Home
last modified time | relevance | path

Searched refs:key_type (Results 1 – 99 of 99) sorted by relevance

/linux-4.4.14/include/linux/
Dkey.h81 struct key_type;
87 struct key_type *type;
189 struct key_type *type; /* type of key */
209 extern struct key *key_alloc(struct key_type *type,
242 extern struct key *request_key(struct key_type *type,
246 extern struct key *request_key_with_auxdata(struct key_type *type,
252 extern struct key *request_key_async(struct key_type *type,
257 extern struct key *request_key_async_with_auxdata(struct key_type *type,
294 struct key_type *type,
Dkey-type.h75 struct key_type { struct
156 extern struct key_type key_type_keyring; argument
158 extern int register_key_type(struct key_type *ktype);
159 extern void unregister_key_type(struct key_type *ktype);
/linux-4.4.14/security/keys/
Dinternal.h37 extern struct key_type key_type_dead;
38 extern struct key_type key_type_user;
39 extern struct key_type key_type_logon;
88 extern struct key_type *key_type_lookup(const char *type);
89 extern void key_type_put(struct key_type *ktype);
146 extern struct key *request_key_and_link(struct key_type *type,
170 extern void key_gc_keytype(struct key_type *ktype);
196 extern struct key_type key_type_request_key_auth;
Dgc.c36 static struct key_type *key_gc_dead_keytype;
48 struct key_type key_type_dead = {
104 void key_gc_keytype(struct key_type *ktype) in key_gc_keytype()
Duser_defined.c27 struct key_type key_type_user = {
47 struct key_type key_type_logon = {
Drequest_key.c508 struct key *request_key_and_link(struct key_type *type, in request_key_and_link()
619 struct key *request_key(struct key_type *type, in request_key()
656 struct key *request_key_with_auxdata(struct key_type *type, in request_key_with_auxdata()
692 struct key *request_key_async(struct key_type *type, in request_key_async()
717 struct key *request_key_async_with_auxdata(struct key_type *type, in request_key_async_with_auxdata()
Dkey.c224 struct key *key_alloc(struct key_type *type, const char *desc, in key_alloc()
659 struct key_type *key_type_lookup(const char *type) in key_type_lookup()
661 struct key_type *ktype; in key_type_lookup()
702 void key_type_put(struct key_type *ktype) in key_type_put()
1071 int register_key_type(struct key_type *ktype) in register_key_type()
1073 struct key_type *p; in register_key_type()
1107 void unregister_key_type(struct key_type *ktype) in unregister_key_type()
Dbig_key.c44 struct key_type key_type_big_key = {
Drequest_key_auth.c35 struct key_type key_type_request_key_auth = {
Dkeyring.c86 struct key_type key_type_keyring = {
890 struct key_type *type, in keyring_search()
Dkeyctl.c163 struct key_type *ktype; in SYSCALL_DEFINE4()
632 struct key_type *ktype; in keyctl_keyring_search()
Dtrusted.c1128 struct key_type key_type_trusted = {
/linux-4.4.14/drivers/video/fbdev/omap2/dss/
Dmanager-sysfs.c171 enum omap_dss_trans_key_type key_type; in manager_trans_key_type_show() local
176 key_type = info.trans_key_type; in manager_trans_key_type_show()
