/third_party/openssl/include/crypto/ |
H A D | evp.h | 41 /* If |pkey| below is set, this field is always a reference to its keymgmt */ 117 EVP_PKEY *pkey; member 142 int (*paramgen) (EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); 144 int (*keygen) (EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); 177 int (*check) (EVP_PKEY *pkey); 178 int (*public_check) (EVP_PKEY *pkey); 179 int (*param_check) (EVP_PKEY *pkey); 606 * (type != EVP_PKEY_NONE && pkey.ptr == NULL) ## legacy (libcrypto only) 611 * (type != EVP_PKEY_NONE && pkey.ptr != NULL) ## legacy (libcrypto only) 628 ((pk)->pkey 668 union legacy_pkey_st pkey; global() member [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkey_ctx.rs | 9 //! use openssl::pkey::PKey; 30 use openssl::pkey::Id; 46 //! use openssl::pkey::PKey; 71 use crate::pkey::{HasPrivate, HasPublic, Id, PKey, PKeyRef, Private}; 119 /// Creates a new pkey context using the provided key. 122 pub fn new(pkey: &PKeyRef<T>) -> Result<Self, ErrorStack> { in new() 124 let ptr = cvt_p(ffi::EVP_PKEY_CTX_new(pkey.as_ptr(), ptr::null_mut()))?; in new() 131 /// Creates a new pkey context for the specified algorithm ID. 728 use crate::pkey::PKey; 736 let pkey in rsa() [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
H A D | ssl_types.h | 132 EVP_PKEY *pkey; member 305 int (*pkey_new)(EVP_PKEY *pkey, EVP_PKEY *m_pkey, void *rngctx); 307 void (*pkey_free)(EVP_PKEY *pkey); 309 int (*pkey_load)(EVP_PKEY *pkey, const unsigned char *buf, int len);
|
/third_party/openssl/demos/signature/ |
H A D | EVP_Signature_demo.c | 47 EVP_PKEY *pkey = NULL; in get_key() local 61 dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, "DER", NULL, "EC", in get_key() 65 if (pkey == NULL) in get_key() 67 return pkey; in get_key()
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | ibpkey.h | 3 * pkey table 19 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid); 25 static inline int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid) in sel_ib_pkey_sid() argument
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | ibpkey.h | 3 * pkey table 22 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid); 28 static inline int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid) in sel_ib_pkey_sid() argument
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 110 if (ctx->pkey == NULL) { in ossl_cmp_calc_protection() 124 NULL, prot, &prot_part, NULL, ctx->pkey, md, in ossl_cmp_calc_protection() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 232 EVP_PKEY_get_id(ctx->pkey))) { in set_sig_algor() 284 } else if (ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_protect() 288 if (!X509_check_private_key(ctx->cert, ctx->pkey)) { in ossl_cmp_msg_protect()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 110 if (ctx->pkey == NULL) { in ossl_cmp_calc_protection() 124 NULL, prot, &prot_part, NULL, ctx->pkey, md, in ossl_cmp_calc_protection() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 232 EVP_PKEY_get_id(ctx->pkey))) { in set_sig_algor() 284 } else if (ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_protect() 288 if (!X509_check_private_key(ctx->cert, ctx->pkey)) { in ossl_cmp_msg_protect()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 30 static const SIGALG_LOOKUP *find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey); 871 static int tls1_check_pkey_comp(SSL *s, EVP_PKEY *pkey) in tls1_check_pkey_comp() argument 878 if (!EVP_PKEY_is_a(pkey, "EC")) in tls1_check_pkey_comp() 883 point_conv = EVP_PKEY_get_ec_point_conv_form(pkey); in tls1_check_pkey_comp() 895 int field_type = EVP_PKEY_get_field_type(pkey); in tls1_check_pkey_comp() 919 static uint16_t tls1_get_group_id(EVP_PKEY *pkey) in tls1_get_group_id() argument 921 int curve_nid = ssl_get_EC_curve_nid(pkey); in tls1_get_group_id() 935 EVP_PKEY *pkey; in tls1_check_cert_param() local 