/dports/multimedia/libv4l/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.h | 138 const u8 *token, int keybitsize); 148 const u8 *token, int keybitsize, 162 int cca_genseckey(u16 cardnr, u16 domain, u32 keybitsize, u8 *seckey); 167 int cca_clr2seckey(u16 cardnr, u16 domain, u32 keybitsize, 180 int cca_gencipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags, 192 int cca_clr2cipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|
H A D | zcrypt_ccamisc.c | 72 if (keybitsize > 0 && t->bitsize != keybitsize) { in cca_check_secaeskeytoken() 137 if (keybitsize > 0) { in cca_check_secaescipherkey() 138 switch (keybitsize) { in cca_check_secaescipherkey() 158 __func__, keybitsize); in cca_check_secaescipherkey() 353 switch (keybitsize) { in cca_genseckey() 371 __func__, keybitsize); in cca_genseckey() 494 switch (keybitsize) { in cca_clr2seckey() 509 __func__, keybitsize); in cca_clr2seckey() 837 switch (keybitsize) { in cca_gencipherkey() 845 __func__, keybitsize); in cca_gencipherkey() [all …]
|
H A D | zcrypt_ep11misc.c | 708 switch (keybitsize) { in ep11_genaeskey() 716 __func__, keybitsize); in ep11_genaeskey() 732 req_pl->keybytes = keybitsize / 8; in ep11_genaeskey() 742 req_pl->attr_val_len_value = keybitsize / 8; in ep11_genaeskey() 791 kb->head.keybitlen = keybitsize; in ep11_genaeskey() 932 u32 keybitsize, u32 keygenflags, in ep11_unwrapkey() argument 1059 kb->head.keybitlen = keybitsize; in ep11_unwrapkey() 1209 if (keybitsize == 128 || keybitsize == 192 || keybitsize == 256) in ep11_clr2keyblob() 1210 clrkeylen = keybitsize / 8; in ep11_clr2keyblob() 1214 __func__, keybitsize); in ep11_clr2keyblob() [all …]
|
H A D | zcrypt_ep11misc.h | 116 int ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, 122 int ep11_clr2keyblob(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.h | 138 const u8 *token, int keybitsize); 148 const u8 *token, int keybitsize, 162 int cca_genseckey(u16 cardnr, u16 domain, u32 keybitsize, u8 *seckey); 167 int cca_clr2seckey(u16 cardnr, u16 domain, u32 keybitsize, 180 int cca_gencipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags, 192 int cca_clr2cipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|
H A D | zcrypt_ccamisc.c | 72 if (keybitsize > 0 && t->bitsize != keybitsize) { in cca_check_secaeskeytoken() 137 if (keybitsize > 0) { in cca_check_secaescipherkey() 138 switch (keybitsize) { in cca_check_secaescipherkey() 158 __func__, keybitsize); in cca_check_secaescipherkey() 353 switch (keybitsize) { in cca_genseckey() 371 __func__, keybitsize); in cca_genseckey() 494 switch (keybitsize) { in cca_clr2seckey() 509 __func__, keybitsize); in cca_clr2seckey() 837 switch (keybitsize) { in cca_gencipherkey() 845 __func__, keybitsize); in cca_gencipherkey() [all …]
|
H A D | zcrypt_ep11misc.c | 708 switch (keybitsize) { in ep11_genaeskey() 716 __func__, keybitsize); in ep11_genaeskey() 732 req_pl->keybytes = keybitsize / 8; in ep11_genaeskey() 742 req_pl->attr_val_len_value = keybitsize / 8; in ep11_genaeskey() 791 kb->head.keybitlen = keybitsize; in ep11_genaeskey() 932 u32 keybitsize, u32 keygenflags, in ep11_unwrapkey() argument 1059 kb->head.keybitlen = keybitsize; in ep11_unwrapkey() 1209 if (keybitsize == 128 || keybitsize == 192 || keybitsize == 256) in ep11_clr2keyblob() 1210 clrkeylen = keybitsize / 8; in ep11_clr2keyblob() 1214 __func__, keybitsize); in ep11_clr2keyblob() [all …]
|
H A D | zcrypt_ep11misc.h | 116 int ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, 122 int ep11_clr2keyblob(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.h | 138 const u8 *token, int keybitsize); 148 const u8 *token, int keybitsize, 162 int cca_genseckey(u16 cardnr, u16 domain, u32 keybitsize, u8 *seckey); 167 int cca_clr2seckey(u16 cardnr, u16 domain, u32 keybitsize, 180 int cca_gencipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags, 192 int cca_clr2cipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|
H A D | zcrypt_ccamisc.c | 72 if (keybitsize > 0 && t->bitsize != keybitsize) { in cca_check_secaeskeytoken() 137 if (keybitsize > 0) { in cca_check_secaescipherkey() 138 switch (keybitsize) { in cca_check_secaescipherkey() 158 __func__, keybitsize); in cca_check_secaescipherkey() 353 switch (keybitsize) { in cca_genseckey() 371 __func__, keybitsize); in cca_genseckey() 494 switch (keybitsize) { in cca_clr2seckey() 509 __func__, keybitsize); in cca_clr2seckey() 837 switch (keybitsize) { in cca_gencipherkey() 845 __func__, keybitsize); in cca_gencipherkey() [all …]
|
H A D | zcrypt_ep11misc.c | 708 switch (keybitsize) { in ep11_genaeskey() 716 __func__, keybitsize); in ep11_genaeskey() 732 req_pl->keybytes = keybitsize / 8; in ep11_genaeskey() 742 req_pl->attr_val_len_value = keybitsize / 8; in ep11_genaeskey() 791 kb->head.keybitlen = keybitsize; in ep11_genaeskey() 932 u32 keybitsize, u32 keygenflags, in ep11_unwrapkey() argument 1059 kb->head.keybitlen = keybitsize; in ep11_unwrapkey() 1209 if (keybitsize == 128 || keybitsize == 192 || keybitsize == 256) in ep11_clr2keyblob() 1210 clrkeylen = keybitsize / 8; in ep11_clr2keyblob() 1214 __func__, keybitsize); in ep11_clr2keyblob() [all …]
|
H A D | zcrypt_ep11misc.h | 116 int ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, 122 int ep11_clr2keyblob(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
|