177 BUG_ON(key_type >= ARRAY_SIZE(trans_key_type_str)); in manager_trans_key_type_show()
179 return snprintf(buf, PAGE_SIZE, "%s\n", trans_key_type_str[key_type]); in manager_trans_key_type_show()
185 enum omap_dss_trans_key_type key_type; in manager_trans_key_type_store() local
189 for (key_type = OMAP_DSS_COLOR_KEY_GFX_DST; in manager_trans_key_type_store()
190 key_type < ARRAY_SIZE(trans_key_type_str); key_type++) { in manager_trans_key_type_store()
191 if (sysfs_streq(buf, trans_key_type_str[key_type])) in manager_trans_key_type_store()
195 if (key_type == ARRAY_SIZE(trans_key_type_str)) in manager_trans_key_type_store()
200 info.trans_key_type = key_type; in manager_trans_key_type_store()
/linux-4.4.14/fs/ubifs/
Dgc.c138 ubifs_assert(key_type(c, &sa->key) == UBIFS_DATA_KEY); in data_nodes_cmp()
139 ubifs_assert(key_type(c, &sb->key) == UBIFS_DATA_KEY); in data_nodes_cmp()
182 ubifs_assert(key_type(c, &sa->key) != UBIFS_DATA_KEY && in nondata_nodes_cmp()
183 key_type(c, &sb->key) != UBIFS_DATA_KEY); in nondata_nodes_cmp()
196 ubifs_assert(key_type(c, &sa->key) == UBIFS_DENT_KEY || in nondata_nodes_cmp()
197 key_type(c, &sa->key) == UBIFS_XENT_KEY); in nondata_nodes_cmp()
198 ubifs_assert(key_type(c, &sb->key) == UBIFS_DENT_KEY || in nondata_nodes_cmp()
199 key_type(c, &sb->key) == UBIFS_XENT_KEY); in nondata_nodes_cmp()
273 ubifs_assert(key_type(c, &snod->key) == UBIFS_DATA_KEY || in sort_nodes()
274 key_type(c, &snod->key) == UBIFS_INO_KEY || in sort_nodes()
[all …]
Dtnc_misc.c324 switch (key_type(c, &zbr->key)) { in read_znode()
332 i, key_type(c, &zbr->key)); in read_znode()
340 type = key_type(c, &zbr->key); in read_znode()
462 int err, type = key_type(c, key); in ubifs_tnc_read_node()
Dreplay.c237 switch (key_type(c, &r->key)) { in apply_replay_entry()
453 int key_type = key_type_flash(c, dent->key); in ubifs_validate_entry() local
461 ubifs_err(c, "bad %s node", key_type == UBIFS_DENT_KEY ? in ubifs_validate_entry()
466 if (key_type != UBIFS_DENT_KEY && key_type != UBIFS_XENT_KEY) { in ubifs_validate_entry()
467 ubifs_err(c, "bad key type %d", key_type); in ubifs_validate_entry()
Dkey.h327 static inline int key_type(const struct ubifs_info *c, in key_type() function
529 int type = key_type(c, key); in is_hash_key()
Dtnc.c493 ret = try_read_node(c, node, key_type(c, key), zbr->len, zbr->lnum, in fallible_read_node()
1166 ubifs_assert(key_type(c, key) < UBIFS_INVALID_KEY); in ubifs_lookup_level0()
1546 key_type(c, key) != UBIFS_DATA_KEY) { in ubifs_tnc_get_bu_keys()
2002 if (znode->level == 0 && key_type(c, key) == UBIFS_DATA_KEY) { in tnc_insert()
2007 key_type(c, key1) == UBIFS_DATA_KEY) in tnc_insert()
2018 key_type(c, key1) == UBIFS_DATA_KEY) { in tnc_insert()
2021 key_type(c, key1) != UBIFS_DATA_KEY) { in tnc_insert()
2752 int n, err, type = key_type(c, key); in ubifs_tnc_next_ent()
2811 key_type(c, dkey) != type) { in ubifs_tnc_next_ent()
2978 ubifs_assert(key_type(c, key) < UBIFS_INVALID_KEY); in lookup_znode()
