Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 63) sorted by relevance

123

/linux-6.6.21/drivers/net/ethernet/chelsio/inline_crypto/chtls/
Dchtls_hw.c118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument
120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid()
184 int keyid; in get_new_keyid() local
190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid()
191 if (keyid < cdev->kmap.size) { in get_new_keyid()
192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid()
194 hws->rxkey = keyid; in get_new_keyid()
196 hws->txkey = keyid; in get_new_keyid()
199 keyid = -1; in get_new_keyid()
202 return keyid; in get_new_keyid()
[all …]
/linux-6.6.21/Documentation/driver-api/nvdimm/
Dsecurity.rst29 disable <keyid> - disable enabled security and remove key.
31 erase <keyid> - delete existing user encryption key.
32 overwrite <keyid> - wipe the entire nvdimm.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
34 master_erase <keyid> - delete existing user encryption key.
74 keyid when doing the update operation. It is also expected that the new key
78 update <old keyid> <new keyid>
80 If there is no old keyid due to a security enabling, then a 0 should be
91 disable <keyid>
99 erase <keyid>
[all …]
/linux-6.6.21/drivers/staging/rtl8712/
Drtl871x_ioctl_set.c332 sint keyid; in r8712_set_802_11_add_wep() local
335 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep()
336 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep()
349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep()
351 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep()
352 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep()
353 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
Drtl871x_mlme.c1147 sint keyid) in r8712_set_key() argument
1170 psetkeyparm->keyid = (u8)keyid; in r8712_set_key()
1176 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key()
1181 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key()
1184 if (keyid < 1 || keyid > 2) { in r8712_set_key()
1190 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
1194 if (keyid < 1 || keyid > 2) { in r8712_set_key()
1200 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
/linux-6.6.21/drivers/staging/rtl8723bs/core/
Drtw_ioctl_set.c427 signed int keyid, res; in rtw_set_802_11_add_wep() local
431 keyid = wep->key_index & 0x3fffffff; in rtw_set_802_11_add_wep()
433 if (keyid >= 4) { in rtw_set_802_11_add_wep()
450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length); in rtw_set_802_11_add_wep()
452 psecuritypriv->dot11DefKeylen[keyid] = wep->key_length; in rtw_set_802_11_add_wep()
454 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep()
456 res = rtw_set_key(padapter, psecuritypriv, keyid, 1, true); in rtw_set_802_11_add_wep()
Drtw_security.c1401 u16 keyid = 0; in rtw_BIP_verify() local
1412 keyid = le16_to_cpu(le_tmp); in rtw_BIP_verify()
1413 if (keyid != padapter->securitypriv.dot11wBIPKeyid) in rtw_BIP_verify()
1555 signed int keyid; in rtw_sec_restore_wep_key() local
1558 for (keyid = 0; keyid < 4; keyid++) { in rtw_sec_restore_wep_key()
1559 if (securitypriv->key_mask & BIT(keyid)) { in rtw_sec_restore_wep_key()
1560 if (keyid == securitypriv->dot11PrivacyKeyIndex) in rtw_sec_restore_wep_key()
1561 rtw_set_key(adapter, securitypriv, keyid, 1, false); in rtw_sec_restore_wep_key()
1563 rtw_set_key(adapter, securitypriv, keyid, 0, false); in rtw_sec_restore_wep_key()
/linux-6.6.21/security/integrity/
Ddigsig_asymmetric.c22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument
27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key()
102 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()
/linux-6.6.21/drivers/nvdimm/
Dsecurity.c248 static int security_disable(struct nvdimm *nvdimm, unsigned int keyid, in security_disable() argument
273 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_disable()
296 static int security_update(struct nvdimm *nvdimm, unsigned int keyid, in security_update() argument
317 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_update()
346 static int security_erase(struct nvdimm *nvdimm, unsigned int keyid, in security_erase() argument
373 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_erase()
390 static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) in security_overwrite() argument
409 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_overwrite()
/linux-6.6.21/drivers/staging/rtl8723bs/include/
Drtw_ap.h25 int rtw_ap_set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid);
26 int rtw_ap_set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid, u8 set_tx);
