Searched refs:skey (Results 1 - 25 of 33) sorted by relevance

12

/linux-master/drivers/net/ethernet/mellanox/mlx5/core/esw/
H A Dvporttbl.c69 esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key) argument
74 if (!memcmp(&e->key, skey, sizeof(*skey)))
87 struct mlx5_vport_key skey; local
92 hkey = flow_attr_to_vport_key(esw, attr, &skey);
93 e = esw_vport_tbl_lookup(esw, &skey, hkey);
118 e->key = skey;
/linux-master/arch/s390/include/asm/
H A Dpage.h129 unsigned char skey, int mapped)
133 : : "d" (skey), "a" (addr));
135 asm volatile("sske %0,%1" : : "d" (skey), "a" (addr));
140 unsigned char skey; local
142 asm volatile("iske %0,%1" : "=d" (skey) : "a" (addr));
143 return skey;
128 page_set_storage_key(unsigned long addr, unsigned char skey, int mapped) argument
H A Dsclp.h43 u8 skey : 1; member in struct:sclp_core_entry
/linux-master/include/linux/
H A Dnvme-auth.h35 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len,
H A Dsysfs.h36 struct lock_class_key skey; member in struct:attribute
/linux-master/net/tipc/
H A Dcrypto.c186 * @skey: received session key
211 struct tipc_aead_key *skey; member in struct:tipc_crypto
303 static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey,
308 static int tipc_aead_key_generate(struct tipc_aead_key *skey);
364 * @skey: input/output key with new content
368 static int tipc_aead_key_generate(struct tipc_aead_key *skey) argument
375 rc = crypto_rng_get_bytes(crypto_default_rng, skey->key,
376 skey->keylen);
1213 kfree(rx->skey);
1214 rx->skey
2229 tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey, u16 gen, u8 mode, u32 dnode) argument
2281 struct tipc_aead_key *skey = NULL; local
2439 struct tipc_aead_key *skey = NULL; local
[all...]
/linux-master/drivers/staging/rtl8723bs/os_dep/
H A Dioctl_linux.c128 memcpy(&psecuritypriv->dot11DefKey[wep_key_idx].skey[0], pwep->key_material, pwep->key_length);
155 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
159 memcpy(psta->dot11tkiptxmickey.skey, &param->u.crypt.key[16], 8);
160 memcpy(psta->dot11tkiprxmickey.skey, &param->u.crypt.key[24], 8);
169 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
172 memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &param->u.crypt.key[16], 8);
173 memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &param->u.crypt.key[24], 8);
183 memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
186 printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
523 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey;
[all...]
H A Dioctl_cfg80211.c503 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey;
504 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey;
505 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey;
560 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
621 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
632 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
633 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
759 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
786 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
790 memcpy(psta->dot11tkiptxmickey.skey,
[all...]
/linux-master/drivers/nvme/common/
H A Dauth.c315 static int nvme_auth_hash_skey(int hmac_id, u8 *skey, size_t skey_len, u8 *hkey) argument
331 ret = crypto_shash_tfm_digest(tfm, skey, skey_len, hkey);
340 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, argument
352 ret = nvme_auth_hash_skey(hmac_id, skey,
/linux-master/arch/s390/mm/
H A Dpgtable.c168 unsigned long address, bits, skey; local
173 skey = (unsigned long) page_get_storage_key(address);
174 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED);
179 pgste_val(pgste) |= (skey & (_PAGE_ACC_BITS | _PAGE_FP_BIT)) << 56;