Dorphan.c833 if (key_type(c, &zbr->key) != UBIFS_INO_KEY) in dbg_orphan_check()
835 (unsigned long)inum, key_type(c, &zbr->key)); in dbg_orphan_check()
Drecovery.c1373 switch (key_type(c, key)) { in ubifs_recover_size_accum()
Ddebug.c105 int type = key_type(c, key); in dbg_snprintf_key()
1984 int err, type = key_type(c, &zbr->key); in check_leaf()
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/
Drecv_linux.c29 enum nl80211_key_type key_type = 0; in rtw_handle_tkip_mic_err23a() local
51 key_type |= NL80211_KEYTYPE_GROUP; in rtw_handle_tkip_mic_err23a()
53 key_type |= NL80211_KEYTYPE_PAIRWISE; in rtw_handle_tkip_mic_err23a()
57 key_type, -1, NULL, GFP_ATOMIC); in rtw_handle_tkip_mic_err23a()
/linux-4.4.14/include/keys/
Duser-type.h37 extern struct key_type key_type_user;
38 extern struct key_type key_type_logon;
Dceph-type.h6 extern struct key_type key_type_ceph;
Ddns_resolver-type.h17 extern struct key_type key_type_dns_resolver;
Dencrypted-type.h36 extern struct key_type key_type_encrypted;
Dbig_key-type.h17 extern struct key_type key_type_big_key;
Dtrusted-type.h41 extern struct key_type key_type_trusted;
Dasymmetric-type.h19 extern struct key_type key_type_asymmetric;
Drxrpc-type.h20 extern struct key_type key_type_rxrpc;
/linux-4.4.14/drivers/staging/vt6656/
Dkey.c51 struct ieee80211_key_conf *key, u32 key_type, u32 mode, in vnt_set_keymode() argument
67 if (key_type != VNT_KEY_DEFAULTKEY) { in vnt_set_keymode()
79 switch (key_type) { in vnt_set_keymode()
/linux-4.4.14/drivers/staging/vt6655/
Dkey.c45 struct ieee80211_key_conf *key, u32 key_type, u32 mode, in vnt_set_keymode() argument
61 if (key_type != VNT_KEY_DEFAULTKEY) { in vnt_set_keymode()
73 switch (key_type) { in vnt_set_keymode()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/
Dcore.c1488 u8 key_type = NO_ENCRYPTION; in rtl_op_set_key() local
1517 key_type = WEP40_ENCRYPTION; in rtl_op_set_key()
1522 key_type = WEP104_ENCRYPTION; in rtl_op_set_key()
1525 key_type = TKIP_ENCRYPTION; in rtl_op_set_key()
1529 key_type = AESCCMP_ENCRYPTION; in rtl_op_set_key()
1536 key_type = AESCMAC_ENCRYPTION; in rtl_op_set_key()
1547 if (key_type == WEP40_ENCRYPTION || in rtl_op_set_key()
1548 key_type == WEP104_ENCRYPTION || in rtl_op_set_key()
1571 if (!group_key || key_type == WEP40_ENCRYPTION || in rtl_op_set_key()
1572 key_type == WEP104_ENCRYPTION) { in rtl_op_set_key()
[all …]
/linux-4.4.14/net/bluetooth/
Damp.c186 BT_DBG("conn %p key_type %d", conn, conn->key_type); in phylink_gen_key()
189 if (conn->key_type < 3) { in phylink_gen_key()
190 BT_ERR("Legacy key type %d", conn->key_type); in phylink_gen_key()
194 *type = conn->key_type; in phylink_gen_key()
214 if (conn->key_type == HCI_LK_DEBUG_COMBINATION) { in phylink_gen_key()
458 &cp.key_type)) { in amp_create_phylink()
497 &cp.key_type)) { in amp_accept_phylink()
Dhci_conn.c511 conn->key_type = 0xff; in hci_conn_add()
1159 conn->key_type != HCI_LK_AUTH_COMBINATION_P256) in hci_conn_check_link_mode()
