/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509rset.c | 34 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) in X509_REQ_set_pubkey() argument 39 return X509_PUBKEY_set(&x->req_info.pubkey, pkey); in X509_REQ_set_pubkey()
|
H A D | t_req.c | 42 EVP_PKEY *pkey; in X509_REQ_print_ex() local 94 pkey = X509_REQ_get0_pubkey(x); in X509_REQ_print_ex() 95 if (pkey == NULL) { in X509_REQ_print_ex() 100 if (EVP_PKEY_print_public(bp, pkey, 16, NULL) <= 0) in X509_REQ_print_ex()
|
/third_party/openssl/crypto/x509/ |
H A D | x509rset.c | 34 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) in X509_REQ_set_pubkey() argument 39 return X509_PUBKEY_set(&x->req_info.pubkey, pkey); in X509_REQ_set_pubkey()
|
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 369 EVP_PKEY *pkey, const EVP_MD *digest, in create_popo_signature() 374 if (ps == NULL || cr == NULL || pkey == NULL) { in create_popo_signature() 384 if (EVP_PKEY_get_default_digest_name(pkey, name, sizeof(name)) > 0 in create_popo_signature() 390 NULL, pkey, digest, libctx, propq); in create_popo_signature() 395 EVP_PKEY *pkey, const EVP_MD *digest, in OSSL_CRMF_MSG_create_popo() 401 if (crm == NULL || (meth == OSSL_CRMF_POPO_SIGNATURE && pkey == NULL)) { in OSSL_CRMF_MSG_create_popo() 424 if (!create_popo_signature(ps, crm->certReq, pkey, digest, in OSSL_CRMF_MSG_create_popo() 602 * Decrypts the certificate in the given encryptedValue using private key pkey. 611 EVP_PKEY *pkey) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 627 || ecert->encValue == NULL || pkey in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 367 create_popo_signature(OSSL_CRMF_POPOSIGNINGKEY *ps, const OSSL_CRMF_CERTREQUEST *cr, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) create_popo_signature() argument 394 OSSL_CRMF_MSG_create_popo(int meth, OSSL_CRMF_MSG *crm, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) OSSL_CRMF_MSG_create_popo() argument 609 OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(const OSSL_CRMF_ENCRYPTEDVALUE *ecert, OSSL_LIB_CTX *libctx, const char *propq, EVP_PKEY *pkey) OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() argument [all...] |
/third_party/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 369 EVP_PKEY *pkey, const EVP_MD *digest, in create_popo_signature() 374 if (ps == NULL || cr == NULL || pkey == NULL) { in create_popo_signature() 384 if (EVP_PKEY_get_default_digest_name(pkey, name, sizeof(name)) > 0 in create_popo_signature() 390 NULL, pkey, digest, libctx, propq); in create_popo_signature() 395 EVP_PKEY *pkey, const EVP_MD *digest, in OSSL_CRMF_MSG_create_popo() 401 if (crm == NULL || (meth == OSSL_CRMF_POPO_SIGNATURE && pkey == NULL)) { in OSSL_CRMF_MSG_create_popo() 424 if (!create_popo_signature(ps, crm->certReq, pkey, digest, in OSSL_CRMF_MSG_create_popo() 602 * Decrypts the certificate in the given encryptedValue using private key pkey. 611 EVP_PKEY *pkey) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 627 || ecert->encValue == NULL || pkey in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 367 create_popo_signature(OSSL_CRMF_POPOSIGNINGKEY *ps, const OSSL_CRMF_CERTREQUEST *cr, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) create_popo_signature() argument 394 OSSL_CRMF_MSG_create_popo(int meth, OSSL_CRMF_MSG *crm, EVP_PKEY *pkey, const EVP_MD *digest, OSSL_LIB_CTX *libctx, const char *propq) OSSL_CRMF_MSG_create_popo() argument 609 OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(const OSSL_CRMF_ENCRYPTEDVALUE *ecert, OSSL_LIB_CTX *libctx, const char *propq, EVP_PKEY *pkey) OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() argument [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/common/src/ |
