Lines Matching +full:inside +full:- +full:secure

1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */
83 /* Struct to hold a CCA AES secure key blob */
85 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */
115 * Generate CCA AES secure key.
121 struct pkey_seckey seckey; /* out: the secure key blob */
126 * Construct CCA AES secure key from clear key value
133 struct pkey_seckey seckey; /* out: the secure key blob */
138 * Fabricate AES protected key from a CCA AES secure key
143 struct pkey_seckey seckey; /* in: the secure key blob */
160 * Verification Pattern provided inside a CCA AES secure key.
163 struct pkey_seckey seckey; /* in: the secure key blob */
173 struct pkey_seckey seckey; /* in: the secure key blob */
179 * Verify the given CCA AES secure key for being able to be usable with
187 struct pkey_seckey seckey; /* in: the secure key blob */
227 * Generate secure key, version 2.
228 * Generate CCA AES secure key, CCA AES cipher key or EP11 AES secure key.
235 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4KT ioctl to
259 * Generate secure key from clear key value, version 2.
260 * Construct an CCA AES secure key, CCA AES cipher key or EP11 AES secure
268 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4KT ioctl to
293 * Verify the given secure key, version 2.
300 * For CCA AES secure keys and CCA AES cipher keys this means to check
307 * CCA AES secure keys are also checked to have the CPACF export allowed
315 * apqn does not match or there is no such apqn found, -1 with errno
337 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to
339 * Deriving ECC protected keys from ECC secure keys is not supported with
353 * Is able to find out which type of secure key is given (CCA AES secure
430 * So this ioctl is also able to handle EP11 and CCA ECC secure keys and
438 * (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to