Searched refs:key_id (Results 1 - 25 of 62) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/vendor_defns/
H A Dsureware.h93 * in param key_id :the name of the private protected key file without the extension
99 typedef int SureWareHook_Load_Privkey_t(char *const msg, const char *key_id,
110 * in param key_id :the name of the private protected key file without the extension
116 typedef int SureWareHook_Info_Pubkey_t(char *const msg, const char *key_id,
126 * in param key_id :the name of the public protected key file without the extension
133 const char *key_id,
145 * in param key_id :the name of the public protected key file without the extension
154 const char *key_id,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/vendor_defns/
H A Dsureware.h92 * in param key_id :the name of the private protected key file without the extension
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
107 * in param key_id :the name of the private protected key file without the extension
113 typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num,
123 * in param key_id :the name of the public protected key file without the extension
129 typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
139 * in param key_id :the name of the public protected key file without the extension
147 typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/vendor_defns/
H A Dsureware.h93 * in param key_id :the name of the private protected key file without the extension
99 typedef int SureWareHook_Load_Privkey_t(char *const msg, const char *key_id,
110 * in param key_id :the name of the private protected key file without the extension
116 typedef int SureWareHook_Info_Pubkey_t(char *const msg, const char *key_id,
126 * in param key_id :the name of the public protected key file without the extension
133 const char *key_id,
145 * in param key_id :the name of the public protected key file without the extension
154 const char *key_id,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/
H A Deng_pkey.c84 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
110 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
120 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
146 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id);
377 in = BIO_new_file(key_id, "r");
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/sctp/
H A Dauth.h71 __u16 key_id; member in struct:sctp_shared_key
90 struct sctp_shared_key *sctp_auth_shkey_create(__u16 key_id, gfp_t gfp);
95 __u16 key_id);
122 __u16 key_id);
125 __u16 key_id);
H A Dulpevent.h132 const struct sctp_association *asoc, __u16 key_id,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/engine/
H A Deng_pkey.c99 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
121 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
130 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
151 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c124 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
387 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
394 key_id);
395 in = BIO_new_file(key_id, "r");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/
H A Deng_pkey.c99 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
121 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
130 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
151 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c124 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
387 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
394 key_id);
395 in = BIO_new_file(key_id, "r");
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dauth.c101 struct sctp_shared_key *sctp_auth_shkey_create(__u16 key_id, gfp_t gfp) argument
111 new->key_id = key_id;
373 new = sctp_auth_shkey_create(sh_key->key_id, gfp);
404 /* If the key_id is non-zero and we couldn't find an
407 * For key_id 0, endpoint pair shared key is a NULL key.
423 /* Find the endpoint pair shared key based on the key_id */
426 __u16 key_id)
432 if (key->key_id == key_id)
424 sctp_auth_get_shkey( const struct sctp_association *asoc, __u16 key_id) argument
710 __u16 key_id, hmac_id; local
879 sctp_auth_set_active_key(struct sctp_endpoint *ep, struct sctp_association *asoc, __u16 key_id) argument
912 sctp_auth_del_key_id(struct sctp_endpoint *ep, struct sctp_association *asoc, __u16 key_id) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/
H A Ddbus-keyring.h46 int key_id,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/
H A Dntp.h90 u_int32_t key_id; member in struct:ntpdata
H A Dprint-ntp.c186 TCHECK(bp->key_id);
187 printf("\n\tKey id: %u", bp->key_id);
189 TCHECK(bp->key_id);
190 printf("\n\tKey id: %u", bp->key_id);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dssl_common.h152 int key_id; /* inherited from struct tls_session below */ member in struct:key_state
357 int key_id; /* increments with each soft reset (for key renegotiation) */ member in struct:tls_session
H A Dssl.c641 state_name (ks->state), ks->key_id,
710 ks->key_id = session->key_id;
713 * key_id increments to KEY_ID_MASK then recycles back to 1.
714 * This way you know that if key_id is 0, it is the first key.
716 ++session->key_id;
717 session->key_id &= P_KEY_ID_MASK;
718 if (!session->key_id)
719 session->key_id = 1;
735 ks->key_id
2747 int key_id; local
3202 int key_id; local
3446 int key_id; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/
H A De_sureware.c106 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
109 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
685 static EVP_PKEY *sureware_load_public(ENGINE *e, const char *key_id, argument
722 ret = p_surewarehk_Load_Rsa_Pubkey(msg, key_id, el,
769 ret = p_surewarehk_Load_Dsa_Pubkey(msg, key_id, el,
816 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument
831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype);
837 res = sureware_load_public(e, key_id, hptr, el, keytype);
842 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument
858 ret = p_surewarehk_Info_Pubkey(msg, key_id,
[all...]
H A De_4758cca.c396 static EVP_PKEY *ibm_4758_load_privkey(ENGINE *e, const char *key_id, argument
413 unsigned long keyLabelLength = strlen(key_id);
427 memcpy(keyLabel, key_id, keyLabelLength);
482 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE *e, const char *key_id, argument
497 unsigned long keyLabelLength = strlen(key_id);
511 memcpy(keyLabel, key_id, keyLabelLength);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/
H A De_sureware.c104 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
106 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument
685 ret=p_surewarehk_Load_Rsa_Pubkey(msg,key_id,el,
727 ret=p_surewarehk_Load_Dsa_Pubkey(msg,key_id,el,
774 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument
790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype);
797 res=sureware_load_public(e,key_id,hptr,el,keytype);
802 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument
819 ret=p_surewarehk_Info_Pubkey(msg,key_id,
[all...]
H A De_4758cca.c398 static EVP_PKEY *ibm_4758_load_privkey(ENGINE* e, const char* key_id, argument
414 unsigned long keyLabelLength = strlen(key_id);
429 memcpy(keyLabel, key_id, keyLabelLength);
492 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE* e, const char* key_id, argument
506 unsigned long keyLabelLength = strlen(key_id);
521 memcpy(keyLabel, key_id, keyLabelLength);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/
H A De_sureware.c106 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
109 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
685 static EVP_PKEY *sureware_load_public(ENGINE *e, const char *key_id, argument
722 ret = p_surewarehk_Load_Rsa_Pubkey(msg, key_id, el,
769 ret = p_surewarehk_Load_Dsa_Pubkey(msg, key_id, el,
816 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument
831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype);
837 res = sureware_load_public(e, key_id, hptr, el, keytype);
842 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument
858 ret = p_surewarehk_Info_Pubkey(msg, key_id,
[all...]
H A De_4758cca.c396 static EVP_PKEY *ibm_4758_load_privkey(ENGINE *e, const char *key_id, argument
413 unsigned long keyLabelLength = strlen(key_id);
427 memcpy(keyLabel, key_id, keyLabelLength);
482 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE *e, const char *key_id, argument
497 unsigned long keyLabelLength = strlen(key_id);
511 memcpy(keyLabel, key_id, keyLabelLength);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/ospfd/
H A Dospf_packet.h94 u_char key_id; /* Key ID. */ member in struct:ospf_header::__anon7639::__anon7640
H A Dospf_interface.h93 u_char key_id; member in struct:crypt_key
240 int ospf_crypt_key_delete (list, u_char key_id);

Completed in 198 milliseconds

123