H A D | openssl_common.c | 534 HcfResult GetKeyEncodedPem(EVP_PKEY *pkey, const char *outPutStruct, int selection, char **returnString) in GetKeyEncodedPem() argument 536 OSSL_ENCODER_CTX *ctx = OpensslOsslEncoderCtxNewForPkey(pkey, selection, "PEM", outPutStruct, NULL); in GetKeyEncodedPem() 555 HcfResult ConvertPubPemStrToKey(EVP_PKEY **pkey, const char *keyType, int selection, const char *keyStr) in ConvertPubPemStrToKey() argument 557 OSSL_DECODER_CTX *ctx = OpensslOsslDecoderCtxNewForPkey(pkey, "PEM", NULL, keyType, selection, NULL, NULL); in ConvertPubPemStrToKey() 581 HcfResult ConvertPriPemStrToKey(const char *keyStr, EVP_PKEY **pkey, const char *keyType) in ConvertPriPemStrToKey() argument 597 EVP_PKEY *pkeyRet = OpensslPemReadBioPrivateKey(bio, pkey, PrivateKeyReadNullCb, NULL); in ConvertPriPemStrToKey() 605 if (OpensslEvpPkeyIsA(*pkey, keyType) != HCF_OPENSSL_SUCCESS) { in ConvertPriPemStrToKey() 607 OpensslEvpPkeyFree(*pkey); in ConvertPriPemStrToKey()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_sm2.c | 53 static int32_t EvpPkeyToKeyMaterialEc(const struct HksKeySpec *spec, const EVP_PKEY *pkey, struct HksBlob *key)
in EvpPkeyToKeyMaterialEc() argument 61 int pubXRet = GetBnBinpadFromPkey(pkey, OSSL_PKEY_PARAM_EC_PUB_X, &pubXBlob);
in EvpPkeyToKeyMaterialEc() 62 int pubYRet = GetBnBinpadFromPkey(pkey, OSSL_PKEY_PARAM_EC_PUB_Y, &pubYBlob);
in EvpPkeyToKeyMaterialEc() 63 int priRet = GetBnBinpadFromPkey(pkey, OSSL_PKEY_PARAM_PRIV_KEY, &privBlob);
in EvpPkeyToKeyMaterialEc() 127 EVP_PKEY *pkey = NULL;
in HksOpensslSm2GenerateKey() local 134 osRet = EVP_PKEY_keygen(ctx, &pkey);
in HksOpensslSm2GenerateKey() 139 ret = EvpPkeyToKeyMaterialEc(spec, pkey, key);
in HksOpensslSm2GenerateKey() 145 SELF_FREE_PTR(pkey, EVP_PKEY_free)
in HksOpensslSm2GenerateKey()
|
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pvkfmt.c | 72 EVP_PKEY *pkey = NULL; in evp_pkey_new0_key() local 86 if ((pkey = EVP_PKEY_new()) != NULL) { in evp_pkey_new0_key() 89 if (EVP_PKEY_set1_RSA(pkey, key)) in evp_pkey_new0_key() 91 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 92 pkey = NULL; in evp_pkey_new0_key() 96 if (EVP_PKEY_set1_DSA(pkey, key)) in evp_pkey_new0_key() 98 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 99 pkey = NULL; in evp_pkey_new0_key() 116 if (pkey == NULL) in evp_pkey_new0_key() 118 return pkey; in evp_pkey_new0_key() 328 EVP_PKEY *pkey = NULL; ossl_b2i_bio() local [all...] |
/third_party/openssl/crypto/pem/ |
H A D | pvkfmt.c | 72 EVP_PKEY *pkey = NULL; in evp_pkey_new0_key() local 86 if ((pkey = EVP_PKEY_new()) != NULL) { in evp_pkey_new0_key() 89 if (EVP_PKEY_set1_RSA(pkey, key)) in evp_pkey_new0_key() 91 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 92 pkey = NULL; in evp_pkey_new0_key() 96 if (EVP_PKEY_set1_DSA(pkey, key)) in evp_pkey_new0_key() 98 EVP_PKEY_free(pkey); in evp_pkey_new0_key() 99 pkey = NULL; in evp_pkey_new0_key() 116 if (pkey == NULL) in evp_pkey_new0_key() 118 return pkey; in evp_pkey_new0_key() 328 EVP_PKEY *pkey = NULL; ossl_b2i_bio() local [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 30 static const SIGALG_LOOKUP *find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey); 871 static int tls1_check_pkey_comp(SSL *s, EVP_PKEY *pkey) in tls1_check_pkey_comp() argument 878 if (!EVP_PKEY_is_a(pkey, "EC")) in tls1_check_pkey_comp() 883 point_conv = EVP_PKEY_get_ec_point_conv_form(pkey); in tls1_check_pkey_comp() 895 int