| /linux/drivers/s390/crypto/ |
| H A D | pkey_api.c | 106 kgs.keytype, PKEY_TYPE_CCA_DATA, 0, 0, in pkey_ioctl_genseck() 130 kcs.keytype, PKEY_TYPE_CCA_DATA, 0, 0, in pkey_ioctl_clr2seck() 132 pkey_keytype_aes_to_size(kcs.keytype), in pkey_ioctl_clr2seck() 180 keylen = pkey_keytype_aes_to_size(kcp.keytype); in pkey_ioctl_clr2protk() 183 __func__, kcp.keytype); in pkey_ioctl_clr2protk() 195 t->keytype = (keylen - 8) >> 3; in pkey_ioctl_clr2protk() 278 u32 keytype, keybitsize, flags; in pkey_ioctl_verifykey() local 290 &keytype, &keybitsize, &flags, 0); in pkey_ioctl_verifykey() 292 if (!rc && keytype != PKEY_TYPE_CCA_DATA) in pkey_ioctl_verifykey() 314 rc = pkey_handler_gen_key(NULL, 0, kgp.keytype, in pkey_ioctl_genprotk() [all …]
|
| H A D | pkey_uv.c | 83 static bool is_uv_keytype(enum pkey_key_type keytype) in is_uv_keytype() argument 85 switch (keytype) { in is_uv_keytype() 236 u32 *keytype, u32 *keybitsize, u32 *flags, in uv_verifykey() argument 258 if (keytype) in uv_verifykey() 259 *keytype = PKEY_TYPE_UVSECRET; in uv_verifykey()
|
| H A D | zcrypt_ccamisc.c | 130 if (t->keytype != 0x0001) { in cca_check_secaescipherkey() 133 __func__, (int)t->keytype); in cca_check_secaescipherkey()
|
| /linux/arch/s390/include/uapi/asm/ |
| H A D | pkey.h | 126 __u32 keytype; /* in: key type to generate */ member 138 __u32 keytype; /* in: key type to generate */ member 161 __u32 keytype; /* in: key type to generate */ member 214 __u32 keytype; /* in: key type to generate */ member
|
| /linux/include/sound/ |
| H A D | jack.h | 85 int keytype); 110 int keytype) in snd_jack_set_key() argument
|
| /linux/drivers/crypto/virtio/ |
| H A D | virtio_crypto_akcipher_algs.c | 351 uint32_t keytype; in virtio_crypto_rsa_set_key() local 356 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE; in virtio_crypto_rsa_set_key() 359 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC; in virtio_crypto_rsa_set_key() 393 para.keytype = cpu_to_le32(keytype); in virtio_crypto_rsa_set_key()
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm1.c | 54 pr_info("sealing key type %d\n", o->keytype); in dump_options() 423 static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, in tpm_seal() argument 448 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 638 ret = tpm_seal(&tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 740 opt->keytype = SEAL_keytype; in getoptions() 844 options->keytype = SRK_keytype; in trusted_options_alloc()
|
| /linux/sound/core/ |
| H A D | jack.c | 605 int keytype) in snd_jack_set_key() argument 611 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 615 jack->key[key] = keytype; in snd_jack_set_key()
|
| /linux/include/linux/ |
| H A D | key.h | 179 struct key_type *keytype; member
|
| /linux/drivers/net/wireless/ath/ath9k/ |
| H A D | xmit.c | 1473 info.keytype = fi->keytype; in ath_tx_fill_desc() 2142 enum ath9k_key_type keytype; in setup_frame_info() local 2156 keytype = ath9k_cmn_get_hw_crypto_keytype(skb); in setup_frame_info() 2183 fi->keytype = keytype; in setup_frame_info() 2936 fi->keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_tx99_send()
|
| H A D | ar9002_mac.c | 227 ctl6 = SM(i->keytype, AR_EncrType); in ar9002_set_txdesc()
|
| H A D | ar9003_mac.c | 90 ctl17 = SM(i->keytype, AR_EncrType); in ar9003_set_txdesc()
|
| H A D | ath9k.h | 186 enum ath9k_key_type keytype:2; member
|
| /linux/drivers/net/wireless/marvell/libertas/ |
| H A D | cfg.c | 958 cmd.keytype[i] = CMD_TYPE_WEP_40_BIT; in lbs_set_wep_keys() 961 cmd.keytype[i] = CMD_TYPE_WEP_104_BIT; in lbs_set_wep_keys() 964 cmd.keytype[i] = 0; in lbs_set_wep_keys()
|
| H A D | host.h | 555 uint8_t keytype[4]; member
|
| /linux/crypto/asymmetric_keys/ |
| H A D | asymmetric_type.c | 496 keyres->keytype = &key_type_asymmetric; in asymmetric_restriction_alloc()
|
| /linux/security/keys/ |
| H A D | keyring.c | 1778 keyring->restrict_link->keytype != dead_type) { in keyring_restriction_gc() 1792 keyres->keytype = NULL; in keyring_restriction_gc()
|
| /linux/Documentation/security/keys/ |
| H A D | core.rst | 1487 keytype->def_datalen, then key_payload_reserve() should be called.
|