Symbol: skey
arch/powerpc/include/asm/kvm_book3s_64.h
468
unsigned long skey;
arch/powerpc/include/asm/kvm_book3s_64.h
470
skey = ((hpte_r & HPTE_R_KEY_HI) >> 57) |
arch/powerpc/include/asm/kvm_book3s_64.h
472
return (amr >> (62 - 2 * skey)) & 3;
arch/s390/include/asm/page.h
126
unsigned char skey, int mapped)
arch/s390/include/asm/page.h
132
: [skey] "d" (skey), [addr] "a" (addr)
arch/s390/include/asm/page.h
138
: [skey] "d" (skey), [addr] "a" (addr)
arch/s390/include/asm/page.h
145
unsigned char skey;
arch/s390/include/asm/page.h
147
asm volatile("iske %0,%1" : "=d" (skey) : "a" (addr));
arch/s390/include/asm/page.h
148
return skey;
arch/s390/include/asm/pgtable.h
1089
static inline unsigned long sske_frame(unsigned long addr, unsigned char skey)
arch/s390/include/asm/pgtable.h
1092
: [addr] "+a" (addr) : [skey] "d" (skey));
arch/s390/include/asm/sclp.h
48
u8 skey : 1;
arch/s390/kvm/dat.c
164
union skey nkey = { .acc = pgste.acc, .fp = pgste.fp };
arch/s390/kvm/dat.c
166
page_set_storage_key(pte_origin(pte), nkey.skey, 0);
arch/s390/kvm/dat.c
176
union skey skey;
arch/s390/kvm/dat.c
178
skey.skey = page_get_storage_key(pte_origin(pte));
arch/s390/kvm/dat.c
180
pgste.acc = skey.acc;
arch/s390/kvm/dat.c
181
pgste.fp = skey.fp;
arch/s390/kvm/dat.c
182
pgste.gr |= skey.r;
arch/s390/kvm/dat.c
183
pgste.gc |= skey.c;
arch/s390/kvm/dat.c
613
int dat_get_storage_key(union asce asce, gfn_t gfn, union skey *skey)
arch/s390/kvm/dat.c
620
skey->skey = 0;
arch/s390/kvm/dat.c
631
skey->skey = page_get_storage_key(large_crste_to_phys(crste, gfn));
arch/s390/kvm/dat.c
636
skey->acc = pgste.acc;
arch/s390/kvm/dat.c
637
skey->fp = pgste.fp;
arch/s390/kvm/dat.c
639
skey->skey = page_get_storage_key(pte_origin(*ptep));
arch/s390/kvm/dat.c
641
skey->r |= pgste.gr;
arch/s390/kvm/dat.c
642
skey->c |= pgste.gc;
arch/s390/kvm/dat.c
654
union skey skey, bool nq)
arch/s390/kvm/dat.c
667
page_set_storage_key(large_crste_to_phys(*crstep, gfn), skey.skey, !nq);
arch/s390/kvm/dat.c
674
pgste.acc = skey.acc;
arch/s390/kvm/dat.c
675
pgste.fp = skey.fp;
arch/s390/kvm/dat.c
676
pgste.gc = skey.c;
arch/s390/kvm/dat.c
677
pgste.gr = skey.r;
arch/s390/kvm/dat.c
680
union skey old_skey;
arch/s390/kvm/dat.c
682
old_skey.skey = page_get_storage_key(pte_origin(*ptep));
arch/s390/kvm/dat.c
687
skey.r = 0;
arch/s390/kvm/dat.c
688
skey.c = 0;
arch/s390/kvm/dat.c
689
page_set_storage_key(pte_origin(*ptep), skey.skey, !nq);
arch/s390/kvm/dat.c
697
static bool page_cond_set_storage_key(phys_addr_t paddr, union skey skey, union skey *oldkey,
arch/s390/kvm/dat.c
700
oldkey->skey = page_get_storage_key(paddr);
arch/s390/kvm/dat.c
701
if (oldkey->acc == skey.acc && oldkey->fp == skey.fp &&
arch/s390/kvm/dat.c
702
(oldkey->r == skey.r || mr) && (oldkey->c == skey.c || mc))
arch/s390/kvm/dat.c
704
page_set_storage_key(paddr, skey.skey, !nq);
arch/s390/kvm/dat.c
709
union skey skey, union skey *oldkey, bool nq, bool mr, bool mc)
arch/s390/kvm/dat.c
713
union skey prev;
arch/s390/kvm/dat.c
723
return page_cond_set_storage_key(large_crste_to_phys(*crstep, gfn), skey, oldkey,
arch/s390/kvm/dat.c
730
pgste.acc = skey.acc;
arch/s390/kvm/dat.c
731
pgste.fp = skey.fp;