936 pkey = X509_get0_pubkey(x); in tls1_check_cert_param() 937 if (pkey in tls1_check_cert_param() 1266 rsa_pss_check_min_key_size(SSL_CTX *ctx, const EVP_PKEY *pkey, const SIGALG_LOOKUP *lu) rsa_pss_check_min_key_size() argument 1356 tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey) tls1_set_peer_legacy_sigalg() argument 1485 tls12_check_peer_sigalg(SSL *s, uint16_t sig, EVP_PKEY *pkey) tls12_check_peer_sigalg() argument 2982 EVP_PKEY *pkey = X509_get0_pubkey(x); ssl_security_cert_key() local 3088 check_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) check_cert_usable() argument 3162 is_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) is_cert_usable() argument 3182 find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey) find_sig_alg() argument 3295 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; tls_choose_sigalg() local 3503 ssl_get_EC_curve_nid(const EVP_PKEY *pkey) ssl_get_EC_curve_nid() argument 3513 tls13_set_encoded_pub_key(EVP_PKEY *pkey, const unsigned char *enckey, size_t enckeylen) tls13_set_encoded_pub_key() argument [all...] |
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 29 static const SIGALG_LOOKUP *find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey); 851 static int tls1_check_pkey_comp(SSL *s, EVP_PKEY *pkey) in tls1_check_pkey_comp() argument 858 if (!EVP_PKEY_is_a(pkey, "EC")) in tls1_check_pkey_comp() 863 point_conv = EVP_PKEY_get_ec_point_conv_form(pkey); in tls1_check_pkey_comp() 875 int field_type = EVP_PKEY_get_field_type(pkey); in tls1_check_pkey_comp() 899 static uint16_t tls1_get_group_id(EVP_PKEY *pkey) in tls1_get_group_id() argument 901 int curve_nid = ssl_get_EC_curve_nid(pkey); in tls1_get_group_id() 915 EVP_PKEY *pkey; in tls1_check_cert_param() local 916 pkey = X509_get0_pubkey(x); in tls1_check_cert_param() 917 if (pkey in tls1_check_cert_param() 1246 rsa_pss_check_min_key_size(SSL_CTX *ctx, const EVP_PKEY *pkey, const SIGALG_LOOKUP *lu) rsa_pss_check_min_key_size() argument 1336 tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey) tls1_set_peer_legacy_sigalg() argument 1465 tls12_check_peer_sigalg(SSL *s, uint16_t sig, EVP_PKEY *pkey) tls12_check_peer_sigalg() argument 2962 EVP_PKEY *pkey = X509_get0_pubkey(x); ssl_security_cert_key() local 3068 check_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) check_cert_usable() argument 3142 is_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) is_cert_usable() argument 3162 find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey) find_sig_alg() argument 3275 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; tls_choose_sigalg() local 3483 ssl_get_EC_curve_nid(const EVP_PKEY *pkey) ssl_get_EC_curve_nid() argument 3493 tls13_set_encoded_pub_key(EVP_PKEY *pkey, const unsigned char *enckey, size_t enckeylen) tls13_set_encoded_pub_key() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pvkfmt.c | 72 EVP_PKEY *pkey = NULL; in evp_pkey_new0_key() local 86 if ((pkey = EVP_PKEY_new()) != NULL) { in evp_pkey_new0_key() 89 if (EVP_PKEY_set1_RSA(pkey, key)) in evp_pkey_new0_key() 91 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 92 pkey = NULL; in evp_pkey_new0_key() 96 if (EVP_PKEY_set1_DSA(pkey, key)) in evp_pkey_new0_key() 98 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 99 pkey = NULL; in evp_pkey_new0_key() 116 if (pkey == NULL) in evp_pkey_new0_key() 118 return pkey; in evp_pkey_new0_key() 328 EVP_PKEY *pkey = NULL; ossl_b2i_bio() local [all...] |
/third_party/openssl/crypto/pem/ |
