/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument 120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid() 184 int keyid; in get_new_keyid() local 190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid() 191 if (keyid < cdev->kmap.size) { in get_new_keyid() 192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid() 194 hws->rxkey = keyid; in get_new_keyid() 196 hws->txkey = keyid; in get_new_keyid() 199 keyid = -1; in get_new_keyid() 202 return keyid; in get_new_keyid() [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 29 disable <keyid> - disable enabled security and remove key. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. 74 keyid when doing the update operation. It is also expected that the new key 78 update <old keyid> <new keyid> 80 If there is no old keyid due to a security enabling, then a 0 should be 91 disable <keyid> 99 erase <keyid> [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | gpg_sign.py | 32 def export_pubkey(self, output_file, keyid, armor=True): argument 39 cmd += [keyid] 42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument 45 cmd = self.rpm_bin + " --addsign --define '_gpg_name %s' " % keyid 64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument 71 '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid]
|
/openbmc/linux/drivers/staging/rtl8712/ |
H A D | rtl871x_ioctl_set.c | 332 sint keyid; in r8712_set_802_11_add_wep() local 335 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep() 336 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep() 349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep() 351 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep() 352 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep() 353 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
|
H A D | rtl871x_mlme.c | 1147 sint keyid) in r8712_set_key() argument 1170 psetkeyparm->keyid = (u8)keyid; in r8712_set_key() 1176 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key() 1181 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key() 1184 if (keyid < 1 || keyid > 2) { in r8712_set_key() 1190 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key() 1194 if (keyid < 1 || keyid > 2) { in r8712_set_key() 1200 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
|
/openbmc/qemu/ui/ |
H A D | input-barrier.c | 87 static int input_barrier_to_qcode(uint16_t keyid, uint16_t keycode) in input_barrier_to_qcode() argument 94 if (keyid >= 0xE000 && keyid <= 0xEFFF) { in input_barrier_to_qcode() 95 keyid += 0x1000; in input_barrier_to_qcode() 100 keycode = keysym2scancode(kbd_layout, keyid, NULL, false); in input_barrier_to_qcode() 105 return qemu_input_map_x11_to_qcode[keyid]; in input_barrier_to_qcode() 294 read_short(msg->key.keyid, p, len); in readcmd() 302 read_short(msg->repeat.keyid, p, len); in readcmd() 435 input_barrier_to_qcode(msg->key.keyid, msg->key.button), in writecmd() 441 input_barrier_to_qcode(msg->repeat.keyid, msg->repeat.button), in writecmd() 444 input_barrier_to_qcode(msg->repeat.keyid, msg->repeat.button), in writecmd() [all …]
|
H A D | input-barrier.h | 78 int16_t keyid; member 84 int16_t keyid; member
|
/openbmc/qemu/crypto/ |
H A D | secret_common.c | 48 if (qcrypto_secret_lookup(secret->keyid, in qcrypto_secret_decrypt() 165 if (secret->keyid) { in qcrypto_secret_complete() 241 g_free(secret->keyid); in qcrypto_secret_prop_set_keyid() 242 secret->keyid = g_strdup(value); in qcrypto_secret_prop_set_keyid() 251 return g_strdup(secret->keyid); in qcrypto_secret_prop_get_keyid() 261 g_free(secret->keyid); in qcrypto_secret_finalize()
|
/openbmc/linux/drivers/staging/rtl8723bs/core/ |
H A D | rtw_ioctl_set.c | 427 signed int keyid, res; in rtw_set_802_11_add_wep() local 431 keyid = wep->key_index & 0x3fffffff; in rtw_set_802_11_add_wep() 433 if (keyid >= 4) { in rtw_set_802_11_add_wep() 450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length); in rtw_set_802_11_add_wep() 452 psecuritypriv->dot11DefKeylen[keyid] = wep->key_length; in rtw_set_802_11_add_wep() 454 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep() 456 res = rtw_set_key(padapter, psecuritypriv, keyid, 1, true); in rtw_set_802_11_add_wep()
|
H A D | rtw_security.c | 1401 u16 keyid = 0; in rtw_BIP_verify() local 1412 keyid = le16_to_cpu(le_tmp); in rtw_BIP_verify() 1413 if (keyid != padapter->securitypriv.dot11wBIPKeyid) in rtw_BIP_verify() 1555 signed int keyid; in rtw_sec_restore_wep_key() local 1558 for (keyid = 0; keyid < 4; keyid++) { in rtw_sec_restore_wep_key() 1559 if (securitypriv->key_mask & BIT(keyid)) { in rtw_sec_restore_wep_key() 1560 if (keyid == securitypriv->dot11PrivacyKeyIndex) in rtw_sec_restore_wep_key() 1561 rtw_set_key(adapter, securitypriv, keyid, 1, false); in rtw_sec_restore_wep_key() 1563 rtw_set_key(adapter, securitypriv, keyid, 0, false); in rtw_sec_restore_wep_key()
|
/openbmc/linux/security/integrity/ |
H A D | digsig_asymmetric.c | 22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument 27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key() 102 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()
|
/openbmc/linux/drivers/nvdimm/ |