853 unsigned long bits, skey; local
856 skey = (unsigned long) page_get_storage_key(paddr);
857 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED);
858 skey = key & (_PAGE_ACC_BITS | _PAGE_FP_BIT);
860 page_set_storage_key(paddr, skey, !nq);
H A Dpageattr.c17 static inline unsigned long sske_frame(unsigned long addr, unsigned char skey) argument
19 asm volatile(".insn rrf,0xb22b0000,%[skey],%[addr],1,0"
20 : [addr] "+a" (addr) : [skey] "d" (skey));
/linux-master/arch/powerpc/include/asm/
H A Dkvm_book3s_64.h468 unsigned long skey; local
470 skey = ((hpte_r & HPTE_R_KEY_HI) >> 57) |
472 return (amr >> (62 - 2 * skey)) & 3;
/linux-master/drivers/staging/rtl8712/
H A Drtl871x_security.h66 u8 skey[16]; member in union:Keytype
H A Drtl871x_security.c175 psecuritypriv->PrivacyKeyIndex].skey[0],
230 psecuritypriv->PrivacyKeyIndex].skey[0],
587 prwskey = &stainfo->x_UncstKey.skey[0];
670 ((idx >> 6) & 0x3) - 1].skey[0];
674 prwskey = &stainfo->x_UncstKey.skey[0];
1158 prwskey = &stainfo->x_UncstKey.skey[0];
1364 ((idx >> 6) & 0x3) - 1].skey[0];
1369 prwskey = &stainfo->x_UncstKey.skey[0];
H A Drtl871x_xmit.c396 [psecpriv->XGrpKeyid].skey,
402 [psecpriv->XGrpKeyid].skey);
404 if (!memcmp(&stainfo->tkiptxmickey.skey[0],
409 &stainfo->tkiptxmickey.skey[0]);
H A Drtl871x_ioctl_linux.c80 memcpy(psta->x_UncstKey.skey, param->u.crypt.key,
83 memcpy(psta->tkiptxmickey. skey,
85 memcpy(psta->tkiprxmickey. skey,
104 memcpy(gk[param->u.crypt.idx - 1].skey,
108 memcpy(gtk[param->u.crypt.idx - 1].skey,
110 memcpy(grk[param->u.crypt.idx - 1].skey,
408 memcpy(&psecuritypriv->DefKey[wep_key_idx].skey[0],
1566 memcpy(keybuf, dk[key].skey,
H A Drtl871x_ioctl_set.c349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial,
H A Drtl871x_recv.c157 6) & 0x3)) - 1].skey[0];
161 mickey = &stainfo->tkiprxmickey.skey[0];
/linux-master/drivers/staging/rtl8723bs/core/
H A Drtw_security.c67 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength);
115 /* memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); */
116 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength);
490 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey;
492 prwskey = pattrib->dot118021x_UncstKey.skey;
599 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey;
601 prwskey = &stainfo->dot118021x_UncstKey.skey[0];
1055 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey;
1057 prwskey = pattrib->dot118021x_UncstKey.skey;
1351 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey;
[all...]
H A Drtw_xmit.c478 memset(pattrib->dot118021x_UncstKey.skey, 0, 16);
479 memset(pattrib->dot11tkiptxmickey.skey, 0, 16);
536 memcpy(pattrib->dot11tkiptxmickey.skey, psta->dot11tkiptxmickey.skey, 16);
559 memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16);
780 if (!memcmp(psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey, null_key, 16))
783 rtw_secmicsetkey(&micdata, psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey);
785 if (!memcmp(&pattrib->dot11tkiptxmickey.skey[0], null_key, 16))
788 rtw_secmicsetkey(&micdata, &pattrib->dot11tkiptxmickey.skey[
[all...]
H A Drtw_ioctl_set.c450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length);
/linux-master/drivers/staging/rtl8723bs/include/
H A Drtw_security.h83 u8 skey[16]; member in union:Keytype
/linux-master/drivers/s390/char/
H A Dsclp_early.c95 sclp.has_skey = cpue->skey;
/linux-master/fs/sysfs/
H A Dfile.c304 key = attr->key ?: (struct lock_class_key *)&attr->skey;
339 key = attr->key ?: (struct lock_class_key *)&attr->skey;
/linux-master/net/mac802154/
H A Dllsec.c362 u32 skey = llsec_dev_hash_short(dev->short_addr, dev->pan_id); local
381 hash_add_rcu(sec->devices_short, &entry->bucket_s, skey);

Completed in 499 milliseconds

12