1245 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256 && in hci_conn_security()
1251 if ((conn->key_type == HCI_LK_AUTH_COMBINATION_P192 || in hci_conn_security()
1252 conn->key_type == HCI_LK_AUTH_COMBINATION_P256) && in hci_conn_security()
1258 if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 || in hci_conn_security()
1259 conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) && in hci_conn_security()
1267 if (conn->key_type == HCI_LK_COMBINATION && in hci_conn_security()
Dhci_event.c2595 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256) in hci_encrypt_change_evt()
2627 conn->key_type != HCI_LK_AUTH_COMBINATION_P256)) { in hci_encrypt_change_evt()
3383 static void conn_set_key(struct hci_conn *conn, u8 key_type, u8 pin_len) in conn_set_key() argument
3385 if (key_type == HCI_LK_CHANGED_COMBINATION) in conn_set_key()
3389 conn->key_type = key_type; in conn_set_key()
3391 switch (key_type) { in conn_set_key()
3496 conn_set_key(conn, ev->key_type, conn->pin_length); in hci_link_key_notify_evt()
3502 ev->key_type, pin_len, &persistent); in hci_link_key_notify_evt()
3509 if (ev->key_type == HCI_LK_CHANGED_COMBINATION) in hci_link_key_notify_evt()
Dhci_core.c2314 u8 key_type, u8 old_key_type) in hci_persistent_key() argument
2317 if (key_type < 0x03) in hci_persistent_key()
2321 if (key_type == HCI_LK_DEBUG_COMBINATION) in hci_persistent_key()
2325 if (key_type == HCI_LK_CHANGED_COMBINATION && old_key_type == 0xff) in hci_persistent_key()
2439 old_key_type = conn ? conn->key_type : 0xff; in hci_add_link_key()
2455 conn->key_type = type; in hci_add_link_key()
Dsmp.c1049 if (hcon->key_type == HCI_LK_DEBUG_COMBINATION) in smp_notify_keys()
1132 u8 key_type, auth; in sc_add_ltk() local
1135 key_type = SMP_LTK_P256_DEBUG; in sc_add_ltk()
1137 key_type = SMP_LTK_P256; in sc_add_ltk()
1145 key_type, auth, smp->tk, smp->enc_key_size, in sc_add_ltk()
/linux-4.4.14/fs/cifs/
Dcifs_spnego.h43 extern struct key_type cifs_spnego_key_type;
Dcifs_spnego.c62 struct key_type cifs_spnego_key_type = {
Dcifsacl.c81 static struct key_type cifs_idmap_key_type = {
/linux-4.4.14/drivers/net/wireless/ti/wl1251/
Dmain.c853 key->key_type = KEY_WEP_DEFAULT; in wl1251_set_key_type()
855 key->key_type = KEY_WEP_ADDR; in wl1251_set_key_type()
861 key->key_type = KEY_TKIP_MIC_GROUP; in wl1251_set_key_type()
863 key->key_type = KEY_TKIP_MIC_PAIRWISE; in wl1251_set_key_type()
869 key->key_type = KEY_AES_GROUP; in wl1251_set_key_type()
871 key->key_type = KEY_AES_PAIRWISE; in wl1251_set_key_type()
945 if (wl_cmd->key_type != KEY_WEP_DEFAULT) in wl1251_op_set_key()
948 if ((wl_cmd->key_type == KEY_TKIP_MIC_GROUP) || in wl1251_op_set_key()
949 (wl_cmd->key_type == KEY_TKIP_MIC_PAIRWISE)) { in wl1251_op_set_key()
Dcmd.h406 u8 key_type; member
/linux-4.4.14/drivers/net/wireless/ti/wlcore/
Dcmd.c1347 cmd->key_type = KEY_WEP; in wl12xx_cmd_set_default_wep_key()
1362 u16 action, u8 id, u8 key_type, in wl1271_cmd_set_sta_key() argument
1381 if (key_type == KEY_WEP) in wl1271_cmd_set_sta_key()