arch/s390/kvm/dat.c
732
pgste.gc = skey.c;
arch/s390/kvm/dat.c
733
pgste.gr = skey.r;
arch/s390/kvm/dat.c
736
rc = page_cond_set_storage_key(pte_origin(*ptep), skey, &prev, nq, mr, mc);
arch/s390/kvm/dat.h
293
unsigned char skey;
arch/s390/kvm/dat.h
310
static_assert(sizeof(union skey) == sizeof(char));
arch/s390/kvm/dat.h
528
int dat_get_storage_key(union asce asce, gfn_t gfn, union skey *skey);
arch/s390/kvm/dat.h
530
union skey skey, bool nq);
arch/s390/kvm/dat.h
532
union skey skey, union skey *oldkey, bool nq, bool mr, bool mc);
arch/s390/kvm/gaccess.c
656
union skey storage_key;
arch/s390/kvm/gaccess.c
708
union skey storage_key;
arch/s390/kvm/kvm-s390.c
2093
union skey *keys;
arch/s390/kvm/kvm-s390.c
2134
union skey *keys;
arch/s390/kvm/kvm-s390.c
2968
union skey skey;
arch/s390/kvm/kvm-s390.c
2974
skey.skey = kop.key;
arch/s390/kvm/kvm-s390.c
2980
r = kvm_s390_keyop(mc, kvm, kop.operation, kop.guest_addr, skey);
arch/s390/kvm/kvm-s390.c
558
unsigned long addr, union skey skey)
arch/s390/kvm/kvm-s390.c
568
r = dat_cond_set_storage_key(mc, asce, gfn, skey, &skey, 0, 0, 0);
arch/s390/kvm/kvm-s390.c
570
return skey.skey;
arch/s390/kvm/kvm-s390.c
573
r = dat_get_storage_key(asce, gfn, &skey);
arch/s390/kvm/kvm-s390.c
575
return skey.skey;
arch/s390/kvm/priv.c
1044
union skey key;
arch/s390/kvm/priv.c
1072
key.skey = vcpu->run->s.regs.gprs[reg1] & PFMF_KEY;
arch/s390/kvm/priv.c
261
union skey key;
arch/s390/kvm/priv.c
285
vcpu->run->s.regs.gprs[reg1] |= key.skey;
arch/s390/kvm/priv.c
327
union skey key, oldkey;
arch/s390/kvm/priv.c
349
key.skey = vcpu->run->s.regs.gprs[reg1] & 0xfe;
arch/s390/kvm/priv.c
384
vcpu->run->s.regs.gprs[reg1] |= (u64)oldkey.skey << 8;
drivers/message/fusion/mptscsih.c
439
u8 skey, asc, ascq;
drivers/message/fusion/mptscsih.c
552
skey = sc->sense_buffer[2] & 0x0F;
drivers/message/fusion/mptscsih.c
557
"[0x%02x,0x%02x,0x%02x]\n", ioc->name, skey, asc, ascq);
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
118
e->key = skey;
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
69
esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key)
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
74
if (!memcmp(&e->key, skey, sizeof(*skey)))
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
87
struct mlx5_vport_key skey;
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
92
hkey = flow_attr_to_vport_key(esw, attr, &skey);
drivers/net/ethernet/mellanox/mlx5/core/esw/vporttbl.c
93
e = esw_vport_tbl_lookup(esw, &skey, hkey);
drivers/nvme/common/auth.c
307
static int nvme_auth_hash_skey(int hmac_id, u8 *skey, size_t skey_len, u8 *hkey)
drivers/nvme/common/auth.c
323
ret = crypto_shash_tfm_digest(tfm, skey, skey_len, hkey);
drivers/nvme/common/auth.c
332
int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len,
drivers/nvme/common/auth.c
344
ret = nvme_auth_hash_skey(hmac_id, skey,
drivers/nvme/common/auth.c
489
int nvme_auth_generate_psk(u8 hmac_id, u8 *skey, size_t skey_len,
drivers/nvme/common/auth.c
520
ret = crypto_shash_setkey(tfm, skey, skey_len);
drivers/s390/char/sclp_early.c
96
sclp.has_skey = cpue->skey;
drivers/scsi/mpt3sas/mpt3sas_scsih.c
233
u8 skey;
