/linux/drivers/crypto/tegra/ |
H A D | tegra-se-key.c | 27 u16 keyid; in tegra_keyslot_alloc() local 36 keyid = ffz(tegra_se_keyslots); in tegra_keyslot_alloc() 37 tegra_se_keyslots |= BIT(keyid); in tegra_keyslot_alloc() 41 return keyid; in tegra_keyslot_alloc() 99 static bool tegra_key_in_kslt(u32 keyid) in tegra_key_in_kslt() argument 103 if (keyid > SE_MAX_KEYSLOT) in tegra_key_in_kslt() 107 ret = ((BIT(keyid) & SE_KEY_VALID_MASK) && in tegra_key_in_kslt() 108 (BIT(keyid) & tegra_se_keyslots)); in tegra_key_in_kslt() 131 void tegra_key_invalidate(struct tegra_se *se, u32 keyid, u32 alg) in tegra_key_invalidate() argument 135 if (!keyid) in tegra_key_invalidate() 144 tegra_key_invalidate_reserved(struct tegra_se * se,u32 keyid,u32 alg) tegra_key_invalidate_reserved() argument 156 tegra_key_submit_reserved(struct tegra_se * se,const u8 * key,u32 keylen,u32 alg,u32 * keyid) tegra_key_submit_reserved() argument 161 tegra_key_submit(struct tegra_se * se,const u8 * key,u32 keylen,u32 alg,u32 * keyid) tegra_key_submit() argument [all...] |
H A D | tegra-se.h | 507 u32 keylen, u32 alg, u32 *keyid); 510 u32 keylen, u32 alg, u32 *keyid); 512 void tegra_key_invalidate(struct tegra_se *se, u32 keyid, u32 alg); 513 void tegra_key_invalidate_reserved(struct tegra_se *se, u32 keyid, u32 alg); 517 u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit_reserved_aes() argument 519 *keyid = TEGRA_AES_RESERVED_KSLT; in tegra_key_submit_reserved_aes() 520 return tegra_key_submit_reserved(se, key, keylen, alg, keyid); in tegra_key_submit_reserved_aes() 524 u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit_reserved_xts() argument 526 *keyid = TEGRA_XTS_RESERVED_KSLT; in tegra_key_submit_reserved_xts() 527 return tegra_key_submit_reserved(se, key, keylen, alg, keyid); in tegra_key_submit_reserved_xts() 530 tegra_key_is_reserved(u32 keyid) tegra_key_is_reserved() argument [all...] |
/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 109 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument 111 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid() 175 int keyid; in get_new_keyid() local 181 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid() 182 if (keyid < cdev->kmap.size) { in get_new_keyid() 183 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid() 185 hws->rxkey = keyid; in get_new_keyid() 187 hws->txkey = keyid; in get_new_keyid() 190 keyid = -1; in get_new_keyid() 193 return keyid; in get_new_keyid() 224 keyid_to_addr(int start_addr,int keyid) keyid_to_addr() argument 357 int keyid; chtls_setkey() local [all...] |
/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 29 disable <keyid> - disable enabled security and remove key. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. 74 keyid when doing the update operation. It is also expected that the new key 78 update <old keyid> <new keyid> 80 If there is no old keyid due to a security enabling, then a 0 should be 91 disable <keyid> [all...] |
/linux/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | ftrace-tcp.c | 44 int keyid; member 61 int keyid, int rnext, int maclen, int sne) in __trace_event_expect() argument 76 .keyid = keyid, in __trace_event_expect() 131 unsigned int keyid; member 177 if (p->keyid >= 0 && p->keyid != e->keyid) in lookup_expected_event() 317 nr_matched = sscanf(line, "%*s net=%" PRIu64 " state%*s family=%ms src=%ms dest=%ms L3index=%d [%c%c%c%c%c] keyid=%u rnext=%u maclen=%u", in tracer_scan_event() 321 &out->keyid, in tracer_scan_event() [all...] |
H A D | aolib.h | 768 int keyid, int rnext, int maclen, int sne); 789 int keyid, int rnext, int maclen) in trace_ao_event_expect() argument 796 keyid, rnext, maclen, -1); in trace_ao_event_expect() 804 int keyid, int rnext) in trace_ao_event_sk_expect() argument 811 keyid, rnext, -1, -1); in trace_ao_event_sk_expect()
|
/linux/Documentation/translations/zh_CN/security/ |
H A D | digsig.rst | 49 uint8_t keyid[8];
|
/linux/drivers/staging/rtl8723bs/core/ |
H A D | rtw_ioctl_set.c | 426 signed int keyid, res; in rtw_set_802_11_add_wep() local 430 keyid = wep->key_index & 0x3fffffff; in rtw_set_802_11_add_wep() 432 if (keyid >= 4) { in rtw_set_802_11_add_wep() 449 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length); in rtw_set_802_11_add_wep() 451 psecuritypriv->dot11DefKeylen[keyid] = wep->key_length; in rtw_set_802_11_add_wep() 453 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep() 455 res = rtw_set_key(padapter, psecuritypriv, keyid, 1, true); in rtw_set_802_11_add_wep()
|
/linux/security/integrity/ |
H A D | digsig_asymmetric.c | 22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument 27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key() 102 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()
|
/linux/drivers/nvdimm/ |
H A D | security.c | 248 static int security_disable(struct nvdimm *nvdimm, unsigned int keyid, in security_disable() argument 273 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_disable() 296 static int security_update(struct nvdimm *nvdimm, unsigned int keyid, in security_update() argument 317 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_update() 346 static int security_erase(struct nvdimm *nvdimm, unsigned int keyid, in security_erase() argument 373 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_erase() 390 static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) in security_overwrite() argument 409 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_overwrite()
