| /linux/arch/s390/kvm/ |
| H A D | dat.c | 190 union skey nkey = { .acc = pgste.acc, .fp = pgste.fp }; in dat_set_storage_key_from_pgste() 192 page_set_storage_key(pte_origin(pte), nkey.skey, 0); in dat_set_storage_key_from_pgste() 202 union skey skey; in dat_save_storage_key_into_pgste() local 204 skey.skey = page_get_storage_key(pte_origin(pte)); in dat_save_storage_key_into_pgste() 206 pgste.acc = skey.acc; in dat_save_storage_key_into_pgste() 207 pgste.fp = skey.fp; in dat_save_storage_key_into_pgste() 208 pgste.gr |= skey.r; in dat_save_storage_key_into_pgste() 209 pgste.gc |= skey.c; in dat_save_storage_key_into_pgste() 638 int dat_get_storage_key(union asce asce, gfn_t gfn, union skey *skey) in dat_get_storage_key() argument 645 skey->skey = 0; in dat_get_storage_key() [all …]
|
| H A D | dat.h | 292 union skey { union 293 unsigned char skey; member 310 static_assert(sizeof(union skey) == sizeof(char)); 528 int dat_get_storage_key(union asce asce, gfn_t gfn, union skey *skey); 530 union skey skey, bool nq); 532 union skey skey, union skey *oldkey, bool nq, bool mr, bool mc);
|
| H A D | kvm-s390.c | 558 unsigned long addr, union skey skey) in kvm_s390_keyop() argument 568 r = dat_cond_set_storage_key(mc, asce, gfn, skey, &skey, 0, 0, 0); in kvm_s390_keyop() 570 return skey.skey; in kvm_s390_keyop() 573 r = dat_get_storage_key(asce, gfn, &skey); in kvm_s390_keyop() 575 return skey.skey; in kvm_s390_keyop() 2093 union skey *keys; in kvm_s390_get_skeys() 2134 union skey *keys; in kvm_s390_set_skeys() 2968 union skey skey; in kvm_arch_vm_ioctl() local 2974 skey.skey = kop.key; in kvm_arch_vm_ioctl() 2980 r = kvm_s390_keyop(mc, kvm, kop.operation, kop.guest_addr, skey); in kvm_arch_vm_ioctl()
|
| /linux/drivers/net/ethernet/mellanox/mlx5/core/esw/ |
| H A D | vporttbl.c | 69 esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key) in esw_vport_tbl_lookup() argument 74 if (!memcmp(&e->key, skey, sizeof(*skey))) in esw_vport_tbl_lookup() 87 struct mlx5_vport_key skey; in mlx5_esw_vporttbl_get() local 92 hkey = flow_attr_to_vport_key(esw, attr, &skey); in mlx5_esw_vporttbl_get() 93 e = esw_vport_tbl_lookup(esw, &skey, hkey); in mlx5_esw_vporttbl_get() 118 e->key = skey; in mlx5_esw_vporttbl_get()
|
| /linux/net/tipc/ |
| H A D | crypto.c | 211 struct tipc_aead_key *skey; member 303 static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey, 308 static int tipc_aead_key_generate(struct tipc_aead_key *skey); 368 static int tipc_aead_key_generate(struct tipc_aead_key *skey) in tipc_aead_key_generate() argument 375 rc = crypto_rng_get_bytes(crypto_default_rng, skey->key, in tipc_aead_key_generate() 376 skey->keylen); in tipc_aead_key_generate() 1222 kfree_sensitive(rx->skey); in tipc_crypto_key_flush() 1223 rx->skey = NULL; in tipc_crypto_key_flush() 1878 rx->nokey = !(rx->skey || in tipc_crypto_rcv() 2238 static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey, in tipc_crypto_key_xmit() argument [all …]
|
| /linux/include/linux/ |
| H A D | nvme-auth.h | 35 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, 43 int nvme_auth_generate_psk(u8 hmac_id, u8 *skey, size_t skey_len,
|
| H A D | sysfs.h | 36 struct lock_class_key skey; member
|
| /linux/net/l2tp/ |
| H A D | l2tp_debugfs.c | 38 unsigned long skey; /* lookup key of current session */ member 61 pd->tunnel->tunnel_id, &pd->skey); in l2tp_dfs_next_session() 62 pd->skey++; in l2tp_dfs_next_session() 65 pd->skey = 0; in l2tp_dfs_next_session()
|
| H A D | l2tp_netlink.c | 496 unsigned long skey; member 846 unsigned long skey = cbd->skey; in l2tp_nl_cmd_session_dump() local 856 tunnel->tunnel_id, &skey); in l2tp_nl_cmd_session_dump() 861 skey = 0; in l2tp_nl_cmd_session_dump() 874 skey++; in l2tp_nl_cmd_session_dump() 879 cbd->skey = skey; in l2tp_nl_cmd_session_dump()
|
| H A D | l2tp_ppp.c | 1392 unsigned long skey; /* lookup key of current session */ member 1423 pd->tunnel->tunnel_id, &pd->skey); in pppol2tp_next_session() 1424 pd->skey++; in pppol2tp_next_session() 1427 pd->skey = 0; in pppol2tp_next_session()
|
| /linux/drivers/nvme/common/ |