1390 cmd->key_type = key_type; in wl1271_cmd_set_sta_key()
1397 if (key_type == KEY_TKIP) { in wl1271_cmd_set_sta_key()
1431 u16 action, u8 id, u8 key_type, in wl1271_cmd_set_ap_key() argument
1444 if (key_type == KEY_WEP) in wl1271_cmd_set_ap_key()
1454 (int)key_type, (int)hlid); in wl1271_cmd_set_ap_key()
1460 cmd->key_type = key_type; in wl1271_cmd_set_ap_key()
1465 if (key_type == KEY_TKIP) { in wl1271_cmd_set_ap_key()
Dcmd.h76 u16 action, u8 id, u8 key_type,
80 u16 action, u8 id, u8 key_type,
514 u8 key_type; member
Dmain.c3278 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() argument
3312 ap_key->key_type = key_type; in wl1271_record_ap_key()
3350 key->id, key->key_type, in wl1271_ap_init_hwenc()
3357 if (key->key_type == KEY_WEP) in wl1271_ap_init_hwenc()
3374 u16 action, u8 id, u8 key_type, in wl1271_set_key() argument
3401 key_type, key_size, in wl1271_set_key()
3406 id, key_type, key_size, in wl1271_set_key()
3439 id, key_type, key_size, in wl1271_set_key()
3503 u8 key_type; in wlcore_set_key() local
3533 key_type = KEY_WEP; in wlcore_set_key()
[all …]
Dwlcore_i.h217 u8 key_type; member
/linux-4.4.14/Documentation/security/
Dkeys-request-key.txt12 struct key *request_key(const struct key_type *type,
18 struct key *request_key_with_auxdata(const struct key_type *type,
26 struct key *request_key_async(const struct key_type *type,
33 struct key *request_key_async_with_auxdata(const struct key_type *type,
Dkeys.txt61 Key types are represented in the kernel by struct key_type. This defines a
884 struct key *request_key(const struct key_type *type,
906 struct key *request_key_with_auxdata(const struct key_type *type,
913 passed to the key_type->request_key() op if it exists, and the callout_info
919 struct key *request_key_async(const struct key_type *type,
926 struct key *request_key_async_with_auxdata(const struct key_type *type,
985 const struct key_type *type,
1026 int register_key_type(struct key_type *type);
1034 void unregister_key_type(struct key_type *type);
1040 struct key_type key_type_keyring;
[all …]
/linux-4.4.14/crypto/asymmetric_keys/
Dpkcs7_key_type.c89 static struct key_type key_type_pkcs7 = {
Dasymmetric_type.c362 struct key_type key_type_asymmetric = {
/linux-4.4.14/fs/btrfs/
Dtree-log.c1881 u64 dirid, int key_type, in find_dir_range() argument
1894 key.type = key_type; in find_dir_range()
1908 if (key.type != key_type || key.objectid != dirid) { in find_dir_range()
1936 if (key.type != key_type || key.objectid != dirid) { in find_dir_range()
2180 int key_type = BTRFS_DIR_LOG_ITEM_KEY; in replay_dir_deletes() local
2209 ret = find_dir_range(log, path, dirid, key_type, in replay_dir_deletes()
2255 if (key_type == BTRFS_DIR_LOG_ITEM_KEY) { in replay_dir_deletes()
2256 key_type = BTRFS_DIR_LOG_INDEX_KEY; in replay_dir_deletes()
3209 int key_type, u64 dirid, in insert_dir_log_key() argument
3218 if (key_type == BTRFS_DIR_ITEM_KEY) in insert_dir_log_key()
[all …]
Dinode.c5735 int key_type = BTRFS_DIR_INDEX_KEY; in btrfs_real_readdir() local