field_type = EVP_PKEY_get_field_type(pkey); in tls1_check_pkey_comp() 919 static uint16_t tls1_get_group_id(EVP_PKEY *pkey) in tls1_get_group_id() argument 921 int curve_nid = ssl_get_EC_curve_nid(pkey); in tls1_get_group_id() 935 EVP_PKEY *pkey; in tls1_check_cert_param() local 936 pkey = X509_get0_pubkey(x); in tls1_check_cert_param() 937 if (pkey in tls1_check_cert_param() 1266 rsa_pss_check_min_key_size(SSL_CTX *ctx, const EVP_PKEY *pkey, const SIGALG_LOOKUP *lu) rsa_pss_check_min_key_size() argument 1356 tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey) tls1_set_peer_legacy_sigalg() argument 1485 tls12_check_peer_sigalg(SSL *s, uint16_t sig, EVP_PKEY *pkey) tls12_check_peer_sigalg() argument 2982 EVP_PKEY *pkey = X509_get0_pubkey(x); ssl_security_cert_key() local 3088 check_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) check_cert_usable() argument 3162 is_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) is_cert_usable() argument 3182 find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey) find_sig_alg() argument 3295 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; tls_choose_sigalg() local 3503 ssl_get_EC_curve_nid(const EVP_PKEY *pkey) ssl_get_EC_curve_nid() argument 3513 tls13_set_encoded_pub_key(EVP_PKEY *pkey, const unsigned char *enckey, size_t enckeylen) tls13_set_encoded_pub_key() argument [all...] |
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 29 static const SIGALG_LOOKUP *find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey); 851 static int tls1_check_pkey_comp(SSL *s, EVP_PKEY *pkey) in tls1_check_pkey_comp() argument 858 if (!EVP_PKEY_is_a(pkey, "EC")) in tls1_check_pkey_comp() 863 point_conv = EVP_PKEY_get_ec_point_conv_form(pkey); in tls1_check_pkey_comp() 875 int field_type = EVP_PKEY_get_field_type(pkey); in tls1_check_pkey_comp() 899 static uint16_t tls1_get_group_id(EVP_PKEY *pkey) in tls1_get_group_id() argument 901 int curve_nid = ssl_get_EC_curve_nid(pkey); in tls1_get_group_id() 915 EVP_PKEY *pkey; in tls1_check_cert_param() local 916 pkey = X509_get0_pubkey(x); in tls1_check_cert_param() 917 if (pkey in tls1_check_cert_param() 1246 rsa_pss_check_min_key_size(SSL_CTX *ctx, const EVP_PKEY *pkey, const SIGALG_LOOKUP *lu) rsa_pss_check_min_key_size() argument 1336 tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey) tls1_set_peer_legacy_sigalg() argument 1465 tls12_check_peer_sigalg(SSL *s, uint16_t sig, EVP_PKEY *pkey) tls12_check_peer_sigalg() argument 2962 EVP_PKEY *pkey = X509_get0_pubkey(x); ssl_security_cert_key() local 3068 check_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) check_cert_usable() argument 3142 is_cert_usable(SSL *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) is_cert_usable() argument 3162 find_sig_alg(SSL *s, X509 *x, EVP_PKEY *pkey) find_sig_alg() argument 3275 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; tls_choose_sigalg() local 3483 ssl_get_EC_curve_nid(const EVP_PKEY *pkey) ssl_get_EC_curve_nid() argument 3493 tls13_set_encoded_pub_key(EVP_PKEY *pkey, const unsigned char *enckey, size_t enckeylen) tls13_set_encoded_pub_key() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_openssl.c | 90 static EC_KEY * EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) in EVP_PKEY_get0_EC_KEY() argument 92 if (pkey->type != EVP_PKEY_EC) in EVP_PKEY_get0_EC_KEY() 94 return pkey->pkey.ec; in EVP_PKEY_get0_EC_KEY() 257 u8 pkey[8], next, tmp; in des_encrypt() local 267 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 270 pkey[i] = next | 1; in des_encrypt() 274 EVP_EncryptInit_ex(ctx, EVP_des_ecb(), NULL, pkey, NULL) == 1 && in des_encrypt() 2054 EVP_PKEY *pkey; member 2097 if (EVP_PKEY_keygen(kctx, &ecdh->pkey) ! in crypto_ecdh_init() 2315 EVP_PKEY *pkey = NULL; crypto_ec_key_parse_priv() local 2341 EVP_PKEY *pkey; crypto_ec_key_parse_pub() local 2364 EVP_PKEY *pkey = NULL; crypto_ec_key_set_pub() local 2445 EVP_PKEY *pkey = NULL; crypto_ec_key_set_pub_point() local 3088 EVP_PKEY *pkey = NULL; crypto_csr_verify() local [all...] |
