/linux-master/drivers/net/ethernet/mellanox/mlx5/core/esw/ |
H A D | vporttbl.c | 69 esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key) argument 74 if (!memcmp(&e->key, skey, sizeof(*skey))) 87 struct mlx5_vport_key skey; local 92 hkey = flow_attr_to_vport_key(esw, attr, &skey); 93 e = esw_vport_tbl_lookup(esw, &skey, hkey); 118 e->key = skey;
|
/linux-master/arch/s390/include/asm/ |
H A D | page.h | 129 unsigned char skey, int mapped) 133 : : "d" (skey), "a" (addr)); 135 asm volatile("sske %0,%1" : : "d" (skey), "a" (addr)); 140 unsigned char skey; local 142 asm volatile("iske %0,%1" : "=d" (skey) : "a" (addr)); 143 return skey; 128 page_set_storage_key(unsigned long addr, unsigned char skey, int mapped) argument
|
H A D | sclp.h | 43 u8 skey : 1; member in struct:sclp_core_entry
|
/linux-master/include/linux/ |
H A D | nvme-auth.h | 35 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len,
|
H A D | sysfs.h | 36 struct lock_class_key skey; member in struct:attribute
|
/linux-master/net/tipc/ |
H A D | crypto.c | 186 * @skey: received session key 211 struct tipc_aead_key *skey; member in struct:tipc_crypto 303 static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey, 308 static int tipc_aead_key_generate(struct tipc_aead_key *skey); 364 * @skey: input/output key with new content 368 static int tipc_aead_key_generate(struct tipc_aead_key *skey) argument 375 rc = crypto_rng_get_bytes(crypto_default_rng, skey->key, 376 skey->keylen); 1213 kfree(rx->skey); 1214 rx->skey 2229 tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey, u16 gen, u8 mode, u32 dnode) argument 2281 struct tipc_aead_key *skey = NULL; local 2439 struct tipc_aead_key *skey = NULL; local [all...] |
/linux-master/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_linux.c | 128 memcpy(&psecuritypriv->dot11DefKey[wep_key_idx].skey[0], pwep->key_material, pwep->key_length); 155 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 159 memcpy(psta->dot11tkiptxmickey.skey, ¶m->u.crypt.key[16], 8); 160 memcpy(psta->dot11tkiprxmickey.skey, ¶m->u.crypt.key[24], 8); 169 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 172 memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, ¶m->u.crypt.key[16], 8); 173 memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, ¶m->u.crypt.key[24], 8); 183 memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 186 printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]); 523 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; [all...] |
H A D | ioctl_cfg80211.c | 503 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey; 504 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; 505 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; 560 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); 621 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 632 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); 633 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); 759 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); 786 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 790 memcpy(psta->dot11tkiptxmickey.skey, [all...] |
/linux-master/drivers/nvme/common/ |
H A D | auth.c | 315 static int nvme_auth_hash_skey(int hmac_id, u8 *skey, size_t skey_len, u8 *hkey) argument 331 ret = crypto_shash_tfm_digest(tfm, skey, skey_len, hkey); 340 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, argument 352 ret = nvme_auth_hash_skey(hmac_id, skey,
|
/linux-master/arch/s390/mm/ |
H A D | pgtable.c | 168 unsigned long address, bits, skey; local 173 skey = (unsigned long) page_get_storage_key(address); 174 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED); 179 pgste_val(pgste) |= (skey & (_PAGE_ACC_BITS | _PAGE_FP_BIT)) << 56; 853 unsigned long bits, skey; local 856 skey = (unsigned long) page_get_storage_key(paddr); 857 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED); 858 skey = key & (_PAGE_ACC_BITS | _PAGE_FP_BIT); 860 page_set_storage_key(paddr, skey, !nq);