H A D | security.c | 248 static int security_disable(struct nvdimm *nvdimm, unsigned int keyid, in security_disable() argument 273 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_disable() 296 static int security_update(struct nvdimm *nvdimm, unsigned int keyid, in security_update() argument 317 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_update() 346 static int security_erase(struct nvdimm *nvdimm, unsigned int keyid, in security_erase() argument 373 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_erase() 390 static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) in security_overwrite() argument 409 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_overwrite()
|
/openbmc/linux/drivers/staging/rtl8723bs/include/ |
H A D | rtw_ap.h | 25 int rtw_ap_set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid); 26 int rtw_ap_set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid, u8 set_tx);
|
/openbmc/linux/net/mac80211/ |
H A D | tkip.c | 247 u8 rc4key[16], keyid, *pos = payload; in ieee80211_tkip_decrypt_data() local 256 keyid = pos[3]; in ieee80211_tkip_decrypt_data() 260 if (!(keyid & (1 << 5))) in ieee80211_tkip_decrypt_data() 263 if ((keyid >> 6) != key->conf.keyidx) in ieee80211_tkip_decrypt_data()
|
/openbmc/linux/Documentation/security/ |
H A D | digsig.rst | 42 uint8_t keyid[8]; 47 keyid equals to SHA1[12-19] over the total key content. 84 When the key is added to the kernel keyring, the keyid defines the name
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_tun_gre.c | 78 gre_key.key, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_gretap() 80 gre_key.key, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_gretap()
|
H A D | tc_tun_vxlan.c | 176 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_vxlan() 199 be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_vxlan() 201 be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_vxlan()
|
H A D | tc_tun_geneve.c | 140 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_geneve_vni() 149 MLX5_SET(fte_match_set_misc, misc_c, geneve_vni, be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_geneve_vni() 150 MLX5_SET(fte_match_set_misc, misc_v, geneve_vni, be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_geneve_vni()
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-pyasn1-modules/ |
H A D | 0001-Stop-using-pyasn1.compat.octets.patch | 142 self.assertTrue(keyid.prettyPrint()) 143 self.assertEqual(attrVal0, der_encoder(keyid)) 144 - self.assertEqual(str2octs('ptf-kdc-812374'), keyid) 145 + self.assertEqual(b'ptf-kdc-812374', keyid)
|
/openbmc/qemu/docs/interop/ |
H A D | barrier.rst | 201 ``{ int16_t keyid, int16_t modifier [,int16_t button] }`` 205 ``keyid`` = X11 key id 217 ``{ int16_t keyid, int16_t modifier, int16_t repeat [,int16_t button] }`` 221 ``keyid`` = X11 key id 235 ``{ int16_t keyid, int16_t modifier [,int16_t button] }`` 239 ``keyid`` = X11 key id
|
/openbmc/linux/net/core/ |
H A D | flow_dissector.c | 428 struct flow_dissector_key_keyid *keyid; in skb_flow_dissect_tunnel_info() local 430 keyid = skb_flow_dissector_target(flow_dissector, in skb_flow_dissect_tunnel_info() 433 keyid->keyid = tunnel_id_to_key32(key->tun_id); in skb_flow_dissect_tunnel_info() 540 key_keyid->keyid = cpu_to_be32(label); in __skb_flow_dissect_mpls() 669 const __be32 *keyid; in __skb_flow_dissect_gre() local 672 keyid = __skb_header_pointer(skb, *p_nhoff + offset, in __skb_flow_dissect_gre() 675 if (!keyid) in __skb_flow_dissect_gre() 684 key_keyid->keyid = *keyid; in __skb_flow_dissect_gre() 686 key_keyid->keyid = *keyid & GRE_PPTP_KEY_MASK; in __skb_flow_dissect_gre() 1963 keys->keyid.keyid = fl6->fl6_gre_key; in __get_hash_from_flowi6() [all …]
|
/openbmc/linux/security/keys/ |
H A D | keyctl.c | 644 long keyctl_describe_key(key_serial_t keyid, in keyctl_describe_key() argument 654 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_describe_key() 659 instkey = key_get_instantiation_authkey(keyid); in keyctl_describe_key() 662 key_ref = lookup_user_key(keyid, in keyctl_describe_key() 825 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) in keyctl_read_key() argument 834 key_ref = lookup_user_key(keyid, 0, KEY_DEFER_PERM_CHECK); in keyctl_read_key() 1561 long keyctl_get_security(key_serial_t keyid, in keyctl_get_security() argument 1570 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_NEED_VIEW); in keyctl_get_security() 1577 instkey = key_get_instantiation_authkey(keyid); in keyctl_get_security() 1582 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, in keyctl_get_security()
|
/openbmc/linux/certs/ |
H A D | default_x509.genkey | 17 authorityKeyIdentifier=keyid
|
/openbmc/linux/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | match.c | 462 vni = be32_to_cpu((match.key->keyid & match.mask->keyid)) << in nfp_flower_compile_tun_udp_key() 465 vni = be32_to_cpu(match.mask->keyid) << NFP_FL_TUN_VNI_OFFSET; in nfp_flower_compile_tun_udp_key() 478 *key |= match.key->keyid & match.mask->keyid; in nfp_flower_compile_tun_gre_key() 479 *key_msk |= match.mask->keyid; in nfp_flower_compile_tun_gre_key()
|
/openbmc/qemu/include/crypto/ |
H A D | secret_common.h | 37 char *keyid; member
|