drivers/scsi/mpt3sas/mpt3sas_scsih.c
5597
data->skey = sense_buffer[1] & 0x0F;
drivers/scsi/mpt3sas/mpt3sas_scsih.c
5602
data->skey = sense_buffer[2] & 0x0F;
drivers/scsi/mpt3sas/mpt3sas_scsih.c
5810
data.skey, data.asc, data.ascq,
drivers/scsi/mpt3sas/mpt3sas_scsih.c
6104
mpt3sas_trigger_scsi(ioc, data.skey, data.asc, data.ascq);
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7682
if (sense_info.skey == UNIT_ATTENTION)
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7684
else if (sense_info.skey == NOT_READY) {
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7700
} else if (sense_info.skey == ILLEGAL_REQUEST &&
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7703
} else if (sense_info.skey == MEDIUM_ERROR) {
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7711
} else if (sense_info.skey == HARDWARE_ERROR) {
drivers/scsi/mpt3sas/mpt3sas_scsih.c
7750
sense_info.skey, sense_info.asc, sense_info.ascq);
drivers/staging/rtl8723bs/core/rtw_cmd.c
885
memcpy(&psetstakey_para->key, &psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey, 16);
drivers/staging/rtl8723bs/core/rtw_ioctl_set.c
449
memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length);
drivers/staging/rtl8723bs/core/rtw_mlme.c
1934
memcpy(&psetkeyparm->key[0], &psecuritypriv->dot11DefKey[keyid].skey[0], keylen);
drivers/staging/rtl8723bs/core/rtw_mlme.c
1938
memcpy(&psetkeyparm->key[0], &psecuritypriv->dot11DefKey[keyid].skey[0], keylen);
drivers/staging/rtl8723bs/core/rtw_recv.c
381
mickey = &psecuritypriv->dot118021XGrprxmickey[prxattrib->key_index].skey[0];
drivers/staging/rtl8723bs/core/rtw_recv.c
390
mickey = &stainfo->dot11tkiprxmickey.skey[0];
drivers/staging/rtl8723bs/core/rtw_security.c
115
memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength);
drivers/staging/rtl8723bs/core/rtw_security.c
1262
prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey;
drivers/staging/rtl8723bs/core/rtw_security.c
1268
prwskey = &stainfo->dot118021x_UncstKey.skey[0];
drivers/staging/rtl8723bs/core/rtw_security.c
1337
if (omac1_aes_128(padapter->securitypriv.dot11wBIPKey[padapter->securitypriv.dot11wBIPKeyid].skey
drivers/staging/rtl8723bs/core/rtw_security.c
460
prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey;
drivers/staging/rtl8723bs/core/rtw_security.c
462
prwskey = pattrib->dot118021x_UncstKey.skey;
drivers/staging/rtl8723bs/core/rtw_security.c
569
prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey;
drivers/staging/rtl8723bs/core/rtw_security.c
571
prwskey = &stainfo->dot118021x_UncstKey.skey[0];
drivers/staging/rtl8723bs/core/rtw_security.c
66
memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength);
drivers/staging/rtl8723bs/core/rtw_security.c
974
prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey;
drivers/staging/rtl8723bs/core/rtw_security.c
976
prwskey = pattrib->dot118021x_UncstKey.skey;
drivers/staging/rtl8723bs/core/rtw_xmit.c
1251
if (omac1_aes_128(padapter->securitypriv.dot11wBIPKey[padapter->securitypriv.dot11wBIPKeyid].skey
drivers/staging/rtl8723bs/core/rtw_xmit.c
1282
memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16);
drivers/staging/rtl8723bs/core/rtw_xmit.c