Drtw_cmd.h276 u8 keyid; member
294 u8 keyid; member
300 u8 keyid; member
/linux-6.6.21/Documentation/security/
Ddigsig.rst42 uint8_t keyid[8];
47 keyid equals to SHA1[12-19] over the total key content.
84 When the key is added to the kernel keyring, the keyid defines the name
/linux-6.6.21/net/mac80211/
Dtkip.c247 u8 rc4key[16], keyid, *pos = payload; in ieee80211_tkip_decrypt_data() local
256 keyid = pos[3]; in ieee80211_tkip_decrypt_data()
260 if (!(keyid & (1 << 5))) in ieee80211_tkip_decrypt_data()
263 if ((keyid >> 6) != key->conf.keyidx) in ieee80211_tkip_decrypt_data()
/linux-6.6.21/drivers/net/ethernet/mellanox/mlx5/core/en/
Dtc_tun_gre.c78 gre_key.key, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_gretap()
80 gre_key.key, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_gretap()
Dtc_tun_vxlan.c176 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_vxlan()
199 be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_vxlan()
201 be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_vxlan()
Dtc_tun_geneve.c140 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_geneve_vni()
149 MLX5_SET(fte_match_set_misc, misc_c, geneve_vni, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_geneve_vni()
150 MLX5_SET(fte_match_set_misc, misc_v, geneve_vni, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_geneve_vni()
/linux-6.6.21/net/core/
Dflow_dissector.c428 struct flow_dissector_key_keyid *keyid; in skb_flow_dissect_tunnel_info() local
430 keyid = skb_flow_dissector_target(flow_dissector, in skb_flow_dissect_tunnel_info()
433 keyid->keyid = tunnel_id_to_key32(key->tun_id); in skb_flow_dissect_tunnel_info()
540 key_keyid->keyid = cpu_to_be32(label); in __skb_flow_dissect_mpls()
669 const __be32 *keyid; in __skb_flow_dissect_gre() local
672 keyid = __skb_header_pointer(skb, *p_nhoff + offset, in __skb_flow_dissect_gre()
675 if (!keyid) in __skb_flow_dissect_gre()
684 key_keyid->keyid = *keyid; in __skb_flow_dissect_gre()
686 key_keyid->keyid = *keyid & GRE_PPTP_KEY_MASK; in __skb_flow_dissect_gre()
1953 keys->keyid.keyid = fl6->fl6_gre_key; in __get_hash_from_flowi6()
[all …]
/linux-6.6.21/security/keys/
Dkeyctl.c644 long keyctl_describe_key(key_serial_t keyid, in keyctl_describe_key() argument
654 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_describe_key()
659 instkey = key_get_instantiation_authkey(keyid); in keyctl_describe_key()
662 key_ref = lookup_user_key(keyid, in keyctl_describe_key()
825 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) in keyctl_read_key() argument
834 key_ref = lookup_user_key(keyid, 0, KEY_DEFER_PERM_CHECK); in keyctl_read_key()
1561 long keyctl_get_security(key_serial_t keyid, in keyctl_get_security() argument
1570 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_get_security()
1577 instkey = key_get_instantiation_authkey(keyid); in keyctl_get_security()
1582 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, in keyctl_get_security()
Ddh.c18 static ssize_t dh_data_from_key(key_serial_t keyid, const void **data) in dh_data_from_key() argument
25 key_ref = lookup_user_key(keyid, 0, KEY_NEED_READ); in dh_data_from_key()
/linux-6.6.21/certs/
Ddefault_x509.genkey17 authorityKeyIdentifier=keyid
/linux-6.6.21/arch/x86/include/asm/
Dintel_pconfig.h43 u16 keyid; member
/linux-6.6.21/drivers/net/ethernet/netronome/nfp/flower/
Dmatch.c462 vni = be32_to_cpu((match.key->keyid & match.mask->keyid)) << in nfp_flower_compile_tun_udp_key()
465 vni = be32_to_cpu(match.mask->keyid) << NFP_FL_TUN_VNI_OFFSET; in nfp_flower_compile_tun_udp_key()
478 *key |= match.key->keyid & match.mask->keyid; in nfp_flower_compile_tun_gre_key()
479 *key_msk |= match.mask->keyid; in nfp_flower_compile_tun_gre_key()
/linux-6.6.21/include/linux/
Ddigsig.h40 uint8_t keyid[8]; member
/linux-6.6.21/include/net/
Dflow_dissector.h104 __be32 keyid; member
399 struct flow_dissector_key_keyid keyid; member
/linux-6.6.21/drivers/net/wireless/ath/ath6kl/
Dcfg80211.h46 void ath6kl_cfg80211_tkip_micerr_event(struct ath6kl_vif *vif, u8 keyid,
/linux-6.6.21/drivers/s390/crypto/
Dzcrypt_ccamisc.c317 struct keyid { in cca_genseckey() struct
321 } keyid[6]; in cca_genseckey() member
378 preqparm->lv2.keyid[i].len = sizeof(struct keyid); in cca_genseckey()
379 preqparm->lv2.keyid[i].attr = (i == 2 ? 0x30 : 0x10); in cca_genseckey()
459 struct keyid { in cca_clr2seckey() struct
463 } keyid; in cca_clr2seckey() member
517 plv2->keyid.len = sizeof(struct keyid); in cca_clr2seckey()
518 plv2->keyid.attr = 0x30; in cca_clr2seckey()

123