5744 key_type = BTRFS_DIR_ITEM_KEY; in btrfs_real_readdir()
5755 if (key_type == BTRFS_DIR_INDEX_KEY) { in btrfs_real_readdir()
5761 key.type = key_type; in btrfs_real_readdir()
5787 if (found_key.type != key_type) in btrfs_real_readdir()
5791 if (key_type == BTRFS_DIR_INDEX_KEY && in btrfs_real_readdir()
5859 if (key_type == BTRFS_DIR_INDEX_KEY) { in btrfs_real_readdir()
5896 if (key_type == BTRFS_DIR_INDEX_KEY) { in btrfs_real_readdir()
5905 if (key_type == BTRFS_DIR_INDEX_KEY) in btrfs_real_readdir()
Dctree.c2623 u64 iobjectid, u64 ioff, u8 key_type, in btrfs_find_item() argument
2633 key.type = key_type; in btrfs_find_item()
Dctree.h3636 u64 inum, u64 ioff, u8 key_type, struct btrfs_key *found_key);
/linux-4.4.14/drivers/net/wireless/rsi/
Drsi_91x_mac80211.c569 u8 key_type; in rsi_hal_key_config() local
572 key_type = RSI_PAIRWISE_KEY; in rsi_hal_key_config()
574 key_type = RSI_GROUP_KEY; in rsi_hal_key_config()
577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config()
593 key_type, in rsi_hal_key_config()
Drsi_mgmt.h294 u8 key_type, u8 key_id, u32 cipher);
Drsi_91x_mgmt.c697 u8 key_type, in rsi_hal_load_key() argument
725 if (key_type == RSI_PAIRWISE_KEY) in rsi_hal_load_key()
730 key_descriptor |= (key_type | BIT(13) | (key_id << 14)); in rsi_hal_load_key()
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/
Dcfg80211.c1125 u8 key_type; in ath6kl_cfg80211_add_key() local
1171 key_type = WEP_CRYPT; in ath6kl_cfg80211_add_key()
1175 key_type = TKIP_CRYPT; in ath6kl_cfg80211_add_key()
1179 key_type = AES_CRYPT; in ath6kl_cfg80211_add_key()
1182 key_type = WAPI_CRYPT; in ath6kl_cfg80211_add_key()
1196 __func__, key_index, key->key_len, key_type, in ath6kl_cfg80211_add_key()
1200 (key_type == TKIP_CRYPT || key_type == AES_CRYPT || in ath6kl_cfg80211_add_key()
1201 key_type == WAPI_CRYPT)) { in ath6kl_cfg80211_add_key()
1204 ar->ap_mode_bkey.key_type = key_type; in ath6kl_cfg80211_add_key()
1218 if (vif->next_mode == AP_NETWORK && key_type == WEP_CRYPT && in ath6kl_cfg80211_add_key()
[all …]
Dmain.c390 if (!ik->valid || ik->key_type != WAPI_CRYPT) in ath6kl_connect_ap_mode_bss()
403 ar->wmi, vif->fw_vif_idx, ik->key_index, ik->key_type, in ath6kl_connect_ap_mode_bss()
Dcore.h548 int key_type; member
Dwmi.c2299 enum crypto_type key_type, in ath6kl_wmi_addkey_cmd() argument
2312 key_index, key_type, key_usage, key_len, key_op_ctrl); in ath6kl_wmi_addkey_cmd()
2318 if ((WEP_CRYPT != key_type) && (NULL == key_rsc)) in ath6kl_wmi_addkey_cmd()
2327 cmd->key_type = key_type; in ath6kl_wmi_addkey_cmd()
Dwmi.h782 u8 key_type; member
2613 enum crypto_type key_type,
/linux-4.4.14/drivers/bluetooth/
Dbtintel.h45 __u8 key_type; member
/linux-4.4.14/net/wireless/
Dmlme.c172 enum nl80211_key_type key_type, int key_id, in cfg80211_michael_mic_failure() argument
184 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni", in cfg80211_michael_mic_failure()
193 trace_cfg80211_michael_mic_failure(dev, addr, key_type, key_id, tsc); in cfg80211_michael_mic_failure()