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | Makefile | 16 # pkey kernel module 17 pkey-objs := pkey_api.o 18 obj-$(CONFIG_PKEY) += pkey.o
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | mman.h | 93 #define arch_calc_vm_prot_bits(prot, pkey) 0 142 calc_vm_prot_bits(unsigned long prot, unsigned long pkey) in calc_vm_prot_bits() argument 147 arch_calc_vm_prot_bits(prot, pkey); in calc_vm_prot_bits()
|
/third_party/openssl/test/ |
H A D | sslbuffertest.c | 157 char *cert, *pkey; in setup_tests() local 165 || !TEST_ptr(pkey = test_get_argument(1))) in setup_tests() 170 &serverctx, &clientctx, cert, pkey)) { in setup_tests()
|
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 112 EVP_PKEY *pkey = NULL; in pkcs7_encode_rinfo() local 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 119 if (pkey == NULL) in pkcs7_encode_rinfo() 122 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_encode_rinfo() 156 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, in pkcs7_decrypt_rinfo() 165 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_decrypt_rinfo() 395 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) in PKCS7_dataDecode() argument 582 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, in PKCS7_dataDecode() 590 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0) in PKCS7_dataDecode() 818 if (si->pkey in PKCS7_dataFinal() 155 pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, size_t fixlen) pkcs7_decrypt_rinfo() argument 1025 EVP_PKEY *pkey; PKCS7_signatureVerify() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | req.c | 50 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, 239 EVP_PKEY *pkey = NULL, *CAkey = NULL; in req_main() local 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 631 if (pkey == NULL) in req_main() 635 if (newreq && pkey == NULL) { in req_main() 687 pkey = app_keygen(genctx, keyalgstr, newkey_len, verbose); in req_main() 688 if (pkey == NULL) in req_main() 700 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 726 if (!PEM_write_bio_PrivateKey(out, pkey, cipher, in req_main() 782 if (CAcert == NULL && pkey in req_main() 1068 make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, int multirdn, int attribs, unsigned long chtype) make_REQ() argument [all...] |
/third_party/openssl/apps/ |
H A D | req.c | 50 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, 239 EVP_PKEY *pkey = NULL, *CAkey = NULL; in req_main() local 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 631 if (pkey == NULL) in req_main() 635 if (newreq && pkey == NULL) { in req_main() 685 pkey = app_keygen(genctx, keyalgstr, newkey_len, verbose); in req_main() 686 if (pkey == NULL) in req_main() 698 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 724 if (!PEM_write_bio_PrivateKey(out, pkey, cipher, in req_main() 780 if (CAcert == NULL && pkey in req_main() 1066 make_REQ(X509_REQ *req, EVP_PKEY *pkey, X509_NAME *fsubj, int multirdn, int attribs, unsigned long chtype) make_REQ() argument [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 112 EVP_PKEY *pkey = NULL; in pkcs7_encode_rinfo() local 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 