/linux-master/arch/powerpc/include/asm/ |
H A D | kvm_book3s_64.h | 468 unsigned long skey; local 470 skey = ((hpte_r & HPTE_R_KEY_HI) >> 57) | 472 return (amr >> (62 - 2 * skey)) & 3;
|
/linux-master/arch/s390/include/asm/ |
H A D | page.h | 129 unsigned char skey, int mapped) 133 : : "d" (skey), "a" (addr)); 135 asm volatile("sske %0,%1" : : "d" (skey), "a" (addr)); 140 unsigned char skey; local 142 asm volatile("iske %0,%1" : "=d" (skey) : "a" (addr)); 143 return skey; 128 page_set_storage_key(unsigned long addr, unsigned char skey, int mapped) argument
|
H A D | sclp.h | 43 u8 skey : 1; member in struct:sclp_core_entry
|
/linux-master/arch/s390/mm/ |
H A D | pageattr.c | 17 static inline unsigned long sske_frame(unsigned long addr, unsigned char skey) argument 19 asm volatile(".insn rrf,0xb22b0000,%[skey],%[addr],1,0" 20 : [addr] "+a" (addr) : [skey] "d" (skey));
|
H A D | pgtable.c | 168 unsigned long address, bits, skey; local 173 skey = (unsigned long) page_get_storage_key(address); 174 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED); 179 pgste_val(pgste) |= (skey & (_PAGE_ACC_BITS | _PAGE_FP_BIT)) << 56; 853 unsigned long bits, skey; local 856 skey = (unsigned long) page_get_storage_key(paddr); 857 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED); 858 skey = key & (_PAGE_ACC_BITS | _PAGE_FP_BIT); 860 page_set_storage_key(paddr, skey, !nq);
|
/linux-master/drivers/message/fusion/ |
H A D | mptscsih.c | 439 u8 skey, asc, ascq; local 552 skey = sc->sense_buffer[2] & 0x0F; 557 "[0x%02x,0x%02x,0x%02x]\n", ioc->name, skey, asc, ascq);
|
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/esw/ |
H A D | vporttbl.c | 69 esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key) argument 74 if (!memcmp(&e->key, skey, sizeof(*skey))) 87 struct mlx5_vport_key skey; local 92 hkey = flow_attr_to_vport_key(esw, attr, &skey); 93 e = esw_vport_tbl_lookup(esw, &skey, hkey); 118 e->key = skey;
|
/linux-master/drivers/nvme/common/ |
H A D | auth.c | 315 static int nvme_auth_hash_skey(int hmac_id, u8 *skey, size_t skey_len, u8 *hkey) argument 331 ret = crypto_shash_tfm_digest(tfm, skey, skey_len, hkey); 340 int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, argument 352 ret = nvme_auth_hash_skey(hmac_id, skey,
|
/linux-master/drivers/s390/char/ |
H A D | sclp_early.c | 95 sclp.has_skey = cpue->skey;
|
/linux-master/drivers/scsi/mpt3sas/ |
H A D | mpt3sas_scsih.c | 184 * @skey: sense key 189 u8 skey; member in struct:sense_info 5289 * @data: normalized skey/asc/ascq 5296 data->skey = sense_buffer[1] & 0x0F; 5301 data->skey = sense_buffer[2] & 0x0F; 5509 data.skey, data.asc, data.ascq, 5803 mpt3sas_trigger_scsi(ioc, data.skey, data.asc, data.ascq);
|
/linux-master/drivers/staging/rtl8712/ |
H A D | rtl871x_cmd.c | 532 skey, 16);
|
H A D | rtl871x_ioctl_linux.c | 80 memcpy(psta->x_UncstKey.skey, param->u.crypt.key, 83 memcpy(psta->tkiptxmickey. skey, 85 memcpy(psta->tkiprxmickey. skey, 104 memcpy(gk[param->u.crypt.idx - 1].skey, 108 memcpy(gtk[param->u.crypt.idx - 1].skey, 110 memcpy(grk[param->u.crypt.idx - 1].skey, 408 memcpy(&psecuritypriv->DefKey[wep_key_idx].skey[0], 1566 memcpy(keybuf, dk[key].skey,
|
H A D | rtl871x_ioctl_set.c | 349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial,
|
H A D | rtl871x_mlme.c | 1176 psecuritypriv->DefKey[keyid].skey, keylen); 1181 psecuritypriv->DefKey[keyid].skey, keylen);
|
H A D | rtl871x_recv.c | 157 6) & 0x3)) - 1].skey[0]; 161 mickey = &stainfo->tkiprxmickey.skey[0];
|
H A D | rtl871x_security.c | 175 psecuritypriv->PrivacyKeyIndex].skey[0], 230 psecuritypriv->PrivacyKeyIndex].skey[0], 587 prwskey = &stainfo->x_UncstKey.skey[0]; 670 ((idx >> 6) & 0x3) - 1].skey[0]; 674 prwskey = &stainfo->x_UncstKey.skey[0]; 1158 prwskey = &stainfo->x_UncstKey.skey[0]; 1364 ((idx >> 6) & 0x3) - 1].skey[0]; 1369 prwskey = &stainfo->x_UncstKey.skey[0];
|
H A D | rtl871x_security.h | 66 u8 skey[16]; member in union:Keytype
|
H A D | rtl871x_xmit.c | 396 [psecpriv->XGrpKeyid].skey, 402 [psecpriv->XGrpKeyid].skey); 404 if (!memcmp(&stainfo->tkiptxmickey.skey[0], 409 &stainfo->tkiptxmickey.skey[0]);
|
/linux-master/drivers/staging/rtl8723bs/core/ |
H A D | rtw_cmd.c | 890 memcpy(&psetstakey_para->key, &psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey, 16);
|
H A D | rtw_ioctl_set.c | 450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length);
|
H A D | rtw_mlme.c | 1942 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); 1946 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen);
|
H A D | rtw_recv.c | 321 /* mickey =&psecuritypriv->dot118021XGrprxmickey.skey[0]; */ 324 mickey = &psecuritypriv->dot118021XGrprxmickey[prxattrib->key_index].skey[0]; 333 mickey = &stainfo->dot11tkiprxmickey.skey[0];
|
H A D | rtw_security.c | 67 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); 115 /* memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); */ 116 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); 490 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; 492 prwskey = pattrib->dot118021x_UncstKey.skey; 599 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey; 601 prwskey = &stainfo->dot118021x_UncstKey.skey[0]; 1055 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; 1057 prwskey = pattrib->dot118021x_UncstKey.skey; 1351 prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey; [all...] |
H A D | rtw_xmit.c | 478 memset(pattrib->dot118021x_UncstKey.skey, 0, 16); 479 memset(pattrib->dot11tkiptxmickey.skey, 0, 16); 536 memcpy(pattrib->dot11tkiptxmickey.skey, psta->dot11tkiptxmickey.skey, 16); 559 memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16); 780 if (!memcmp(psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey, null_key, 16)) 783 rtw_secmicsetkey(&micdata, psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey); 785 if (!memcmp(&pattrib->dot11tkiptxmickey.skey[0], null_key, 16)) 788 rtw_secmicsetkey(&micdata, &pattrib->dot11tkiptxmickey.skey[ [all...] |
/linux-master/drivers/staging/rtl8723bs/include/ |
H A D | rtw_security.h | 83 u8 skey[16]; member in union:Keytype
|