/Linux-v6.6/drivers/s390/crypto/ |
D | zcrypt_ep11misc.c | 1079 const u8 *kek, size_t keksize, in _ep11_unwrapkey() argument 1162 p += asn1tag_write(p, 0x04, kek, keksize); in _ep11_unwrapkey() 1224 const u8 *kek, size_t keksize, in ep11_unwrapkey() argument 1241 rc = _ep11_unwrapkey(card, domain, kek, keksize, enckey, enckeysize, in ep11_unwrapkey() 1383 u8 encbuf[64], *kek = NULL; in ep11_clr2keyblob() local 1397 kek = kmalloc(keklen, GFP_ATOMIC); in ep11_clr2keyblob() 1398 if (!kek) { in ep11_clr2keyblob() 1406 kek, &keklen); in ep11_clr2keyblob() 1415 rc = ep11_cryptsingle(card, domain, 0, 0, def_iv, kek, keklen, in ep11_clr2keyblob() 1425 rc = ep11_unwrapkey(card, domain, kek, keklen, in ep11_clr2keyblob() [all …]
|
/Linux-v6.6/drivers/net/wireless/intel/iwlwifi/fw/api/ |
D | d3.h | 483 u8 kek[IWL_KEK_MAX_SIZE]; member 491 u8 kek[IWL_KEK_MAX_SIZE]; member 504 u8 kek[IWL_KEK_MAX_SIZE]; member
|
/Linux-v6.6/drivers/crypto/caam/ |
D | debugfs.c | 84 ctrlpriv->ctl_kek_wrap.data = (__force void *)&ctrlpriv->ctrl->kek[0]; in caam_debugfs_init()
|
D | regs.h | 596 u32 kek[KEK_KEY_SIZE]; /* JDKEKR - Key Encryption Key */ member
|
/Linux-v6.6/net/wireless/ |
D | sme.c | 1032 ev->cr.fils.kek = next; in cfg80211_connect_done() 1034 memcpy((void *)ev->cr.fils.kek, params->fils.kek, in cfg80211_connect_done() 1235 ev->rm.fils.kek = next; in cfg80211_roamed() 1237 memcpy((void *)ev->rm.fils.kek, info->fils.kek, in cfg80211_roamed()
|
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
D | fw.h | 233 u8 kek[16]; member
|
/Linux-v6.6/drivers/net/wireless/ath/wcn36xx/ |
D | wcn36xx.h | 148 u8 kck[NL80211_KCK_LEN], kek[NL80211_KEK_LEN]; member
|
D | main.c | 1165 memcpy(vif_priv->rekey_data.kek, data->kek, NL80211_KEK_LEN); in wcn36xx_set_rekey_data()
|
D | smd.c | 3063 memcpy(&msg_body.kek, vif_priv->rekey_data.kek, NL80211_KEK_LEN); in wcn36xx_smd_gtk_offload()
|
D | hal.h | 4888 u8 kek[WCN36XX_HAL_GTK_KEK_BYTES]; member
|
/Linux-v6.6/drivers/platform/x86/hp/hp-bioscfg/ |
D | spmobj-attributes.c | 291 static struct kobj_attribute password_spm_endorsement_key = __ATTR_WO(kek);
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | sysfs-class-firmware-attributes | 326 It requires configuring an endorsement (kek) and signing certificate (sk). 401 What: /sys/class/firmware-attributes/*/authentication/SPM/kek 406 'kek' Key-Encryption-Key is a write-only file that can be used to configure the
|
/Linux-v6.6/drivers/net/wireless/intel/iwlwifi/dvm/ |
D | lib.c | 1182 memcpy(kek_kck_cmd.kek, priv->kek, NL80211_KEK_LEN); in iwlagn_suspend()
|
D | dev.h | 873 u8 kck[NL80211_KCK_LEN], kek[NL80211_KEK_LEN]; member
|
D | mac80211.c | 342 memcpy(priv->kek, data->kek, NL80211_KEK_LEN); in iwlagn_mac_set_rekey_data()
|
D | commands.h | 3811 u8 kek[IWLAGN_KEK_MAX_SIZE]; member
|
/Linux-v6.6/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
D | fwil_types.h | 1151 u8 kek[BRCMF_RSN_KEK_LENGTH]; member
|
/Linux-v6.6/drivers/net/wireless/intel/iwlwifi/mvm/ |
D | d3.c | 30 memcpy(mvmvif->rekey_data.kek, data->kek, data->kek_len); in iwl_mvm_set_rekey_data() 1077 memcpy(kek_kck_cmd.kek, mvmvif->rekey_data.kek, in iwl_mvm_wowlan_config_key_params()
|
/Linux-v6.6/net/mac80211/ |
D | trace.h | 1412 __array(u8, kek, NL80211_KEK_LEN) 1420 memcpy(__entry->kek, data->kek, NL80211_KEK_LEN);
|
/Linux-v6.6/drivers/net/wireless/ath/ath11k/ |
D | core.h | 309 u8 kek[NL80211_KCK_LEN]; member
|
/Linux-v6.6/include/net/ |
D | cfg80211.h | 827 const u8 *kek; member 3472 const u8 *kek, *kck, *replay_ctr; member 7701 const u8 *kek; member
|
/Linux-v6.6/drivers/net/wireless/marvell/mwifiex/ |
D | sta_cmd.c | 1591 memcpy(rekey->kek, data->kek, NL80211_KEK_LEN); in mwifiex_cmd_gtk_rekey_offload()
|
D | fw.h | 2278 u8 kek[NL80211_KEK_LEN]; member
|
/Linux-v6.6/drivers/net/wireless/mediatek/mt76/ |
D | mt76_connac_mcu.h | 1555 u8 kek[NL80211_KEK_LEN]; member
|
D | mt76_connac_mcu.c | 2425 memcpy(gtk_tlv->kek, key->kek, NL80211_KEK_LEN); in mt76_connac_mcu_update_gtk_rekey()
|