|
H A D | pageattr.c | 17 static inline unsigned long sske_frame(unsigned long addr, unsigned char skey) argument 19 asm volatile(".insn rrf,0xb22b0000,%[skey],%[addr],1,0" 20 : [addr] "+a" (addr) : [skey] "d" (skey));
|
/linux-master/arch/powerpc/include/asm/ |
H A D | kvm_book3s_64.h | 468 unsigned long skey; local 470 skey = ((hpte_r & HPTE_R_KEY_HI) >> 57) | 472 return (amr >> (62 - 2 * skey)) & 3;
|
/linux-master/drivers/staging/rtl8712/ |
H A D | rtl871x_security.h | 66 u8 skey[16]; member in union:Keytype
|
H A D | rtl871x_security.c | 175 psecuritypriv->PrivacyKeyIndex].skey[0], 230 psecuritypriv->PrivacyKeyIndex].skey[0], 587 prwskey = &stainfo->x_UncstKey.skey[0]; 670 ((idx >> 6) & 0x3) - 1].skey[0]; 674 prwskey = &stainfo->x_UncstKey.skey[0]; 1158 prwskey = &stainfo->x_UncstKey.skey[0]; 1364 ((idx >> 6) & 0x3) - 1].skey[0]; 1369 prwskey = &stainfo->x_UncstKey.skey[0];
|
H A D | rtl871x_xmit.c | 396 [psecpriv->XGrpKeyid].skey, 402 [psecpriv->XGrpKeyid].skey); 404 if (!memcmp(&stainfo->tkiptxmickey.skey[0], 409 &stainfo->tkiptxmickey.skey[0]);
|
H A D | rtl871x_ioctl_linux.c | 80 memcpy(psta->x_UncstKey.skey, param->u.crypt.key, 83 memcpy(psta->tkiptxmickey. skey, 85 memcpy(psta->tkiprxmickey. skey, 104 memcpy(gk[param->u.crypt.idx - 1].skey, 108 memcpy(gtk[param->u.crypt.idx - 1].skey, 110 memcpy(grk[param->u.crypt.idx - 1].skey, 408 memcpy(&psecuritypriv->DefKey[wep_key_idx].skey[0], 1566 memcpy(keybuf, dk[key].skey,
|
H A D | rtl871x_ioctl_set.c | 349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial,
|
H A D | rtl871x_recv.c | 157 6) & 0x3)) - 1].skey[0]; 161 mickey = &stainfo->tkiprxmickey.skey[0];
|
/linux-master/drivers/staging/rtl8723bs/core/ |
H A D | rtw_security.c | 67 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); 115 /* memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); */ 116 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); 490 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; 492 prwskey = pattrib->dot118021x_UncstKey.skey; 599 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey; 601 prwskey = &stainfo->dot118021x_UncstKey.skey[0]; 1055 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; 1057 prwskey = pattrib->dot118021x_UncstKey.skey; 1351 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey; [all...] |
H A D | rtw_xmit.c | 478 memset(pattrib->dot118021x_UncstKey.skey, 0, 16); 479 memset(pattrib->dot11tkiptxmickey.skey, 0, 16); 536 memcpy(pattrib->dot11tkiptxmickey.skey, psta->dot11tkiptxmickey.skey, 16); 559 memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16); 780 if (!memcmp(psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey, null_key, 16)) 783 rtw_secmicsetkey(&micdata, psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey); 785 if (!memcmp(&pattrib->dot11tkiptxmickey.skey[0], null_key, 16)) 788 rtw_secmicsetkey(&micdata, &pattrib->dot11tkiptxmickey.skey[ [all...] |
H A D | rtw_ioctl_set.c | 450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length);
|
/linux-master/drivers/staging/rtl8723bs/include/ |
H A D | rtw_security.h | 83 u8 skey[16]; member in union:Keytype
|
/linux-master/drivers/s390/char/ |
H A D | sclp_early.c | 95 sclp.has_skey = cpue->skey;
|
/linux-master/fs/sysfs/ |
H A D | file.c | 304 key = attr->key ?: (struct lock_class_key *)&attr->skey; 339 key = attr->key ?: (struct lock_class_key *)&attr->skey;
|
/linux-master/net/mac802154/ |
H A D | llsec.c | 362 u32 skey = llsec_dev_hash_short(dev->short_addr, dev->pan_id); local 381 hash_add_rcu(sec->devices_short, &entry->bucket_s, skey);
|