Searched refs:mkey (Results 1 - 11 of 11) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/rdma/ |
H A D | ib_smi.h | 57 __be64 mkey; member in struct:ib_smp 87 __be64 mkey; member in struct:ib_port_info
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-compat-howl/ |
H A D | text.c | 235 char *mkey = NULL, *mvalue = NULL; local 246 if (avahi_string_list_get_pair(self->index, &mkey, &mvalue, &msize) < 0) 249 strlcpy(key, mkey, SW_TEXT_RECORD_MAX_LEN); 254 avahi_free(mkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/ |
H A D | text.c | 235 char *mkey = NULL, *mvalue = NULL; local 246 if (avahi_string_list_get_pair(self->index, &mkey, &mvalue, &msize) < 0) 249 strlcpy(key, mkey, SW_TEXT_RECORD_MAX_LEN); 254 avahi_free(mkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_ciph.c | 726 static void ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, argument 730 *mkey = 0; 737 *mkey |= SSL_kRSA; 744 *mkey |= SSL_kDHr | SSL_kDHd | SSL_kEDH; 748 *mkey |= SSL_kKRB5; 755 *mkey |= SSL_kECDHe | SSL_kECDHr; 759 *mkey |= SSL_kPSK; 763 *mkey |= SSL_kSRP; 779 *mkey |= SSL_kGOST;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_ciph.c | 726 static void ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, argument 730 *mkey = 0; 737 *mkey |= SSL_kRSA; 744 *mkey |= SSL_kDHr | SSL_kDHd | SSL_kEDH; 748 *mkey |= SSL_kKRB5; 755 *mkey |= SSL_kECDHe | SSL_kECDHr; 759 *mkey |= SSL_kPSK; 763 *mkey |= SSL_kSRP; 779 *mkey |= SSL_kGOST;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/ipath/ |
H A D | ipath_mad.c | 252 /* Only return the mkey if the protection field allows it. */ 253 if (smp->method == IB_MGMT_METHOD_SET || dev->mkey == smp->mkey || 255 pip->mkey = dev->mkey; 435 dev->mkey = pip->mkey; 1393 /* Is the mkey in the process of expiring? */ 1396 /* Clear timeout and mkey protection field. */ 1405 if ((mad_flags & IB_MAD_IGNORE_MKEY) == 0 && dev->mkey ! [all...] |
H A D | ipath_verbs.h | 555 __be64 mkey; member in struct:ipath_ibdev
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/ |
H A D | ppp_mppe.c | 301 char mkey[sizeof(state->master_key) * 2 + 1]; local 309 sprintf(mkey + i * 2, "%02x", state->master_key[i]); 314 debugstr, unit, mkey, skey);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/qib/ |
H A D | qib_mad.c | 86 /* o14-1: smp->mkey = 0; */ 176 data.details.ntc_256.mkey = smp->mkey; 401 /* Is the mkey in the process of expiring? */ 404 /* Clear timeout and mkey protection field. */ 410 if ((mad_flags & IB_MAD_IGNORE_MKEY) == 0 && ibp->mkey != 0 && 411 ibp->mkey != smp->mkey && 466 /* Only return the mkey if the protection field allows it. */ 467 if (smp->method == IB_MGMT_METHOD_SET || ibp->mkey [all...] |
H A D | qib_mad.h | 99 __be64 mkey; member in struct:ib_mad_notice_attr::__anon11684::__anon11689
|
H A D | qib_verbs.h | 643 __be64 mkey; member in struct:qib_ibport
|
Completed in 186 milliseconds