119 if (pkey == NULL) in pkcs7_encode_rinfo() 122 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_encode_rinfo() 156 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, in pkcs7_decrypt_rinfo() 165 pctx = EVP_PKEY_CTX_new_from_pkey(ossl_pkcs7_ctx_get0_libctx(ctx), pkey, in pkcs7_decrypt_rinfo() 395 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) in PKCS7_dataDecode() argument 582 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, in PKCS7_dataDecode() 590 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0) in PKCS7_dataDecode() 818 if (si->pkey in PKCS7_dataFinal() 155 pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey, size_t fixlen) pkcs7_decrypt_rinfo() argument 1025 EVP_PKEY *pkey; PKCS7_signatureVerify() local [all...] |
/kernel/linux/linux-5.10/drivers/infiniband/hw/hfi1/ |
H A D | hfi.h | 392 u16 pkey; member 1020 u16 pkey; member 1750 u16 pkey, u32 slid, u32 dlid, u8 sc5, 1753 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1756 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1760 int egress_pkey_check(struct hfi1_pportdata *ppd, u32 slid, u16 pkey, 1797 * ingress_pkey_matches_entry - return 1 if the pkey matches ent (ent 1802 static inline int ingress_pkey_matches_entry(u16 pkey, u16 ent) in ingress_pkey_matches_entry() argument 1804 u16 mkey = pkey & PKEY_LOW_15_MASK; in ingress_pkey_matches_entry() 1809 * If pkey[1 in ingress_pkey_matches_entry() 1825 ingress_pkey_table_search(struct hfi1_pportdata *ppd, u16 pkey) ingress_pkey_table_search() argument 1841 ingress_pkey_table_fail(struct hfi1_pportdata *ppd, u16 pkey, u32 slid) ingress_pkey_table_fail() argument 1862 ingress_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u8 idx, u32 slid, bool force) ingress_pkey_check() argument 1895 rcv_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u16 slid) rcv_pkey_check() argument 2670 hfi1_make_16b_hdr(struct hfi1_16b_header *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, bool becn, bool fecn, u8 l4, u8 sc) hfi1_make_16b_hdr() argument [all...] |
/kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/ |
H A D | hfi.h | 351 u16 pkey; member 969 u16 pkey; member 1698 u16 pkey, u32 slid, u32 dlid, u8 sc5, 1701 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1704 u32 remote_qpn, u16 pkey, u32 slid, u32 dlid, 1708 int egress_pkey_check(struct hfi1_pportdata *ppd, u32 slid, u16 pkey, 1745 * ingress_pkey_matches_entry - return 1 if the pkey matches ent (ent 1750 static inline int ingress_pkey_matches_entry(u16 pkey, u16 ent) in ingress_pkey_matches_entry() argument 1752 u16 mkey = pkey & PKEY_LOW_15_MASK; in ingress_pkey_matches_entry() 1757 * If pkey[1 in ingress_pkey_matches_entry() 1773 ingress_pkey_table_search(struct hfi1_pportdata *ppd, u16 pkey) ingress_pkey_table_search() argument 1789 ingress_pkey_table_fail(struct hfi1_pportdata *ppd, u16 pkey, u32 slid) ingress_pkey_table_fail() argument 1810 ingress_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u8 idx, u32 slid, bool force) ingress_pkey_check() argument 1843 rcv_pkey_check(struct hfi1_pportdata *ppd, u16 pkey, u8 sc5, u16 slid) rcv_pkey_check() argument 2617 hfi1_make_16b_hdr(struct hfi1_16b_header *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, bool becn, bool fecn, u8 l4, u8 sc) hfi1_make_16b_hdr() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | ctrl_params_translate.c | 1514 EVP_PKEY *pkey = ctx->p2; in get_payload_group_name() local 1517 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_group_name() 1521 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_group_name() 