Lines Matching +full:inside +full:- +full:secure

1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */
89 /* Struct to hold a CCA AES secure key blob */
91 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */
121 * Generate CCA AES secure key.
127 struct pkey_seckey seckey; /* out: the secure key blob */
133 * Construct CCA AES secure key from clear key value
140 struct pkey_seckey seckey; /* out: the secure key blob */
146 * Fabricate AES protected key from a CCA AES secure key
151 struct pkey_seckey seckey; /* in: the secure key blob */
170 * Verification Pattern provided inside a CCA AES secure key.
173 struct pkey_seckey seckey; /* in: the secure key blob */
184 struct pkey_seckey seckey; /* in: the secure key blob */
191 * Verify the given CCA AES secure key for being able to be usable with
199 struct pkey_seckey seckey; /* in: the secure key blob */
241 * Generate secure key, version 2.
242 * Generate CCA AES secure key, CCA AES cipher key or EP11 AES secure key.
249 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4KT ioctl to
274 * Generate secure key from clear key value, version 2.
275 * Construct an CCA AES secure key, CCA AES cipher key or EP11 AES secure
283 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4KT ioctl to
309 * Verify the given secure key, version 2.
316 * For CCA AES secure keys and CCA AES cipher keys this means to check
323 * CCA AES secure keys are also checked to have the CPACF export allowed
331 * apqn does not match or there is no such apqn found, -1 with errno
354 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to
356 * Deriving ECC protected keys from ECC secure keys is not supported with
371 * Is able to find out which type of secure key is given (CCA AES secure
450 * So this ioctl is also able to handle EP11 and CCA ECC secure keys and
458 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to