H A D | pvkfmt.c | 72 EVP_PKEY *pkey = NULL; in evp_pkey_new0_key() local 86 if ((pkey = EVP_PKEY_new()) != NULL) { in evp_pkey_new0_key() 89 if (EVP_PKEY_set1_RSA(pkey, key)) in evp_pkey_new0_key() 91 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 92 pkey = NULL; in evp_pkey_new0_key() 96 if (EVP_PKEY_set1_DSA(pkey, key)) in evp_pkey_new0_key() 98 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 99 pkey = NULL; in evp_pkey_new0_key() 116 if (pkey == NULL) in evp_pkey_new0_key() 118 return pkey; in evp_pkey_new0_key() 328 EVP_PKEY *pkey = NULL; ossl_b2i_bio() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 369 EVP_PKEY *pkey, const EVP_MD *digest, in create_popo_signature() 374 if (ps == NULL || cr == NULL || pkey == NULL) { in create_popo_signature() 384 if (EVP_PKEY_get_default_digest_name(pkey, name, sizeof(name)) > 0 in create_popo_signature() 390 NULL, pkey, digest, libctx, propq); in create_popo_signature() 395 EVP_PKEY *pkey, const EVP_MD *digest, in OSSL_CRMF_MSG_create_popo() 401 if (crm == NULL || (meth == OSSL_CRMF_POPO_SIGNATURE && pkey == NULL)) { in OSSL_CRMF_MSG_create_popo() 424 if (!create_popo_signature(ps, crm->certReq, pkey, digest, in OSSL_CRMF_MSG_create_popo() 602 * Decrypts the certificate in the given encryptedValue using private key pkey. 611 EVP_PKEY *pkey) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 627 || ecert->encValue == NULL || pkey in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 367 create_popo_signature(OSSL_CRMF_POPOSIGNINGKEY *ps, const OSSL_CRMF_CERTREQUEST *cr, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) create_popo_signature() argument 394 OSSL_CRMF_MSG_create_popo(int meth, OSSL_CRMF_MSG *crm, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) OSSL_CRMF_MSG_create_popo() argument 609 OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(const OSSL_CRMF_ENCRYPTEDVALUE *ecert, OSSL_LIB_CTX *libctx, const char *propq, EVP_PKEY *pkey) OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() argument [all...] |
/third_party/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 369 EVP_PKEY *pkey, const EVP_MD *digest, in create_popo_signature() 374 if (ps == NULL || cr == NULL || pkey == NULL) { in create_popo_signature() 384 if (EVP_PKEY_get_default_digest_name(pkey, name, sizeof(name)) > 0 in create_popo_signature() 390 NULL, pkey, digest, libctx, propq); in create_popo_signature() 395 EVP_PKEY *pkey, const EVP_MD *digest, in OSSL_CRMF_MSG_create_popo() 401 if (crm == NULL || (meth == OSSL_CRMF_POPO_SIGNATURE && pkey == NULL)) { in OSSL_CRMF_MSG_create_popo() 424 if (!create_popo_signature(ps, crm->certReq, pkey, digest, in OSSL_CRMF_MSG_create_popo() 602 * Decrypts the certificate in the given encryptedValue using private key pkey. 611 EVP_PKEY *pkey) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 627 || ecert->encValue == NULL || pkey in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 367 create_popo_signature(OSSL_CRMF_POPOSIGNINGKEY *ps, const OSSL_CRMF_CERTREQUEST *cr, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) create_popo_signature() argument 394 OSSL_CRMF_MSG_create_popo(int meth, OSSL_CRMF_MSG *crm, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) OSSL_CRMF_MSG_create_popo() argument 609 OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(const OSSL_CRMF_ENCRYPTEDVALUE *ecert, OSSL_LIB_CTX *libctx, const char *propq, EVP_PKEY *pkey) OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_openssl.c | 90 static EC_KEY * EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) in EVP_PKEY_get0_EC_KEY() argument 92 if (pkey->type != EVP_PKEY_EC) in EVP_PKEY_get0_EC_KEY() 94 return pkey->pkey.ec; in EVP_PKEY_get0_EC_KEY() 257 u8 pkey[8], next, tmp; in des_encrypt() local 267 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 270 pkey[i] = next | 1; in des_encrypt() 274 EVP_EncryptInit_ex(ctx, EVP_des_ecb(), NULL, pkey, NULL) == 1 && in des_encrypt() 2054 EVP_PKEY *pkey; member 2097 if (EVP_PKEY_keygen(kctx, &ecdh->pkey) ! in crypto_ecdh_init() 2315 EVP_PKEY *pkey = NULL; crypto_ec_key_parse_priv() local 2341 EVP_PKEY *pkey; crypto_ec_key_parse_pub() local 2364 EVP_PKEY *pkey = NULL; crypto_ec_key_set_pub() local 2445 EVP_PKEY *pkey = NULL; crypto_ec_key_set_pub_point() local 3088 EVP_PKEY *pkey = NULL; crypto_csr_verify() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 112 EVP_PKEY *pkey = NULL; in pkcs7_encode_rinfo() local 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 119 if (pkey == NULL) in pkcs7_encode_rinfo() 122 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_encode_rinfo() 156 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, in pkcs7_decrypt_rinfo() 165 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_decrypt_rinfo() 395 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) in PKCS7_dataDecode() argument 582 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, in PKCS7_dataDecode() 590 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0) in PKCS7_dataDecode() 818 if (si->pkey in PKCS7_dataFinal() 155 pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, size_t fixlen) pkcs7_decrypt_rinfo() argument 1025 EVP_PKEY *pkey; PKCS7_signatureVerify() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | req.c | 50 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, 239 EVP_PKEY *pkey = NULL, *CAkey = NULL; in req_main() local 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 631 if (pkey == NULL) in req_main() 635 if (newreq && pkey == NULL) { in req_main() 687 pkey = app_keygen(genctx, keyalgstr, newkey_len, verbose); in req_main() 688 if (pkey == NULL) in req_main() 700 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 726 if (!PEM_write_bio_PrivateKey(out, pkey, cipher, in req_main() 782 if (CAcert == NULL && pkey in req_main() 1068 make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, int multirdn, int attribs, unsigned long chtype) make_REQ() argument [all...] |
/third_party/openssl/apps/ |
H A D | req.c | 50 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, 239 EVP_PKEY *pkey = NULL, *CAkey = NULL; in req_main() local 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 631 if (pkey == NULL) in req_main() 635 if (newreq && pkey == NULL) { in req_main() 685 pkey = app_keygen(genctx, keyalgstr, newkey_len, verbose); in req_main() 686 if (pkey == NULL) in req_main() 698 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 724 if (!PEM_write_bio_PrivateKey(out, pkey, cipher, in req_main() 780 if (CAcert == NULL && pkey in req_main() 1066 make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, int multirdn, int attribs, unsigned long chtype) make_REQ() argument [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 112 EVP_PKEY *pkey = NULL; in pkcs7_encode_rinfo() local 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 119 if (pkey == NULL) in pkcs7_encode_rinfo() 122 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_encode_rinfo() 156 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, in pkcs7_decrypt_rinfo() 165 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_decrypt_rinfo() 395 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) in PKCS7_dataDecode() argument 582 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, in PKCS7_dataDecode() 590 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0) in PKCS7_dataDecode() 818 if (si->pkey in PKCS7_dataFinal() 155 pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, size_t fixlen) pkcs7_decrypt_rinfo() argument 1025 EVP_PKEY *pkey; PKCS7_signatureVerify() local [all...] |
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | Makefile | 16 # pkey kernel module 17 pkey-objs := pkey_api.o 18 obj-$(CONFIG_PKEY) += pkey.o
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509rset.c | 34 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) in X509_REQ_set_pubkey() argument 39 return X509_PUBKEY_set(&x->req_info.pubkey, pkey); in X509_REQ_set_pubkey()
|
/third_party/openssl/crypto/x509/ |
H A D | x509rset.c | 34 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) in X509_REQ_set_pubkey() argument 39 return X509_PUBKEY_set(&x->req_info.pubkey, pkey); in X509_REQ_set_pubkey()
