/openbmc/linux/drivers/s390/crypto/ |
H A D | pkey_api.c | 90 switch (keytype) { in pkey_keytype_aes_to_size() 116 switch (keytype) { in pkey_clr2protkey() 120 pkeytype = keytype; in pkey_clr2protkey() 126 pkeytype = keytype; in pkey_clr2protkey() 132 pkeytype = keytype; in pkey_clr2protkey() 167 __func__, keytype); in pkey_clr2protkey() 383 keytype); in pkey_genprotkey() 468 __func__, t->keytype); in nonccatokaes2pkey() 522 switch (t->keytype) { in nonccatokecc2pkey() 591 switch (t->keytype) { in pkey_nonccatok2pkey() [all …]
|
H A D | zcrypt_ep11misc.h | 125 u32 keytype);
|
H A D | zcrypt_ccamisc.h | 86 u16 keytype; /* 0x0001 for 'cipher' */ member
|
/openbmc/linux/arch/s390/include/uapi/asm/ |
H A D | pkey.h | 120 __u32 keytype; /* in: key type to generate */ member 131 __u32 keytype; /* in: key type to generate */ member 152 __u32 keytype; /* in: key type to generate */ member 201 __u32 keytype; /* in: key type to generate */ member
|
/openbmc/linux/include/sound/ |
H A D | jack.h | 84 int keytype); 114 int keytype) in snd_jack_set_key() argument
|
/openbmc/qemu/backends/ |
H A D | cryptodev-lkcf.c | 67 QCryptoAkCipherKeyType keytype; member 325 if (session->keytype == QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE) { in cryptodev_lkcf_execute_task() 345 session->keytype, in cryptodev_lkcf_execute_task() 535 switch (sess_info->keytype) { in cryptodev_lkcf_create_asym_session() 537 sess->keytype = QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC; in cryptodev_lkcf_create_asym_session() 541 sess->keytype = QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE; in cryptodev_lkcf_create_asym_session() 545 error_report("Unknown akcipher keytype: %u", sess_info->keytype); in cryptodev_lkcf_create_asym_session()
|
H A D | cryptodev-builtin.c | 335 switch (sess_info->keytype) { in cryptodev_builtin_create_akcipher_session() 345 error_setg(errp, "Unsupported akcipher keytype %u", sess_info->keytype); in cryptodev_builtin_create_akcipher_session()
|
/openbmc/linux/certs/ |
H A D | Makefile | 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 50 -outform PEM -out $@ -keyout $@ $(keytype-y) 2>&1
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | ccmake.bbclass | 41 key, keytype = key.split(":") 42 if keytype in ["INTERNAL", "STATIC"]: 44 yield key, keytype, value
|
/openbmc/linux/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 379 uint32_t keytype; in virtio_crypto_rsa_set_key() local 387 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE; in virtio_crypto_rsa_set_key() 390 keytype = VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC; in virtio_crypto_rsa_set_key() 421 para.keytype = cpu_to_le32(keytype); in virtio_crypto_rsa_set_key()
|
/openbmc/linux/include/keys/ |
H A D | trusted-type.h | 37 uint16_t keytype; member
|
H A D | trusted_tpm.h | 57 pr_info("sealing key type %d\n", o->keytype); in dump_options()
|
/openbmc/qemu/hw/virtio/ |
H A D | virtio-crypto.c | 206 uint32_t algo, keytype, keylen; in virtio_crypto_create_asym_session() local 210 keytype = ldl_le_p(&sess_req->para.keytype); in virtio_crypto_create_asym_session() 213 if ((keytype != VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC) in virtio_crypto_create_asym_session() 214 && (keytype != VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE)) { in virtio_crypto_create_asym_session() 215 error_report("unsupported asym keytype: %d", keytype); in virtio_crypto_create_asym_session() 230 asym_info->keytype = keytype; in virtio_crypto_create_asym_session()
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 457 static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, in tpm_seal() argument 482 ret = osap(tb, &sess, keyauth, keytype, keyhandle); in tpm_seal() 674 ret = tpm_seal(&tb, o->keytype, o->keyhandle, o->keyauth, in key_seal() 776 opt->keytype = SEAL_keytype; in getoptions() 880 options->keytype = SRK_keytype; in trusted_options_alloc()
|
/openbmc/linux/sound/core/ |
H A D | jack.c | 622 int keytype) in snd_jack_set_key() argument 628 if (!keytype || key >= ARRAY_SIZE(jack->key)) in snd_jack_set_key() 632 jack->key[key] = keytype; in snd_jack_set_key()
|
/openbmc/qemu/include/sysemu/ |
H A D | cryptodev.h | 98 uint32_t keytype; member
|
/openbmc/qemu/include/standard-headers/linux/ |
H A D | virtio_crypto.h | 226 uint32_t keytype; member
|
/openbmc/linux/include/uapi/linux/ |
H A D | virtio_crypto.h | 226 __le32 keytype; member
|
/openbmc/linux/include/linux/ |
H A D | key.h | 179 struct key_type *keytype; member
|
/openbmc/qemu/block/ |
H A D | ssh.c | 416 const char *keytype; in check_host_key_hash() local 424 keytype = ssh_key_type_to_char(ssh_key_type(pubkey)); in check_host_key_hash() 440 keytype, typestr, server_fp, typestr, hash); in check_host_key_hash()
|
/openbmc/linux/arch/s390/crypto/ |
H A D | paes_s390.c | 67 u32 keytype; in _key_to_kb() member 79 h->keytype = (keylen - 8) >> 3; in _key_to_kb()
|
/openbmc/linux/drivers/net/wireless/ath/ath9k/ |
H A D | xmit.c | 1478 info.keytype = fi->keytype; in ath_tx_fill_desc() 2141 enum ath9k_key_type keytype; in setup_frame_info() local 2155 keytype = ath9k_cmn_get_hw_crypto_keytype(skb); in setup_frame_info() 2182 fi->keytype = keytype; in setup_frame_info() 2944 fi->keytype = ATH9K_KEY_TYPE_CLEAR; in ath9k_tx99_send()
|
H A D | ar9002_mac.c | 227 ctl6 = SM(i->keytype, AR_EncrType); in ar9002_set_txdesc()
|
/openbmc/linux/drivers/net/wireless/marvell/libertas/ |
H A D | cfg.c | 957 cmd.keytype[i] = CMD_TYPE_WEP_40_BIT; in lbs_set_wep_keys() 960 cmd.keytype[i] = CMD_TYPE_WEP_104_BIT; in lbs_set_wep_keys() 963 cmd.keytype[i] = 0; in lbs_set_wep_keys()
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | asymmetric_type.c | 499 keyres->keytype = &key_type_asymmetric; in asymmetric_restriction_alloc()
|