/linux/drivers/s390/crypto/ |
A D | pkey_api.c | 87 static int pkey_clr2protkey(u32 keytype, in pkey_clr2protkey() argument 98 switch (keytype) { in pkey_clr2protkey() 113 __func__, keytype); in pkey_clr2protkey() 137 protkey->type = keytype; in pkey_clr2protkey() 315 switch (keytype) { in pkey_genprotkey() 327 keytype); in pkey_genprotkey() 408 protkey->type = t->keytype; in pkey_nonccatok2pkey() 446 rc = cca_clr2seckey(0xFFFF, 0xFFFF, t->keytype, in pkey_nonccatok2pkey() 1153 kgs.keytype, kgs.seckey.seckey); in pkey_unlocked_ioctl() 1199 rc = pkey_clr2protkey(kcp.keytype, in pkey_unlocked_ioctl() [all …]
|
A D | zcrypt_ccamisc.h | 86 u16 keytype; /* 0x0001 for 'cipher' */ member
|
A D | zcrypt_ccamisc.c | 119 if (t->keytype != 0x0001) { in cca_check_secaescipherkey() 122 __func__, (int) t->keytype); in cca_check_secaescipherkey()
|
/linux/arch/s390/include/uapi/asm/ |
A D | pkey.h | 115 __u32 keytype; /* in: key type to generate */ member 126 __u32 keytype; /* in: key type to generate */ member 147 __u32 keytype; /* in: key type to generate */ member 196 __u32 keytype; /* in: key type to generate */ member
|
/linux/include/sound/ |
A D | jack.h | 83 int keytype); 113 int keytype) in snd_jack_set_key() argument
|
/linux/include/keys/ |
A D | trusted-type.h | 37 uint16_t keytype; member
|
A D | trusted_tpm.h | 57 pr_info("sealing key type %d\n", o->keytype); in dump_options()
|
/linux/security/keys/trusted-keys/ |
A D | trusted_tpm1.c | 457 static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, in tpm_seal() argument 482 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 674 ret = tpm_seal(&tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 776 opt->keytype = SEAL_keytype; in getoptions() 880 options->keytype = SRK_keytype; in trusted_options_alloc()
|
/linux/sound/core/ |
A D | jack.c | 611 int keytype) in snd_jack_set_key() argument 617 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 621 jack->key[key] = keytype; in snd_jack_set_key()
|
/linux/drivers/net/wireless/ath/ath9k/ |
A D | xmit.c | 1417 info.keytype = fi->keytype; in ath_tx_fill_desc() 2082 enum ath9k_key_type keytype; in setup_frame_info() local 2096 keytype = ath9k_cmn_get_hw_crypto_keytype(skb); in setup_frame_info() 2123 fi->keytype = keytype; in setup_frame_info() 2876 fi->keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_tx99_send()
|
A D | ar9002_mac.c | 227 ctl6 = SM(i->keytype, AR_EncrType); in ar9002_set_txdesc()
|
A D | mac.h | 707 enum ath9k_key_type keytype; member
|
A D | ar9003_mac.c | 90 ctl17 = SM(i->keytype, AR_EncrType); in ar9003_set_txdesc()
|
A D | beacon.c | 94 info.keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_beacon_setup()
|
A D | ath9k.h | 184 enum ath9k_key_type keytype:2;
|
/linux/include/linux/ |
A D | key.h | 173 struct key_type *keytype; member
|
/linux/arch/s390/crypto/ |
A D | paes_s390.c | 67 u32 keytype; in _key_to_kb() member 79 h->keytype = (keylen - 8) >> 3; in _key_to_kb()
|
/linux/drivers/net/wireless/marvell/libertas/ |
A D | cfg.c | 908 cmd.keytype[i] = CMD_TYPE_WEP_40_BIT; in lbs_set_wep_keys() 911 cmd.keytype[i] = CMD_TYPE_WEP_104_BIT; in lbs_set_wep_keys() 914 cmd.keytype[i] = 0; in lbs_set_wep_keys()
|
A D | host.h | 551 uint8_t keytype[4]; member
|
/linux/crypto/asymmetric_keys/ |
A D | asymmetric_type.c | 468 keyres->keytype = &key_type_asymmetric; in asymmetric_restriction_alloc()
|
/linux/security/keys/ |
A D | keyring.c | 1775 keyring->restrict_link->keytype != dead_type) { in keyring_restriction_gc() 1789 keyres->keytype = NULL; in keyring_restriction_gc()
|
/linux/drivers/staging/rtl8192u/ |
A D | r8192U_core.c | 4873 void setKey(struct net_device *dev, u8 entryno, u8 keyindex, u16 keytype, in setKey() argument 4886 __func__, dev, entryno, keyindex, keytype, macaddr); in setKey() 4889 us_config |= BIT(15) | (keytype << 2); in setKey() 4891 us_config |= BIT(15) | (keytype << 2) | keyindex; in setKey()
|
/linux/Documentation/security/keys/ |
A D | core.rst | 1487 keytype->def_datalen, then key_payload_reserve() should be called.
|