194 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); in cfg80211_michael_mic_failure()
Dnl80211.h70 enum nl80211_key_type key_type,
Dtrace.h2224 enum nl80211_key_type key_type, int key_id, const u8 *tsc),
2225 TP_ARGS(netdev, addr, key_type, key_id, tsc),
2229 __field(enum nl80211_key_type, key_type)
2236 __entry->key_type = key_type;
2242 NETDEV_PR_ARG, MAC_PR_ARG(addr), __entry->key_type,
Dnl80211.c12057 enum nl80211_key_type key_type, int key_id, in nl80211_michael_mic_failure() argument
12076 nla_put_u32(msg, NL80211_ATTR_KEY_TYPE, key_type) || in nl80211_michael_mic_failure()
/linux-4.4.14/fs/nfs/
Dnfs4idmap.c57 static struct key_type key_type_id_resolver_legacy;
176 static struct key_type key_type_id_resolver = {
399 static struct key_type key_type_id_resolver_legacy = {
/linux-4.4.14/include/uapi/linux/
Domapfb.h170 __u8 key_type; member
/linux-4.4.14/drivers/net/wireless/p54/
Dlmac.h254 u8 key_type; member
444 u8 key_type; member
Dtxrx.c460 switch (entry_data->key_type) { in p54_rx_frame_sent()
902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); in p54_tx_80211()
916 txhdr->key_type = 0; in p54_tx_80211()
Dfwio.c669 rxkey->key_type = algo; in p54_upload_key()
/linux-4.4.14/net/openvswitch/
Dflow_netlink.c2010 int key_type = nla_type(ovs_key); in validate_set() local
2021 if (key_type > OVS_KEY_ATTR_MAX || in validate_set()
2022 !check_attr_len(key_len, ovs_key_lens[key_type].len)) in validate_set()
2028 switch (key_type) { in validate_set()
2136 if (!masked && key_type != OVS_KEY_ATTR_TUNNEL) { in validate_set()
2148 at = __add_action(sfa, key_type, NULL, len, log); in validate_set()
2155 if (key_type == OVS_KEY_ATTR_IPV6) { in validate_set()
2424 int key_type = nla_type(ovs_key); in set_action_to_attr() local
2428 switch (key_type) { in set_action_to_attr()
/linux-4.4.14/drivers/net/wireless/ath/ath9k/
Dhtc.h79 u8 key_type; member
90 u8 key_type; member
Dhtc_drv_txrx.c249 mgmt_hdr.key_type = ath9k_cmn_get_hw_crypto_keytype(skb); in ath9k_htc_tx_mgmt()
250 if (mgmt_hdr.key_type == ATH9K_KEY_TYPE_CLEAR) in ath9k_htc_tx_mgmt()
316 tx_hdr.key_type = ath9k_cmn_get_hw_crypto_keytype(skb); in ath9k_htc_tx_data()
317 if (tx_hdr.key_type == ATH9K_KEY_TYPE_CLEAR) in ath9k_htc_tx_data()
/linux-4.4.14/security/keys/encrypted-keys/
Dencrypted.c376 static int get_derived_key(u8 *derived_key, enum derived_key_type key_type, in get_derived_key() argument
392 if (key_type) in get_derived_key()
971 struct key_type key_type_encrypted = {
/linux-4.4.14/net/dns_resolver/
Ddns_key.c252 struct key_type key_type_dns_resolver = {
/linux-4.4.14/net/rxrpc/
Dar-internal.h539 extern struct key_type key_type_rxrpc;
540 extern struct key_type key_type_rxrpc_s;
Dar-key.c42 struct key_type key_type_rxrpc = {
57 struct key_type key_type_rxrpc_s = {
/linux-4.4.14/drivers/net/wireless/libertas/
Dcfg.c1006 int key_type, int key_info, in lbs_set_key_material() argument
1034 cmd.param.keytypeid = cpu_to_le16(key_type); in lbs_set_key_material()
