Searched refs:mkey (Results 1 - 11 of 11) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/rdma/
H A Dib_smi.h57 __be64 mkey; member in struct:ib_smp
87 __be64 mkey; member in struct:ib_port_info
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-compat-howl/
H A Dtext.c235 char *mkey = NULL, *mvalue = NULL; local
246 if (avahi_string_list_get_pair(self->index, &mkey, &mvalue, &msize) < 0)
249 strlcpy(key, mkey, SW_TEXT_RECORD_MAX_LEN);
254 avahi_free(mkey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/
H A Dtext.c235 char *mkey = NULL, *mvalue = NULL; local
246 if (avahi_string_list_get_pair(self->index, &mkey, &mvalue, &msize) < 0)
249 strlcpy(key, mkey, SW_TEXT_RECORD_MAX_LEN);
254 avahi_free(mkey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssl_ciph.c726 static void ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, argument
730 *mkey = 0;
737 *mkey |= SSL_kRSA;
744 *mkey |= SSL_kDHr | SSL_kDHd | SSL_kEDH;
748 *mkey |= SSL_kKRB5;
755 *mkey |= SSL_kECDHe | SSL_kECDHr;
759 *mkey |= SSL_kPSK;
763 *mkey |= SSL_kSRP;
779 *mkey |= SSL_kGOST;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssl_ciph.c726 static void ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, argument
730 *mkey = 0;
737 *mkey |= SSL_kRSA;
744 *mkey |= SSL_kDHr | SSL_kDHd | SSL_kEDH;
748 *mkey |= SSL_kKRB5;
755 *mkey |= SSL_kECDHe | SSL_kECDHr;
759 *mkey |= SSL_kPSK;
763 *mkey |= SSL_kSRP;
779 *mkey |= SSL_kGOST;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/ipath/
H A Dipath_mad.c252 /* Only return the mkey if the protection field allows it. */
253 if (smp->method == IB_MGMT_METHOD_SET || dev->mkey == smp->mkey ||
255 pip->mkey = dev->mkey;
435 dev->mkey = pip->mkey;
1393 /* Is the mkey in the process of expiring? */
1396 /* Clear timeout and mkey protection field. */
1405 if ((mad_flags & IB_MAD_IGNORE_MKEY) == 0 && dev->mkey !
[all...]
H A Dipath_verbs.h555 __be64 mkey; member in struct:ipath_ibdev
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/
H A Dppp_mppe.c301 char mkey[sizeof(state->master_key) * 2 + 1]; local
309 sprintf(mkey + i * 2, "%02x", state->master_key[i]);
314 debugstr, unit, mkey, skey);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/qib/
H A Dqib_mad.c86 /* o14-1: smp->mkey = 0; */
176 data.details.ntc_256.mkey = smp->mkey;
401 /* Is the mkey in the process of expiring? */
404 /* Clear timeout and mkey protection field. */
410 if ((mad_flags & IB_MAD_IGNORE_MKEY) == 0 && ibp->mkey != 0 &&
411 ibp->mkey != smp->mkey &&
466 /* Only return the mkey if the protection field allows it. */
467 if (smp->method == IB_MGMT_METHOD_SET || ibp->mkey
[all...]
H A Dqib_mad.h99 __be64 mkey; member in struct:ib_mad_notice_attr::__anon11684::__anon11689
H A Dqib_verbs.h643 __be64 mkey; member in struct:qib_ibport

Completed in 186 milliseconds