/freebsd-9.3-release/sys/ofed/include/rdma/ |
H A D | ib_pack.h | 204 __be16 pkey; member in struct:ib_unpacked_bth
|
H A D | ib_user_cm.h | 286 __u16 pkey; member in struct:ib_ucm_sidr_req_event_resp
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 106 EVP_PKEY_free(si->pkey);
|
/freebsd-9.3-release/crypto/openssl/fips/dsa/ |
H A D | fips_dsa_selftest.c | 154 pk.pkey.dsa = dsa;
|
H A D | fips_dsatest.c | 210 pk.pkey.dsa = dsa;
|
/freebsd-9.3-release/crypto/openssl/fips/rsa/ |
H A D | fips_rsastest.c | 313 pk.pkey.rsa = rsa;
|
H A D | fips_rsavtest.c | 314 pk.pkey.rsa = rsa_pubkey;
|
H A D | fips_rsa_gen.c | 92 pk.pkey.rsa = rsa;
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_chil.c | 878 rsa = res->pkey.rsa; 879 res->pkey.rsa = RSA_new(); 880 res->pkey.rsa->n = rsa->n; 881 res->pkey.rsa->e = rsa->e;
|
H A D | e_capi.c | 135 EVP_PKEY **pkey, STACK_OF(X509) **pother, 1537 EVP_PKEY **pkey, STACK_OF(X509) **pother, 1553 *pkey = NULL; 1630 *pkey = capi_get_pkey(e, key); 1535 capi_load_ssl_client_cert(ENGINE *e, SSL *ssl, STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data) argument
|
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/ |
H A D | osm_sa_multipath_record.c | 75 ib_net16_t pkey; member in struct:osm_path_parms 582 * MPR request has a specific pkey: 583 * Check that source and destination share this pkey. 584 * If QoS level has pkeys, check that this pkey exists 586 * MPR returned pkey is the requested pkey. 588 required_pkey = p_mpr->pkey; 611 * MPR request doesn't have a specific pkey, but QoS level 612 * has pkeys - get shared pkey from QoS level pkeys 626 * Neither MPR request nor QoS level have pkey [all...] |
H A D | osm_helper.c | 1112 cl_ntoh16(p_pr->pkey), 1179 cl_ntoh16(p_mpr->pkey), 1224 cl_ntoh16(p_mcmr->pkey),
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 391 pub_rsa = cert->cert_info->key->pkey->pkey.rsa; 1619 EVP_PKEY *pkey; local 1625 pkey = NULL; 1628 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1651 if (pkey) { 1654 if (SSL_use_PrivateKey(ssl, pkey) != 1) 1657 if (SSL_CTX_use_PrivateKey(ssl_ctx, pkey) != 1) 1660 EVP_PKEY_free(pkey);
|
/freebsd-9.3-release/contrib/ofed/management/opensm/include/iba/ |
H A D | ib_types.h | 2016 static inline ib_net16_t OSM_API ib_pkey_get_base(IN const ib_net16_t pkey) argument 2018 return ((ib_net16_t) (pkey & IB_PKEY_BASE_MASK)); 2023 * pkey 2043 static inline boolean_t OSM_API ib_pkey_is_full_member(IN const ib_net16_t pkey) argument 2045 return ((pkey & IB_PKEY_TYPE_MASK) == IB_PKEY_TYPE_MASK); 2050 * pkey 2074 static inline boolean_t OSM_API ib_pkey_is_invalid(IN const ib_net16_t pkey) argument 2076 if (ib_pkey_get_base(pkey) == 0x0000) 2084 * pkey 2355 ib_net16_t pkey; member in struct:_ib_path_rec 2682 ib_path_rec_init_local(IN ib_path_rec_t * const p_rec, IN ib_gid_t * const p_dgid, IN ib_gid_t * const p_sgid, IN ib_net16_t dlid, IN ib_net16_t slid, IN uint8_t num_path, IN ib_net16_t pkey, IN uint8_t sl, IN uint16_t qos_class, IN uint8_t mtu_selector, IN uint8_t mtu, IN uint8_t rate_selector, IN uint8_t rate, IN uint8_t pkt_life_selector, IN uint8_t pkt_life, IN uint8_t preference) argument [all...] |
/freebsd-9.3-release/contrib/ofed/librdmacm/src/ |
H A D | cma.c | 510 id->route.addr.addr.ibaddr.pkey = resp->ib_route[0].pkey; 691 uint16_t pkey, uint16_t *pkey_index) 698 if (!ret && pkey == chk_pkey) { 712 id_priv->id.route.addr.addr.ibaddr.pkey, 747 id_priv->id.route.addr.addr.ibaddr.pkey, 690 ucma_find_pkey(struct cma_device *cma_dev, uint8_t port_num, uint16_t pkey, uint16_t *pkey_index) argument
|
/freebsd-9.3-release/contrib/ofed/libibverbs/src/ |
H A D | verbs.c | 119 int index, uint16_t *pkey) 134 *pkey = htons(val); 118 __ibv_query_pkey(struct ibv_context *context, uint8_t port_num, int index, uint16_t *pkey) argument
|
/freebsd-9.3-release/contrib/ofed/management/opensm/libvendor/ |
H A D | osm_vendor_ibumad_sa.c | 712 multipath_rec.pkey = p_mpr_req->pkey;
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | ssh-pkcs11.c | 509 evp->pkey.rsa == NULL) { 511 } else if ((rsa = RSAPublicKey_dup(evp->pkey.rsa))
|
/freebsd-9.3-release/sys/ofed/drivers/infiniband/core/ |
H A D | cm_msgs.h | 86 __be16 pkey; member in struct:cm_req_msg 783 __be16 pkey; member in struct:cm_sidr_req_msg
|
H A D | ud_header.c | 174 { STRUCT_FIELD(bth, pkey),
|
H A D | cma.c | 611 u16 pkey; local 615 pkey = ib_addr_get_pkey(dev_addr); 617 pkey = 0xffff; 620 pkey, &qp_attr->pkey_index); 1097 ib_addr_set_pkey(&rt->addr.dev_addr, rt->path_rec[0].pkey); 1634 path_rec.pkey = cpu_to_be16(ib_addr_get_pkey(&addr->dev_addr)); 1837 route->path_rec->pkey = cpu_to_be16(0xffff); 1919 u16 pkey; local 1942 ret = ib_get_cached_pkey(cma_dev->device, p, 0, &pkey); 1951 ib_addr_set_pkey(&id_priv->id.route.addr.dev_addr, pkey); [all...] |
H A D | sysfs.c | 285 u16 pkey; local 288 ret = ib_query_pkey(p->ibdev, p->port_num, tab_attr->index, &pkey); 292 return sprintf(buf, "0x%04x\n", pkey);
|
/freebsd-9.3-release/crypto/openssl/fips/ |
H A D | fips_test_suite.c | 123 pk.pkey.dsa = dsa; 174 pk.pkey.rsa = key;
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl.h | 748 int (*client_cert_cb) (SSL *ssl, X509 **x509, EVP_PKEY **pkey); 904 EVP_PKEY **pkey)); 906 EVP_PKEY **pkey); 1483 int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey); 1566 int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
|
/freebsd-9.3-release/sys/contrib/rdma/ |
H A D | ib_verbs.h | 928 u8 port_num, u16 index, u16 *pkey); 1130 u8 port_num, u16 index, u16 *pkey); 1144 u8 port_num, u16 pkey, u16 *index);
|