| H A D | auth.c | 307 static int nvme_auth_hash_skey(int hmac_id, u8 *skey, size_t skey_len, u8 *hkey) in nvme_auth_hash_skey() argument 323 ret = crypto_shash_tfm_digest(tfm, skey, skey_len, hkey); in nvme_auth_hash_skey() 332 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, in nvme_auth_augmented_challenge() argument 344 ret = nvme_auth_hash_skey(hmac_id, skey, in nvme_auth_augmented_challenge() 489 int nvme_auth_generate_psk(u8 hmac_id, u8 *skey, size_t skey_len, in nvme_auth_generate_psk() argument 520 ret = crypto_shash_setkey(tfm, skey, skey_len); in nvme_auth_generate_psk()
|
| /linux/drivers/staging/rtl8723bs/os_dep/ |
| H A D | ioctl_cfg80211.c | 505 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 506 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 507 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 562 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); in rtw_cfg80211_ap_set_encryption() 622 …memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : par… in rtw_cfg80211_ap_set_encryption() 632 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); in rtw_cfg80211_ap_set_encryption() 633 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); in rtw_cfg80211_ap_set_encryption() 758 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); in rtw_cfg80211_set_encryption() 785 …memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : par… in rtw_cfg80211_set_encryption() 788 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); in rtw_cfg80211_set_encryption() [all …]
|
| /linux/drivers/staging/rtl8723bs/core/ |
| H A D | rtw_xmit.c | 481 memset(pattrib->dot118021x_UncstKey.skey, 0, 16); in update_attrib_sec_info() 482 memset(pattrib->dot11tkiptxmickey.skey, 0, 16); in update_attrib_sec_info() 539 memcpy(pattrib->dot11tkiptxmickey.skey, psta->dot11tkiptxmickey.skey, 16); in update_attrib_sec_info() 562 memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16); in update_attrib_sec_info() 802 …if (!memcmp(psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey, null_key… in xmitframe_addmic() 805 …cmicsetkey(&micdata, psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey); in xmitframe_addmic() 807 if (!memcmp(&pattrib->dot11tkiptxmickey.skey[0], null_key, 16)) in xmitframe_addmic() 810 rtw_secmicsetkey(&micdata, &pattrib->dot11tkiptxmickey.skey[0]); in xmitframe_addmic() 1251 if (omac1_aes_128(padapter->securitypriv.dot11wBIPKey[padapter->securitypriv.dot11wBIPKeyid].skey in rtw_mgmt_xmitframe_coalesce() 1282 memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16); in rtw_mgmt_xmitframe_coalesce()
|
| H A D | rtw_ioctl_set.c | 449 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length); in rtw_set_802_11_add_wep()
|
| H A D | rtw_mlme.c | 1934 memcpy(&psetkeyparm->key[0], &psecuritypriv->dot11DefKey[keyid].skey[0], keylen); in rtw_set_key() 1938 memcpy(&psetkeyparm->key[0], &psecuritypriv->dot11DefKey[keyid].skey[0], keylen); in rtw_set_key()
|
| H A D | rtw_cmd.c | 885 …setstakey_para->key, &psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey, 16); in rtw_setstakey_cmd()
|
| /linux/arch/s390/include/asm/ |
| H A D | sclp.h | 48 u8 skey : 1; member
|
| /linux/drivers/staging/rtl8723bs/include/ |
| H A D | rtw_security.h | 78 u8 skey[16]; member
|
| /linux/net/mac802154/ |
| H A D | llsec.c | 362 u32 skey = llsec_dev_hash_short(dev->short_addr, dev->pan_id); in mac802154_llsec_dev_add() local 381 hash_add_rcu(sec->devices_short, &entry->bucket_s, skey); in mac802154_llsec_dev_add()
|
| /linux/drivers/scsi/mpt3sas/ |
| H A D | mpt3sas_scsih.c | 233 u8 skey; member 5597 data->skey = sense_buffer[1] & 0x0F; in _scsih_normalize_sense() 5602 data->skey = sense_buffer[2] & 0x0F; in _scsih_normalize_sense() 5810 data.skey, data.asc, data.ascq, in _scsih_scsi_ioc_info() 6104 mpt3sas_trigger_scsi(ioc, data.skey, data.asc, data.ascq); in _scsih_io_done() 7682 if (sense_info.skey == UNIT_ATTENTION) in _scsih_determine_disposition() 7684 else if (sense_info.skey == NOT_READY) { in _scsih_determine_disposition() 7700 } else if (sense_info.skey == ILLEGAL_REQUEST && in _scsih_determine_disposition() 7703 } else if (sense_info.skey == MEDIUM_ERROR) { in _scsih_determine_disposition() 7711 } else if (sense_info.skey == HARDWARE_ERROR) { in _scsih_determine_disposition() [all …]
|
| /linux/include/net/ |
| H A D | sock.h | 1686 #define sock_lock_init_class_and_name(sk, sname, skey, name, key) \ argument 1695 (skey), (sname)); \
|