|
/linux/drivers/staging/rtl8723bs/include/ |
H A D | rtw_ap.h | 25 int rtw_ap_set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid); 26 int rtw_ap_set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid, u8 set_tx);
|
/linux/Documentation/security/ |
H A D | digsig.rst | 42 uint8_t keyid[8]; 47 keyid equals to SHA1[12-19] over the total key content. 84 When the key is added to the kernel keyring, the keyid defines the name
|
/linux/net/mac80211/ |
H A D | tkip.c | 247 u8 rc4key[16], keyid, *pos = payload; in ieee80211_tkip_decrypt_data() local 256 keyid = pos[3]; in ieee80211_tkip_decrypt_data() 260 if (!(keyid & (1 << 5))) in ieee80211_tkip_decrypt_data() 263 if ((keyid >> 6) != key->conf.keyidx) in ieee80211_tkip_decrypt_data()
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_tun_gre.c | 82 gre_key.key, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_gretap() 84 gre_key.key, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_gretap()
|
H A D | tc_tun_geneve.c | 141 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_geneve_vni() 150 MLX5_SET(fte_match_set_misc, misc_c, geneve_vni, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_geneve_vni() 151 MLX5_SET(fte_match_set_misc, misc_v, geneve_vni, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_geneve_vni()
|
/linux/net/core/ |
H A D | flow_dissector.c | 444 struct flow_dissector_key_keyid *keyid; in skb_flow_dissect_tunnel_info() local 446 keyid = skb_flow_dissector_target(flow_dissector, in skb_flow_dissect_tunnel_info() 449 keyid->keyid = tunnel_id_to_key32(key->tun_id); in skb_flow_dissect_tunnel_info() 564 key_keyid->keyid = cpu_to_be32(label); in __skb_flow_dissect_mpls() 693 const __be32 *keyid; in __skb_flow_dissect_gre() local 696 keyid = __skb_header_pointer(skb, *p_nhoff + offset, in __skb_flow_dissect_gre() 699 if (!keyid) in __skb_flow_dissect_gre() 708 key_keyid->keyid = *keyid; in __skb_flow_dissect_gre() [all...] |
/linux/security/keys/ |
H A D | keyctl.c | 644 long keyctl_describe_key(key_serial_t keyid, in keyctl_describe_key() argument 654 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_describe_key() 659 instkey = key_get_instantiation_authkey(keyid); in keyctl_describe_key() 662 key_ref = lookup_user_key(keyid, in keyctl_describe_key() 825 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) in keyctl_read_key() argument 834 key_ref = lookup_user_key(keyid, 0, KEY_DEFER_PERM_CHECK); in keyctl_read_key() 1561 long keyctl_get_security(key_serial_t keyid, in keyctl_get_security() argument 1570 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_get_security() 1577 instkey = key_get_instantiation_authkey(keyid); in keyctl_get_security() 1582 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIA in keyctl_get_security() [all...] |
H A D | dh.c | 18 static ssize_t dh_data_from_key(key_serial_t keyid, const void **data) in dh_data_from_key() argument 25 key_ref = lookup_user_key(keyid, 0, KEY_NEED_READ); in dh_data_from_key()
|
/linux/certs/ |
H A D | default_x509.genkey | 17 authorityKeyIdentifier=keyid
|
/linux/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | match.c | 462 vni = be32_to_cpu((match.key->keyid & match.mask->keyid)) << in nfp_flower_compile_tun_udp_key() 465 vni = be32_to_cpu(match.mask->keyid) << NFP_FL_TUN_VNI_OFFSET; in nfp_flower_compile_tun_udp_key() 478 *key |= match.key->keyid & match.mask->keyid; in nfp_flower_compile_tun_gre_key() 479 *key_msk |= match.mask->keyid; in nfp_flower_compile_tun_gre_key()
|
/linux/include/linux/ |
H A D | digsig.h | 40 uint8_t keyid[8]; member
|
/linux/drivers/nvme/target/ |
H A D | debugfs.c | 139 key_serial_t keyid = nvmet_queue_tls_keyid(ctrl->sqs[0]); in nvmet_ctrl_tls_key_show() local 141 seq_printf(m, "%08x\n", keyid); in nvmet_ctrl_tls_key_show()
|
/linux/include/net/ |
H A D | flow_dissector.h | 117 __be32 keyid; member 412 struct flow_dissector_key_keyid keyid; member
|
/linux/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.c | 341 struct keyid { in cca_genseckey() struct 345 } keyid[6]; in cca_genseckey() member 403 preqparm->lv2.keyid[i].len = sizeof(struct keyid); in cca_genseckey() 404 preqparm->lv2.keyid[i].attr = (i == 2 ? 0x30 : 0x10); in cca_genseckey() 484 struct keyid { in cca_clr2seckey() struct 488 } keyid; in cca_clr2seckey() member 543 plv2->keyid.len = sizeof(struct keyid); in cca_clr2seckey() 544 plv2->keyid in cca_clr2seckey() 342 lencca_genseckey::kgreqparm::lv2::keyid cca_genseckey() argument 343 attrcca_genseckey::kgreqparm::lv2::keyid cca_genseckey() argument 344 datacca_genseckey::kgreqparm::lv2::keyid cca_genseckey() argument 485 lencca_clr2seckey::lv2::keyid cca_clr2seckey() argument 486 attrcca_clr2seckey::lv2::keyid cca_clr2seckey() argument 487 datacca_clr2seckey::lv2::keyid cca_clr2seckey() argument [all...] |
/linux/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.h | 46 void ath6kl_cfg80211_tkip_micerr_event(struct ath6kl_vif *vif, u8 keyid,
|