscheck_check_registry()
860 Py_INCREF(rkey); in subclasscheck_check_registry()
861 int r = PyObject_IsSubclass(subclass, rkey); in subclasscheck_check_registry()
862 Py_DECREF(rkey); in subclasscheck_check_registry()
/third_party/ffmpeg/libavutil/tests/
H A Daes.c34 static const uint8_t rkey[2][16] = { in main() local
62 av_aes_init(b, rkey[i], 128, 1); in main()
/third_party/node/deps/openssl/openssl/apps/
H A Docsp.c71 EVP_PKEY *rkey, const EVP_MD *md,
151 {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"},
221 EVP_PKEY *key = NULL, *rkey = NULL; in ocsp_main() local
607 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main()
609 if (rkey == NULL) in ocsp_main()
614 && (rkey == NULL || rsigner == NULL || rca_cert == NULL)) { in ocsp_main()
724 make_ocsp_response(bio_err, &resp, req, rdb, rca_cert, rsigner, rkey, in ocsp_main()
856 EVP_PKEY_free(rkey); in ocsp_main()
1030 EVP_PKEY *rkey, const EVP_MD *rmd, in make_ocsp_response()
1142 if ( mctx == NULL || !EVP_DigestSignInit(mctx, &pkctx, rmd, NULL, rkey)) { in make_ocsp_response()
1028 make_ocsp_response(BIO *err, OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, STACK_OF(X509) *ca, X509 *rcert, EVP_PKEY *rkey, const EVP_MD *rmd, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays, int badsig, const EVP_MD *resp_md) make_ocsp_response() argument
[all...]
/third_party/openssl/apps/
H A Docsp.c71 EVP_PKEY *rkey, const EVP_MD *md,
151 {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"},
221 EVP_PKEY *key = NULL, *rkey = NULL; in ocsp_main() local
607 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main()
609 if (rkey == NULL) in ocsp_main()
614 && (rkey == NULL || rsigner == NULL || rca_cert == NULL)) { in ocsp_main()
724 make_ocsp_response(bio_err, &resp, req, rdb, rca_cert, rsigner, rkey, in ocsp_main()
856 EVP_PKEY_free(rkey); in ocsp_main()
1030 EVP_PKEY *rkey, const EVP_MD *rmd, in make_ocsp_response()
1142 if ( mctx == NULL || !EVP_DigestSignInit(mctx, &pkctx, rmd, NULL, rkey)) { in make_ocsp_response()
1028 make_ocsp_response(BIO *err, OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, STACK_OF(X509) *ca, X509 *rcert, EVP_PKEY *rkey, const EVP_MD *rmd, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays, int badsig, const EVP_MD *resp_md) make_ocsp_response() argument
[all...]
/third_party/node/lib/
H A Durl.js751 const rkey = rkeys[rk];
752 if (rkey !== 'protocol')
753 result[rkey] = relative[rkey];
/third_party/node/deps/openssl/openssl/engines/
H A De_capi.c646 RSA *rkey = NULL; in capi_get_pkey() local
686 rkey = RSA_new_method(eng); in capi_get_pkey()
687 if (!rkey) in capi_get_pkey()
699 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey()
708 RSA_set_ex_data(rkey, rsa_capi_idx, key); in capi_get_pkey()
713 EVP_PKEY_assign_RSA(ret, rkey); in capi_get_pkey()
714 rkey = NULL; in capi_get_pkey()
782 RSA_free(rkey); in capi_get_pkey()
/third_party/openssl/engines/
H A De_capi.c646 RSA *rkey = NULL; in capi_get_pkey() local
686 rkey = RSA_new_method(eng); in capi_get_pkey()
687 if (!rkey) in capi_get_pkey()
699 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey()
708 RSA_set_ex_data(rkey, rsa_capi_idx, key); in capi_get_pkey()
713 EVP_PKEY_assign_RSA(ret, rkey); in capi_get_pkey()
714 rkey = NULL; in capi_get_pkey()
782 RSA_free(rkey); in capi_get_pkey()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_ndis.c906 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local
910 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key()
912 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key()
913 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key()
915 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key()
916 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key()
918 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key()
919 sizeof(rkey)); in wpa_driver_ndis_remove_key()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_ndis.c906 NDIS_802_11_REMOVE_KEY rkey; in wpa_driver_ndis_remove_key() local
910 os_memset(&rkey, 0, sizeof(rkey)); in wpa_driver_ndis_remove_key()
912 rkey.Length = sizeof(rkey); in wpa_driver_ndis_remove_key()
913 rkey.KeyIndex = key_idx; in wpa_driver_ndis_remove_key()
915 rkey.KeyIndex |= 1 << 30; in wpa_driver_ndis_remove_key()
916 os_memcpy(rkey.BSSID, bssid, ETH_ALEN); in wpa_driver_ndis_remove_key()
918 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey, in wpa_driver_ndis_remove_key()
919 sizeof(rkey)); in wpa_driver_ndis_remove_key()
[all...]
/third_party/python/Tools/i18n/
H A Dpygettext.py483 for rkey in rkeys:
484 rentries = reverse[rkey]
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_client.c561 EVP_PKEY *rkey = ossl_cmp_ctx_get0_newPubkey(ctx); in cert_response() local
623 if (rkey != NULL in cert_response()
624 /* X509_check_private_key() also works if rkey is just public key */ in cert_response()
625 && !(X509_check_private_key(ctx->newCert, rkey))) { in cert_response()
/third_party/openssl/crypto/cmp/
H A Dcmp_client.c564 EVP_PKEY *rkey = ossl_cmp_ctx_get0_newPubkey(ctx); in cert_response() local
626 if (rkey != NULL in cert_response()
627 /* X509_check_private_key() also works if rkey is just public key */ in cert_response()
628 && !(X509_check_private_key(ctx->newCert, rkey))) { in cert_response()
/third_party/ffmpeg/libavutil/
H A Dopt.h517 * @param rkey parsed key; must be freed using av_free()
528 char **rkey, char **rval);
H A Dopt.c1623 static int get_key(const char **ropts, const char *delim, char **rkey) in get_key() argument
1636 if (!(*rkey = av_malloc(key_end - key_start + 1))) in get_key()
1638 memcpy(*rkey, key_start, key_end - key_start); in get_key()
1639 (*rkey)[key_end - key_start] = 0; in get_key()
1647 char **rkey, char **rval) in av_opt_get_key_value()
1661 *rkey = key; in av_opt_get_key_value()
1644 av_opt_get_key_value(const char **ropts, const char *key_val_sep, const char *pairs_sep, unsigned flags, char **rkey, char **rval) av_opt_get_key_value() argument
/third_party/icu/icu4c/source/common/
H A Dserv.cpp864 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument
866 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
H A Dserv.h821 * @param rkey the registry key.
825 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
/third_party/node/deps/icu-small/source/common/
H A Dserv.cpp864 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument
866 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()
/third_party/skia/third_party/externals/icu/source/common/
H A Dserv.cpp878 ICUService::unregister(URegistryKey rkey, UErrorCode& status) in unregister() argument
880 ICUServiceFactory *factory = (ICUServiceFactory*)rkey; in unregister()

Completed in 35 milliseconds

12