1537 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey)); in get_payload_group_name() 1567 EVP_PKEY *pkey = ctx->p2; in get_payload_private_key() local 1573 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_private_key() 1577 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_private_key() 1586 const EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey); in get_payload_private_key() 1604 EVP_PKEY *pkey = ctx->p2; in get_payload_public_key() local 1609 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_public_key() 1681 EVP_PKEY *pkey = ctx->p2; get_dh_dsa_payload_p() local 1763 EVP_PKEY *pkey = ctx->p2; get_ec_decoded_from_explicit_params() local 2830 evp_pkey_setget_params_to_ctrl(const EVP_PKEY *pkey, enum action action_type, OSSL_PARAM *params) evp_pkey_setget_params_to_ctrl() argument 2872 evp_pkey_get_params_to_ctrl(const EVP_PKEY *pkey, OSSL_PARAM *params) evp_pkey_get_params_to_ctrl() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | ctrl_params_translate.c | 1511 EVP_PKEY *pkey = ctx->p2; in get_payload_group_name() local 1514 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_group_name() 1518 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_group_name() 1534 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey)); in get_payload_group_name() 1564 EVP_PKEY *pkey = ctx->p2; in get_payload_private_key() local 1570 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_private_key() 1574 const DH *dh = EVP_PKEY_get0_DH(pkey); in get_payload_private_key() 1583 const EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey); in get_payload_private_key() 1601 EVP_PKEY *pkey = ctx->p2; in get_payload_public_key() local 1606 switch (EVP_PKEY_get_base_id(pkey)) { in get_payload_public_key() 1678 EVP_PKEY *pkey = ctx->p2; get_dh_dsa_payload_p() local 1760 EVP_PKEY *pkey = ctx->p2; get_ec_decoded_from_explicit_params() local 2821 evp_pkey_setget_params_to_ctrl(const EVP_PKEY *pkey, enum action action_type, OSSL_PARAM *params) evp_pkey_setget_params_to_ctrl() argument 2863 evp_pkey_get_params_to_ctrl(const EVP_PKEY *pkey, OSSL_PARAM *params) evp_pkey_get_params_to_ctrl() argument [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/mm/ |
H A D | pkey_siginfo.c | 39 int pkey; in segv_handler() local 41 pkey = siginfo_pkey(sinfo); in segv_handler() 43 /* Check if this fault originated from a pkey access violation */ in segv_handler() 55 /* Check if this fault originated from the restrictive pkey */ in segv_handler() 56 if (pkey != rest_pkey) { in segv_handler() 57 sigsafe_err("got a fault for an unexpected pkey\n"); in segv_handler() 72 * reassociate the page with the exec-only pkey since execute in segv_handler() 73 * rights cannot be changed directly for the faulting pkey as in segv_handler() 78 * pkey. in segv_handler() 86 pkey_set_rights(pkey, in segv_handler() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/powerpc/mm/ |
H A D | pkey_siginfo.c | 39 int pkey; in segv_handler() local 41 pkey = siginfo_pkey(sinfo); in segv_handler() 43 /* Check if this fault originated from a pkey access violation */ in segv_handler() 55 /* Check if this fault originated from the restrictive pkey */ in segv_handler() 56 if (pkey != rest_pkey) { in segv_handler() 57 sigsafe_err("got a fault for an unexpected pkey\n"); in segv_handler() 72 * reassociate the page with the exec-only pkey since execute in segv_handler() 73 * rights cannot be changed directly for the faulting pkey as in segv_handler() 78 * pkey. in segv_handler() 86 pkey_set_rights(pkey, in segv_handler() [all...] |