1511 u16 key_type; in lbs_cfg_add_key() local
1550 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) in lbs_cfg_add_key()
1554 key_type, in lbs_cfg_add_key()
/linux-4.4.14/fs/hfsplus/
Dhfsplus_raw.h179 u8 key_type; member
Dbtree.c205 (head->key_type == HFSPLUS_KEY_BINARY)) in hfs_btree_open()
/linux-4.4.14/drivers/staging/rtl8192e/rtl8192e/
Drtl_cam.c84 ieee->swcamtable[EntryNo].key_type = KeyType; in rtl92e_set_swcam()
/linux-4.4.14/drivers/video/fbdev/omap2/omapfb/
Domapfb-ioctl.c386 if (ck->key_type == OMAPFB_COLOR_KEY_DISABLED) { in _omapfb_set_color_key()
399 switch (ck->key_type) { in _omapfb_set_color_key()
/linux-4.4.14/include/net/bluetooth/
Dhci.h718 __u8 key_type; member
726 __u8 key_type; member
1642 __u8 key_type; member
Dhci_core.h432 __u8 key_type; member
/linux-4.4.14/drivers/net/wireless/mwifiex/
Dsta_cmd.c577 km->key_param_set.key_type = KEY_TYPE_ID_AES_CMAC; in mwifiex_set_aes_key_v2()
589 km->key_param_set.key_type = KEY_TYPE_ID_AES; in mwifiex_set_aes_key_v2()
680 km->key_param_set.key_type = KEY_TYPE_ID_WEP; in mwifiex_cmd_802_11_key_material_v2()
721 km->key_param_set.key_type = KEY_TYPE_ID_WAPI; in mwifiex_cmd_802_11_key_material_v2()
765 km->key_param_set.key_type = KEY_TYPE_ID_TKIP; in mwifiex_cmd_802_11_key_material_v2()
Dsta_cmdresp.c637 if (key_v2->key_param_set.key_type != KEY_TYPE_ID_AES) in mwifiex_ret_802_11_key_material_v2()
Dfw.h871 u8 key_type; member
/linux-4.4.14/Documentation/networking/
Ddns_resolver.txt27 (*) Implements the dns_resolver key_type to contact userspace.
/linux-4.4.14/drivers/media/platform/omap/
Domap_vout.c1731 enum omap_dss_trans_key_type key_type = OMAP_DSS_COLOR_KEY_GFX_DST; in vidioc_s_fbuf() local
1749 key_type = OMAP_DSS_COLOR_KEY_VID_SRC; in vidioc_s_fbuf()
1755 key_type = OMAP_DSS_COLOR_KEY_GFX_DST; in vidioc_s_fbuf()
1769 info.trans_key_type = key_type; in vidioc_s_fbuf()
/linux-4.4.14/net/ceph/
Dcrypto.c565 struct key_type key_type_ceph = {
/linux-4.4.14/drivers/net/wireless/
Drndis_wlan.c2907 enum nl80211_key_type key_type; in rndis_wlan_auth_indication() local
2944 key_type = NL80211_KEYTYPE_PAIRWISE; in rndis_wlan_auth_indication()
2949 key_type, key_id, NULL, in rndis_wlan_auth_indication()
2954 key_type = NL80211_KEYTYPE_GROUP; in rndis_wlan_auth_indication()
2959 key_type, key_id, NULL, in rndis_wlan_auth_indication()
/linux-4.4.14/drivers/net/wireless/ath/wil6210/
Dwmi.h262 u8 key_type; member
/linux-4.4.14/drivers/net/wireless/ipw2x00/
Dipw2200.h944 u8 key_type; member
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/
Dcfg80211.c5074 enum nl80211_key_type key_type; in brcmf_notify_mic_status() local
5077 key_type = NL80211_KEYTYPE_GROUP; in brcmf_notify_mic_status()
5079 key_type = NL80211_KEYTYPE_PAIRWISE; in brcmf_notify_mic_status()
5081 cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1, in brcmf_notify_mic_status()
/linux-4.4.14/drivers/staging/rtl8192e/
Drtllib.h1409 u16 key_type; member
/linux-4.4.14/include/net/
Dcfg80211.h4300 enum nl80211_key_type key_type, int key_id,