Home
last modified time | relevance | path

Searched refs:key_type (Results 1 – 15 of 15) sorted by relevance

/net/bluetooth/
Damp.c178 BT_DBG("conn %p key_type %d", conn, conn->key_type); in phylink_gen_key()
181 if (conn->key_type < 3) { in phylink_gen_key()
182 bt_dev_err(hdev, "legacy key type %u", conn->key_type); in phylink_gen_key()
186 *type = conn->key_type; in phylink_gen_key()
206 if (conn->key_type == HCI_LK_DEBUG_COMBINATION) { in phylink_gen_key()
453 &cp.key_type)) { in amp_create_phylink()
492 &cp.key_type)) { in amp_accept_phylink()
Dhci_conn.c572 conn->key_type = 0xff; in hci_conn_add()
1386 conn->key_type != HCI_LK_AUTH_COMBINATION_P256) in hci_conn_check_link_mode()
1485 switch (conn->key_type) { in hci_conn_security()
Dhci_event.c3172 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256) in hci_encrypt_change_evt()
4074 static void conn_set_key(struct hci_conn *conn, u8 key_type, u8 pin_len) in conn_set_key() argument
4076 if (key_type == HCI_LK_CHANGED_COMBINATION) in conn_set_key()
4080 conn->key_type = key_type; in conn_set_key()
4082 switch (key_type) { in conn_set_key()
4196 conn_set_key(conn, ev->key_type, conn->pin_length); in hci_link_key_notify_evt()
4202 ev->key_type, pin_len, &persistent); in hci_link_key_notify_evt()
4209 if (ev->key_type == HCI_LK_CHANGED_COMBINATION) in hci_link_key_notify_evt()
Dhci_core.c2441 u8 key_type, u8 old_key_type) in hci_persistent_key() argument
2444 if (key_type < 0x03) in hci_persistent_key()
2448 if (key_type == HCI_LK_DEBUG_COMBINATION) in hci_persistent_key()
2452 if (key_type == HCI_LK_CHANGED_COMBINATION && old_key_type == 0xff) in hci_persistent_key()
2596 old_key_type = conn ? conn->key_type : 0xff; in hci_add_link_key()
2612 conn->key_type = type; in hci_add_link_key()
Dsmp.c1046 if (hcon->key_type == HCI_LK_DEBUG_COMBINATION) in smp_notify_keys()
1136 u8 key_type, auth; in sc_add_ltk() local
1139 key_type = SMP_LTK_P256_DEBUG; in sc_add_ltk()
1141 key_type = SMP_LTK_P256; in sc_add_ltk()
1149 key_type, auth, smp->tk, smp->enc_key_size, in sc_add_ltk()
/net/rxrpc/
Dserver_key.c36 struct key_type key_type_rxrpc_s = {
Dar-internal.h917 extern struct key_type key_type_rxrpc;
1080 extern struct key_type key_type_rxrpc_s;
Dkey.c36 struct key_type key_type_rxrpc = {
/net/wireless/
Dmlme.c226 enum nl80211_key_type key_type, int key_id, in cfg80211_michael_mic_failure() argument
238 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni", in cfg80211_michael_mic_failure()
247 trace_cfg80211_michael_mic_failure(dev, addr, key_type, key_id, tsc); in cfg80211_michael_mic_failure()
248 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); in cfg80211_michael_mic_failure()
Dnl80211.h95 enum nl80211_key_type key_type,
Dtrace.h3013 enum nl80211_key_type key_type, int key_id, const u8 *tsc),
3014 TP_ARGS(netdev, addr, key_type, key_id, tsc),
3018 __field(enum nl80211_key_type, key_type)
3025 __entry->key_type = key_type;
3031 NETDEV_PR_ARG, MAC_PR_ARG(addr), __entry->key_type,
Dnl80211.c18144 enum nl80211_key_type key_type, int key_id, in nl80211_michael_mic_failure() argument
18163 nla_put_u32(msg, NL80211_ATTR_KEY_TYPE, key_type) || in nl80211_michael_mic_failure()
/net/openvswitch/
Dflow_netlink.c2843 int key_type = nla_type(ovs_key); in validate_set() local
2854 if (key_type > OVS_KEY_ATTR_MAX || in validate_set()
2855 !check_attr_len(key_len, ovs_key_lens[key_type].len)) in validate_set()
2861 switch (key_type) { in validate_set()
2979 if (!masked && key_type != OVS_KEY_ATTR_TUNNEL) { in validate_set()
2991 at = __add_action(sfa, key_type, NULL, len, log); in validate_set()
2998 if (key_type == OVS_KEY_ATTR_IPV6) { in validate_set()
3660 int key_type = nla_type(ovs_key); in set_action_to_attr() local
3664 switch (key_type) { in set_action_to_attr()
/net/dns_resolver/
Ddns_key.c322 struct key_type key_type_dns_resolver = {
/net/ceph/
Dcrypto.c345 struct key_type key_type_ceph = {