Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 25 of 47) sorted by relevance

12

/external/bluetooth/glib/glib/
Dgdataset.c79 GQuark key_id,
201 GQuark key_id, in g_data_set_internal() argument
216 if (list->id == key_id) in g_data_set_internal()
261 if (list->id == key_id) in g_data_set_internal()
294 list->id = key_id; in g_data_set_internal()
305 GQuark key_id, in g_dataset_id_set_data_full() argument
314 if (!key_id) in g_dataset_id_set_data_full()
317 g_return_if_fail (key_id > 0); in g_dataset_id_set_data_full()
337 g_data_set_internal (&dataset->datalist, key_id, data, destroy_func, dataset); in g_dataset_id_set_data_full()
343 GQuark key_id, in g_datalist_id_set_data_full() argument
[all …]
Dgdataset.h40 typedef void (*GDataForeachFunc) (GQuark key_id,
49 GQuark key_id);
51 GQuark key_id,
55 GQuark key_id);
95 GQuark key_id);
97 GQuark key_id,
101 GQuark key_id);
/external/openssl/crypto/engine/
Deng_pkey.c96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() argument
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key()
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, in ENGINE_load_public_key() argument
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
Deng_openssl.c122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, in openssl_load_privkey() argument
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); in openssl_load_privkey()
377 in = BIO_new_file(key_id, "r"); in openssl_load_privkey()
Dengine.h569 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
571 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
/external/wpa_supplicant_8/wpa_supplicant/examples/
DopenCryptoki.conf34 key_id="4"
/external/wpa_supplicant_6/wpa_supplicant/examples/
DopenCryptoki.conf34 key_id="4"
/external/dbus/dbus/
Ddbus-keyring.h46 int key_id,
/external/tcpdump/
Dntp.h90 u_int32_t key_id; member
Dprint-rsvp.c291 u_int8_t key_id[6]; member
1540 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print()
1541 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2), in rsvp_obj_print()
/external/wpa_supplicant_8/src/eap_peer/
Deap_config.h464 char *key_id; member
Deap_tls_common.c68 params->key_id = config->key_id; in eap_tls_params_from_conf1()
89 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_config.h461 char *key_id; member
Deap_tls_common.c74 params->key_id = config->key_id; in eap_tls_params_from_conf1()
95 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
/external/qemu/distrib/sdl-1.2.12/src/video/directfb/
DSDL_DirectFB_events.c185 keysym->scancode = ev->key_id; in DirectFB_TranslateKey()
192 keysym->sym = keymap[ev->key_id - DIKI_UNKNOWN]; in DirectFB_TranslateKey()
/external/openssh/
Dssh-add.c247 private->cert->key_id); in add_file()
250 private->cert->key_id); in add_file()
Dkey.c67 cert->key_id = NULL; in cert_new()
188 if (cert->key_id != NULL) in cert_free()
189 xfree(cert->key_id); in cert_free()
1182 to->key_id = from->key_id == NULL ? NULL : xstrdup(from->key_id); in key_cert_copy()
1346 (key->cert->key_id = buffer_get_cstring_ret(b, &kidlen)) == NULL || in cert_parse()
1359 if (kidlen != strlen(key->cert->key_id)) { in cert_parse()
1930 buffer_put_cstring(&k->cert->certblob, k->cert->key_id); in key_certify()
Dauth2-pubkey.c351 "signed by %s CA %s via %s", key->cert->key_id, in user_key_allowed2()
423 key->cert->key_id, key_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
Dkey.h67 char *key_id; member
Dauth2-hostbased.c202 "%s CA %s from %s@%s", key->cert->key_id, in hostbased_key_allowed()
Dssh-keygen.0357 $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub
362 $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub
370 $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub
372 In all cases, key_id is a "key identifier" that is logged by the server
380 $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub
381 $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dtls.h107 const char *key_id; member
/external/wpa_supplicant_8/src/crypto/
Dtls.h142 const char *key_id; member
/external/openssl/include/openssl/
Dengine.h569 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
571 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf892 key_id="id_45"

12