/Linux-v4.19/arch/s390/include/asm/ |
D | pkey.h | 27 __u32 keytype, struct pkey_seckey *seckey); 38 int pkey_clr2seckey(__u16 cardnr, __u16 domain, __u32 keytype, 63 int pkey_clr2protkey(__u32 keytype,
|
/Linux-v4.19/arch/s390/include/uapi/asm/ |
D | pkey.h | 55 __u32 keytype; /* in: key type to generate */ member 66 __u32 keytype; /* in: key type to generate */ member 87 __u32 keytype; /* in: key type to generate */ member
|
/Linux-v4.19/include/sound/ |
D | jack.h | 97 int keytype); 127 int keytype) in snd_jack_set_key() argument
|
/Linux-v4.19/drivers/s390/crypto/ |
D | pkey_api.c | 203 u32 keytype, struct pkey_seckey *seckey) in pkey_genseckey() argument 258 switch (keytype) { in pkey_genseckey() 274 __func__, keytype); in pkey_genseckey() 344 int pkey_clr2seckey(u16 cardnr, u16 domain, u32 keytype, in pkey_clr2seckey() argument 399 switch (keytype) { in pkey_clr2seckey() 412 __func__, keytype); in pkey_clr2seckey() 623 int pkey_clr2protkey(u32 keytype, in pkey_clr2protkey() argument 631 switch (keytype) { in pkey_clr2protkey() 646 __func__, keytype); in pkey_clr2protkey() 658 protkey->type = keytype; in pkey_clr2protkey() [all …]
|
/Linux-v4.19/sound/core/ |
D | jack.c | 332 int keytype) in snd_jack_set_key() argument 338 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 342 jack->key[key] = keytype; in snd_jack_set_key()
|
/Linux-v4.19/include/keys/ |
D | trusted-type.h | 33 uint16_t keytype; member
|
/Linux-v4.19/security/keys/ |
D | trusted.h | 44 pr_info("trusted_key: sealing key type %d\n", o->keytype); in dump_options()
|
D | trusted.c | 458 static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, in tpm_seal() argument 483 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 674 ret = tpm_seal(tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 777 opt->keytype = SEAL_keytype; in getoptions() 926 options->keytype = SRK_keytype; in trusted_options_alloc()
|
D | keyring.c | 1567 keyring->restrict_link->keytype != dead_type) { in keyring_restriction_gc() 1581 keyres->keytype = NULL; in keyring_restriction_gc()
|
/Linux-v4.19/include/linux/ |
D | key.h | 139 struct key_type *keytype; member
|
/Linux-v4.19/drivers/net/wireless/ath/ath9k/ |
D | xmit.c | 1464 info.keytype = fi->keytype; in ath_tx_fill_desc() 2171 enum ath9k_key_type keytype; in setup_frame_info() local 2185 keytype = ath9k_cmn_get_hw_crypto_keytype(skb); in setup_frame_info() 2208 fi->keytype = keytype; in setup_frame_info() 2968 fi->keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_tx99_send()
|
D | ar9002_mac.c | 227 ctl6 = SM(i->keytype, AR_EncrType); in ar9002_set_txdesc()
|
D | mac.h | 707 enum ath9k_key_type keytype; member
|
D | beacon.c | 94 info.keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_beacon_setup()
|
D | ar9003_mac.c | 90 ctl17 = SM(i->keytype, AR_EncrType); in ar9003_set_txdesc()
|
D | ath9k.h | 185 enum ath9k_key_type keytype:2;
|
/Linux-v4.19/drivers/net/wireless/marvell/libertas/ |
D | cfg.c | 904 cmd.keytype[i] = CMD_TYPE_WEP_40_BIT; in lbs_set_wep_keys() 907 cmd.keytype[i] = CMD_TYPE_WEP_104_BIT; in lbs_set_wep_keys() 910 cmd.keytype[i] = 0; in lbs_set_wep_keys()
|
D | host.h | 551 uint8_t keytype[4]; member
|
/Linux-v4.19/crypto/asymmetric_keys/ |
D | asymmetric_type.c | 469 keyres->keytype = &key_type_asymmetric; in asymmetric_restriction_alloc()
|
/Linux-v4.19/Documentation/security/keys/ |
D | core.rst | 1294 keytype->def_datalen, then key_payload_reserve() should be called.
|