/kernel/linux/linux-6.6/certs/ |
H A D | Makefile | 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 50 -outform PEM -out $@ -keyout $@ $(keytype-y) 2>&1
|
/third_party/libabigail/tests/data/test-read-ctf/ |
H A D | test-forward-undefine-type-decl.c | 13 struct key_type *keytype; member
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 286 int keytype = nid == EVP_PKEY_SM2 ? EVP_PKEY_SM2 : EVP_PKEY_EC; in EVP_PKEY_CTX_set_ec_paramgen_curve_nid() local 288 return EVP_PKEY_CTX_ctrl(ctx, keytype, EVP_PKEY_OP_TYPE_GEN, in EVP_PKEY_CTX_set_ec_paramgen_curve_nid()
|
H A D | p_lib.c | 260 * We've determined that they both are the same keytype, so the next in evp_pkey_cmp_any() 490 const char *keytype, in EVP_PKEY_new_raw_private_key_ex() 494 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, priv, in EVP_PKEY_new_raw_private_key_ex() 506 const char *keytype, const char *propq, in EVP_PKEY_new_raw_public_key_ex() 509 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, pub, in EVP_PKEY_new_raw_public_key_ex() 2013 const char *keytype = NULL; in evp_pkey_copy_downgraded() local 2015 keytype = EVP_KEYMGMT_get0_name(keymgmt); in evp_pkey_copy_downgraded() 2026 keytype); in evp_pkey_copy_downgraded() 2032 keytype = OBJ_nid2sn(type); in evp_pkey_copy_downgraded() 2052 "key type = %s", keytype); in evp_pkey_copy_downgraded() 489 EVP_PKEY_new_raw_private_key_ex(OSSL_LIB_CTX *libctx, const char *keytype, const char *propq, const unsigned char *priv, size_t len) EVP_PKEY_new_raw_private_key_ex() argument 505 EVP_PKEY_new_raw_public_key_ex(OSSL_LIB_CTX *libctx, const char *keytype, const char *propq, const unsigned char *pub, size_t len) EVP_PKEY_new_raw_public_key_ex() argument [all...] |
H A D | ctrl_params_translate.c | 1994 OPENSSL_strcasecmp(ctx->pctx->keytype, value) != 0) { in fix_group_ecx() 2636 int keytype, int optype, in evp_pkey_ctx_ctrl_to_param() 2646 if (keytype == -1) in evp_pkey_ctx_ctrl_to_param() 2647 keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_to_param() 2649 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_to_param() 2711 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_str_to_param() local 2717 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_str_to_param() 2770 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_setget_params_to_ctrl() local 2781 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_setget_params_to_ctrl() 2798 ret = EVP_PKEY_CTX_ctrl(pctx, keytype, optyp in evp_pkey_ctx_setget_params_to_ctrl() 2635 evp_pkey_ctx_ctrl_to_param(EVP_PKEY_CTX *pctx, int keytype, int optype, int cmd, int p1, void *p2) evp_pkey_ctx_ctrl_to_param() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 286 int keytype = nid == EVP_PKEY_SM2 ? EVP_PKEY_SM2 : EVP_PKEY_EC; in EVP_PKEY_CTX_set_ec_paramgen_curve_nid() local 288 return EVP_PKEY_CTX_ctrl(ctx, keytype, EVP_PKEY_OP_TYPE_GEN, in EVP_PKEY_CTX_set_ec_paramgen_curve_nid()
|
H A D | ctrl_params_translate.c | 1985 OPENSSL_strcasecmp(ctx->pctx->keytype, value) != 0) { in fix_group_ecx() 2627 int keytype, int optype, in evp_pkey_ctx_ctrl_to_param() 2637 if (keytype == -1) in evp_pkey_ctx_ctrl_to_param() 2638 keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_to_param() 2640 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_to_param() 2702 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_str_to_param() local 2708 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_str_to_param() 2761 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_setget_params_to_ctrl() local 2772 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_setget_params_to_ctrl() 2789 ret = EVP_PKEY_CTX_ctrl(pctx, keytype, optyp in evp_pkey_ctx_setget_params_to_ctrl() 2626 evp_pkey_ctx_ctrl_to_param(EVP_PKEY_CTX *pctx, int keytype, int optype, int cmd, int p1, void *p2) evp_pkey_ctx_ctrl_to_param() argument [all...] |
H A D | p_lib.c | 260 * We've determined that they both are the same keytype, so the next in evp_pkey_cmp_any() 490 const char *keytype, in EVP_PKEY_new_raw_private_key_ex() 494 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, priv, in EVP_PKEY_new_raw_private_key_ex() 506 const char *keytype, const char *propq, in EVP_PKEY_new_raw_public_key_ex() 509 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, pub, in EVP_PKEY_new_raw_public_key_ex() 2010 const char *keytype = NULL; in evp_pkey_copy_downgraded() local 2012 keytype = EVP_KEYMGMT_get0_name(keymgmt); in evp_pkey_copy_downgraded() 2023 keytype); in evp_pkey_copy_downgraded() 2029 keytype = OBJ_nid2sn(type); in evp_pkey_copy_downgraded() 2049 "key type = %s", keytype); in evp_pkey_copy_downgraded() 489 EVP_PKEY_new_raw_private_key_ex(OSSL_LIB_CTX *libctx, const char *keytype, const char *propq, const unsigned char *priv, size_t len) EVP_PKEY_new_raw_private_key_ex() argument 505 EVP_PKEY_new_raw_public_key_ex(OSSL_LIB_CTX *libctx, const char *keytype, const char *propq, const unsigned char *pub, size_t len) EVP_PKEY_new_raw_public_key_ex() argument [all...] |
/kernel/linux/linux-5.10/sound/core/ |