481
memset(pattrib->dot118021x_UncstKey.skey, 0, 16);
drivers/staging/rtl8723bs/core/rtw_xmit.c
482
memset(pattrib->dot11tkiptxmickey.skey, 0, 16);
drivers/staging/rtl8723bs/core/rtw_xmit.c
539
memcpy(pattrib->dot11tkiptxmickey.skey, psta->dot11tkiptxmickey.skey, 16);
drivers/staging/rtl8723bs/core/rtw_xmit.c
562
memcpy(pattrib->dot118021x_UncstKey.skey, psta->dot118021x_UncstKey.skey, 16);
drivers/staging/rtl8723bs/core/rtw_xmit.c
802
if (!memcmp(psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey, null_key, 16))
drivers/staging/rtl8723bs/core/rtw_xmit.c
805
rtw_secmicsetkey(&micdata, psecuritypriv->dot118021XGrptxmickey[psecuritypriv->dot118021XGrpKeyid].skey);
drivers/staging/rtl8723bs/core/rtw_xmit.c
807
if (!memcmp(&pattrib->dot11tkiptxmickey.skey[0], null_key, 16))
drivers/staging/rtl8723bs/core/rtw_xmit.c
810
rtw_secmicsetkey(&micdata, &pattrib->dot11tkiptxmickey.skey[0]);
drivers/staging/rtl8723bs/include/rtw_security.h
78
u8 skey[16];
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
505
char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey;
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
506
char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey;
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
507
char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey;
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
562
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
622
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
632
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
633
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
758
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
785
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
788
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
789
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
798
memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
799
memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
800
memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
drivers/staging/rtl8723bs/os_dep/ioctl_cfg80211.c
807
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
fs/sysfs/file.c
310
key = attr->key ?: (struct lock_class_key *)&attr->skey;
fs/sysfs/file.c
345
key = attr->key ?: (struct lock_class_key *)&attr->skey;
include/linux/nvme-auth.h
35
int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len,
include/linux/nvme-auth.h
43
int nvme_auth_generate_psk(u8 hmac_id, u8 *skey, size_t skey_len,
include/linux/sysfs.h
36
struct lock_class_key skey;
include/net/sock.h
1686
#define sock_lock_init_class_and_name(sk, sname, skey, name, key) \
include/net/sock.h
1695
(skey), (sname)); \
net/l2tp/l2tp_debugfs.c
38
unsigned long skey; /* lookup key of current session */
net/l2tp/l2tp_debugfs.c
61
pd->tunnel->tunnel_id, &pd->skey);
net/l2tp/l2tp_debugfs.c
62
pd->skey++;
net/l2tp/l2tp_debugfs.c
65
pd->skey = 0;
net/l2tp/l2tp_netlink.c
496
unsigned long skey;
net/l2tp/l2tp_netlink.c
846
unsigned long skey = cbd->skey;
net/l2tp/l2tp_netlink.c
856
tunnel->tunnel_id, &skey);
net/l2tp/l2tp_netlink.c
861
skey = 0;
net/l2tp/l2tp_netlink.c
874
skey++;
net/l2tp/l2tp_netlink.c
879