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/hfi1/ |
H A D | hfi.h | 392 u16 pkey; member 1020 u16 pkey; member 1750 u16 pkey, u32 slid, u32 dlid, u8 sc5, 1753 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1756 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1760 int egress_pkey_check(struct hfi1_pportdata *ppd, u32 slid, u16 pkey, 1797 * ingress_pkey_matches_entry - return 1 if the pkey matches ent (ent 1802 static inline int ingress_pkey_matches_entry(u16 pkey, u16 ent) in ingress_pkey_matches_entry() argument 1804 u16 mkey = pkey & PKEY_LOW_15_MASK; in ingress_pkey_matches_entry() 1809 * If pkey[1 in ingress_pkey_matches_entry() 1825 ingress_pkey_table_search(struct hfi1_pportdata *ppd, u16 pkey) ingress_pkey_table_search() argument 1841 ingress_pkey_table_fail(struct hfi1_pportdata *ppd, u16 pkey, u32 slid) ingress_pkey_table_fail() argument 1862 ingress_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u8 idx, u32 slid, bool force) ingress_pkey_check() argument 1895 rcv_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u16 slid) rcv_pkey_check() argument 2670 hfi1_make_16b_hdr(struct hfi1_16b_header *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, bool becn, bool fecn, u8 l4, u8 sc) hfi1_make_16b_hdr() argument [all...] |
/kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/ |
H A D | hfi.h | 351 u16 pkey; member 969 u16 pkey; member 1698 u16 pkey, u32 slid, u32 dlid, u8 sc5, 1701 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1704 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1708 int egress_pkey_check(struct hfi1_pportdata *ppd, u32 slid, u16 pkey, 1745 * ingress_pkey_matches_entry - return 1 if the pkey matches ent (ent 1750 static inline int ingress_pkey_matches_entry(u16 pkey, u16 ent) in ingress_pkey_matches_entry() argument 1752 u16 mkey = pkey & PKEY_LOW_15_MASK; in ingress_pkey_matches_entry() 1757 * If pkey[1 in ingress_pkey_matches_entry() 1773 ingress_pkey_table_search(struct hfi1_pportdata *ppd, u16 pkey) ingress_pkey_table_search() argument 1789 ingress_pkey_table_fail(struct hfi1_pportdata *ppd, u16 pkey, u32 slid) ingress_pkey_table_fail() argument 1810 ingress_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u8 idx, u32 slid, bool force) ingress_pkey_check() argument 1843 rcv_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u16 slid) rcv_pkey_check() argument 2617 hfi1_make_16b_hdr(struct hfi1_16b_header *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, bool becn, bool fecn, u8 l4, u8 sc) hfi1_make_16b_hdr() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | ctrl_params_translate.c | 1514 EVP_PKEY *pkey = ctx->p2; in get_payload_group_name() local 1517 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_group_name() 1521 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_group_name() 1537 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey)); in get_payload_group_name() 1567 EVP_PKEY *pkey = ctx->p2; in get_payload_private_key() local 1573 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_private_key() 1577 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_private_key() 1586 const EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey); in get_payload_private_key() 1604 EVP_PKEY *pkey = ctx->p2; in get_payload_public_key() local 1609 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_public_key() 1681 EVP_PKEY *pkey = ctx->p2; get_dh_dsa_payload_p() local 1763 EVP_PKEY *pkey = ctx->p2; get_ec_decoded_from_explicit_params() local 2830 evp_pkey_setget_params_to_ctrl(const EVP_PKEY *pkey, enum action action_type, OSSL_PARAM *params) evp_pkey_setget_params_to_ctrl() argument 2872 evp_pkey_get_params_to_ctrl(const EVP_PKEY *pkey, OSSL_PARAM *params) evp_pkey_get_params_to_ctrl() argument [all...] |