H A D | jack.c | 318 * @keytype: Input layer key type to be reported 339 int keytype) in snd_jack_set_key() 345 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 349 jack->key[key] = keytype; in snd_jack_set_key() 338 snd_jack_set_key(struct snd_jack *jack, enum snd_jack_types type, int keytype) snd_jack_set_key() argument
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | req.c | 1509 const char *keytype = NULL; in set_keygen_ctx() local 1520 keytype = "RSA"; in set_keygen_ctx() 1524 keytype = "RSA"; in set_keygen_ctx() 1544 keytype = gstr; in set_keygen_ctx() 1588 if (keytype == NULL) { in set_keygen_ctx() 1589 keytype = EVP_PKEY_get0_type_name(param); in set_keygen_ctx() 1590 if (keytype == NULL) { in set_keygen_ctx() 1599 *pkeytype = OPENSSL_strndup(keytype, keytypelen); in set_keygen_ctx() 1601 *pkeytype = OPENSSL_strdup(keytype); in set_keygen_ctx()
|
H A D | pkcs12.c | 162 int export_pkcs12 = 0, options = 0, chain = 0, twopass = 0, keytype = 0; in pkcs12_main() local 201 keytype = KEY_EX; in pkcs12_main() 204 keytype = KEY_SIG; in pkcs12_main() 413 if (keytype == KEY_EX) in pkcs12_main() 415 if (keytype == KEY_SIG) in pkcs12_main() 668 key_pbe, cert_pbe, iter, -1, keytype, in pkcs12_main()
|
/third_party/openssl/apps/ |
H A D | req.c | 1507 const char *keytype = NULL; in set_keygen_ctx() local 1518 keytype = "RSA"; in set_keygen_ctx() 1522 keytype = "RSA"; in set_keygen_ctx() 1542 keytype = gstr; in set_keygen_ctx() 1586 if (keytype == NULL) { in set_keygen_ctx() 1587 keytype = EVP_PKEY_get0_type_name(param); in set_keygen_ctx() 1588 if (keytype == NULL) { in set_keygen_ctx() 1597 *pkeytype = OPENSSL_strndup(keytype, keytypelen); in set_keygen_ctx() 1599 *pkeytype = OPENSSL_strdup(keytype); in set_keygen_ctx()
|
H A D | pkcs12.c | 162 int export_pkcs12 = 0, options = 0, chain = 0, twopass = 0, keytype = 0; in pkcs12_main() local 201 keytype = KEY_EX; in pkcs12_main() 204 keytype = KEY_SIG; in pkcs12_main() 413 if (keytype == KEY_EX) in pkcs12_main() 415 if (keytype == KEY_SIG) in pkcs12_main() 668 key_pbe, cert_pbe, iter, -1, keytype, in pkcs12_main()
|
/kernel/linux/linux-5.10/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 375 uint32_t keytype; in virtio_crypto_rsa_set_key() local 383 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE; in virtio_crypto_rsa_set_key() 386 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC; in virtio_crypto_rsa_set_key() 417 para.keytype = cpu_to_le32(keytype); in virtio_crypto_rsa_set_key()
|
/kernel/linux/linux-6.6/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 379 uint32_t keytype; in virtio_crypto_rsa_set_key() local 387 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE; in virtio_crypto_rsa_set_key() 390 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC; in virtio_crypto_rsa_set_key() 421 para.keytype = cpu_to_le32(keytype); in virtio_crypto_rsa_set_key()
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 884 int keytype, int optype, in int_set_rsa_md_name() 898 switch (keytype) { in int_set_rsa_md_name() 905 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_set_rsa_md_name() 924 int keytype, int optype, in int_get_rsa_md_name() 938 switch (keytype) { in int_get_rsa_md_name() 945 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_get_rsa_md_name() 882 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument 922 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 880 int keytype, int optype, in int_set_rsa_md_name() 894 switch (keytype) { in int_set_rsa_md_name() 901 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_set_rsa_md_name() 920 int keytype, int optype, in int_get_rsa_md_name() 934 switch (keytype) { in int_get_rsa_md_name() 941 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_get_rsa_md_name() 878 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument 918 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument
|
/kernel/linux/linux-5.10/include/keys/ |
H A D | trusted-type.h | 30 uint16_t keytype; member
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | decoder.h | 36 EVP_PKEY **pkey, const char *keytype,
|
/third_party/openssl/include/crypto/ |
H A D | decoder.h | 36 EVP_PKEY **pkey, const char *keytype,
|
/kernel/linux/linux-6.6/include/keys/ |
H A D | trusted-type.h | 37 uint16_t keytype; member
|
H A D | trusted_tpm.h | 57 pr_info("sealing key type %d\n", o->keytype); in dump_options()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | pkcs12.rs | 48 keytype: c_int, in PKCS12_create()
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 457 static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, in tpm_seal() argument 482 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 674 ret = tpm_seal(&tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 776 opt->keytype = SEAL_keytype; in getoptions() 880 options->keytype = SRK_keytype; in trusted_options_alloc()
|
/kernel/linux/linux-6.6/sound/core/ |
H A D | jack.c | 605 * @keytype: Input layer key type to be reported 626 int keytype) in snd_jack_set_key() 632 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 636 jack->key[key] = keytype; in snd_jack_set_key() 625 snd_jack_set_key(struct snd_jack *jack, enum snd_jack_types type, int keytype) snd_jack_set_key() argument
|