cbd->skey = skey;
net/l2tp/l2tp_ppp.c
1392
unsigned long skey; /* lookup key of current session */
net/l2tp/l2tp_ppp.c
1423
pd->tunnel->tunnel_id, &pd->skey);
net/l2tp/l2tp_ppp.c
1424
pd->skey++;
net/l2tp/l2tp_ppp.c
1427
pd->skey = 0;
net/mac802154/llsec.c
362
u32 skey = llsec_dev_hash_short(dev->short_addr, dev->pan_id);
net/mac802154/llsec.c
381
hash_add_rcu(sec->devices_short, &entry->bucket_s, skey);
net/tipc/crypto.c
1222
kfree_sensitive(rx->skey);
net/tipc/crypto.c
1223
rx->skey = NULL;
net/tipc/crypto.c
1878
rx->nokey = !(rx->skey ||
net/tipc/crypto.c
211
struct tipc_aead_key *skey;
net/tipc/crypto.c
2238
static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey,
net/tipc/crypto.c
2248
size = tipc_aead_key_size(skey);
net/tipc/crypto.c
2261
*((__be32 *)(data + TIPC_AEAD_ALG_NAME)) = htonl(skey->keylen);
net/tipc/crypto.c
2262
memcpy(data, skey->alg_name, TIPC_AEAD_ALG_NAME);
net/tipc/crypto.c
2263
memcpy(data + TIPC_AEAD_ALG_NAME + sizeof(__be32), skey->key,
net/tipc/crypto.c
2264
skey->keylen);
net/tipc/crypto.c
2290
struct tipc_aead_key *skey = NULL;
net/tipc/crypto.c
2312
if (unlikely(rx->skey || (key_gen == rx->key_gen && rx->key.keys))) {
net/tipc/crypto.c
2314
rx->skey, key_gen, rx->key_gen);
net/tipc/crypto.c
2319
skey = kmalloc(size, GFP_ATOMIC);
net/tipc/crypto.c
2320
if (unlikely(!skey)) {
net/tipc/crypto.c
2326
skey->keylen = keylen;
net/tipc/crypto.c
2327
memcpy(skey->alg_name, data, TIPC_AEAD_ALG_NAME);
net/tipc/crypto.c
2328
memcpy(skey->key, data + TIPC_AEAD_ALG_NAME + sizeof(__be32),
net/tipc/crypto.c
2329
skey->keylen);
net/tipc/crypto.c
2333
rx->skey = skey;
net/tipc/crypto.c
2342
if (likely(skey && queue_delayed_work(tx->wq, &rx->work, 0)))
net/tipc/crypto.c
2384
if (rx->skey) {
net/tipc/crypto.c
2385
rc = tipc_crypto_key_init(rx, rx->skey, rx->skey_mode, false);
net/tipc/crypto.c
2397
kfree_sensitive(rx->skey);
net/tipc/crypto.c
2398
rx->skey = NULL;
net/tipc/crypto.c
2448
struct tipc_aead_key *skey = NULL;
net/tipc/crypto.c
2466
skey = kmemdup(aead->key, tipc_aead_key_size(aead->key), GFP_ATOMIC);
net/tipc/crypto.c
2470
if (likely(skey)) {
net/tipc/crypto.c
2471
rc = tipc_aead_key_generate(skey) ?:
net/tipc/crypto.c
2472
tipc_crypto_key_init(tx, skey, PER_NODE_KEY, false);
net/tipc/crypto.c
2475
kfree_sensitive(skey);
net/tipc/crypto.c
303
static int tipc_crypto_key_xmit(struct net *net, struct tipc_aead_key *skey,
net/tipc/crypto.c
308
static int tipc_aead_key_generate(struct tipc_aead_key *skey);
net/tipc/crypto.c
368
static int tipc_aead_key_generate(struct tipc_aead_key *skey)
net/tipc/crypto.c
375
rc = crypto_rng_get_bytes(crypto_default_rng, skey->key,
net/tipc/crypto.c
376
skey->keylen);
tools/testing/selftests/kvm/s390/keyop.c
71
static int do_keyop(struct kvm_vcpu *vcpu, int op, unsigned long page_idx, unsigned char skey)
tools/testing/selftests/kvm/s390/keyop.c
75
.key = skey,
tools/testing/selftests/kvm/s390/keyop.c
84
page_idx, skey, keyop.key);
tools/testing/selftests/kvm/s390/shared_zeropage_test.c
16
static void set_storage_key(void *addr, uint8_t skey)
tools/testing/selftests/kvm/s390/shared_zeropage_test.c
18
asm volatile("sske %0,%1" : : "d" (skey), "a" (addr));