/external/bluetooth/glib/glib/ |
D | gdataset.c | 79 GQuark key_id, 201 GQuark key_id, in g_data_set_internal() argument 216 if (list->id == key_id) in g_data_set_internal() 261 if (list->id == key_id) in g_data_set_internal() 294 list->id = key_id; in g_data_set_internal() 305 GQuark key_id, in g_dataset_id_set_data_full() argument 314 if (!key_id) in g_dataset_id_set_data_full() 317 g_return_if_fail (key_id > 0); in g_dataset_id_set_data_full() 337 g_data_set_internal (&dataset->datalist, key_id, data, destroy_func, dataset); in g_dataset_id_set_data_full() 343 GQuark key_id, in g_datalist_id_set_data_full() argument [all …]
|
D | gdataset.h | 40 typedef void (*GDataForeachFunc) (GQuark key_id, 49 GQuark key_id); 51 GQuark key_id, 55 GQuark key_id); 95 GQuark key_id); 97 GQuark key_id, 101 GQuark key_id);
|
/external/openssl/crypto/engine/ |
D | eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() argument 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, in ENGINE_load_public_key() argument 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
|
D | eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, in openssl_load_privkey() argument 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); in openssl_load_privkey() 377 in = BIO_new_file(key_id, "r"); in openssl_load_privkey()
|
D | engine.h | 569 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 571 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | openCryptoki.conf | 34 key_id="4"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
D | openCryptoki.conf | 34 key_id="4"
|
/external/dbus/dbus/ |
D | dbus-keyring.h | 46 int key_id,
|
/external/tcpdump/ |
D | ntp.h | 90 u_int32_t key_id; member
|
D | print-rsvp.c | 291 u_int8_t key_id[6]; member 1540 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print() 1541 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2), in rsvp_obj_print()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_config.h | 464 char *key_id; member
|
D | eap_tls_common.c | 68 params->key_id = config->key_id; in eap_tls_params_from_conf1() 89 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_config.h | 461 char *key_id; member
|
D | eap_tls_common.c | 74 params->key_id = config->key_id; in eap_tls_params_from_conf1() 95 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
|
/external/qemu/distrib/sdl-1.2.12/src/video/directfb/ |
D | SDL_DirectFB_events.c | 185 keysym->scancode = ev->key_id; in DirectFB_TranslateKey() 192 keysym->sym = keymap[ev->key_id - DIKI_UNKNOWN]; in DirectFB_TranslateKey()
|
/external/openssh/ |
D | ssh-add.c | 247 private->cert->key_id); in add_file() 250 private->cert->key_id); in add_file()
|
D | key.c | 67 cert->key_id = NULL; in cert_new() 188 if (cert->key_id != NULL) in cert_free() 189 xfree(cert->key_id); in cert_free() 1182 to->key_id = from->key_id == NULL ? NULL : xstrdup(from->key_id); in key_cert_copy() 1346 (key->cert->key_id = buffer_get_cstring_ret(b, &kidlen)) == NULL || in cert_parse() 1359 if (kidlen != strlen(key->cert->key_id)) { in cert_parse() 1930 buffer_put_cstring(&k->cert->certblob, k->cert->key_id); in key_certify()
|
D | auth2-pubkey.c | 351 "signed by %s CA %s via %s", key->cert->key_id, in user_key_allowed2() 423 key->cert->key_id, key_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
|
D | key.h | 67 char *key_id; member
|
D | auth2-hostbased.c | 202 "%s CA %s from %s@%s", key->cert->key_id, in hostbased_key_allowed()
|
D | ssh-keygen.0 | 357 $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub 362 $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub 370 $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub 372 In all cases, key_id is a "key identifier" that is logged by the server 380 $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub 381 $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | tls.h | 107 const char *key_id; member
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls.h | 142 const char *key_id; member
|
/external/openssl/include/openssl/ |
D | engine.h | 569 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 571 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 892 key_id="id_45"
|