OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-213
/
arch
/
s390
/
include
/
uapi
/
asm
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:13 AM
rwxr-xr-x
📄
Kbuild
321 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
auxvec.h
214 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
bitsperlong.h
293 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
bpf_perf_event.h
226 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
byteorder.h
188 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
chpid.h
456 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
chsc.h
2.96 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
clp.h
549 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmb.h
1.87 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
dasd.h
12.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
debug.h
857 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
guarded_storage.h
1.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hypfs.h
1.35 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ioctls.h
191 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ipcbuf.h
738 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm.h
7.73 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_para.h
224 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_perf.h
474 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
monwriter.h
939 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
msgbuf.h
1.14 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
perf_regs.h
887 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pkey.h
4.35 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
posix_types.h
1.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ptrace.h
11.39 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
qeth.h
3.05 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
schid.h
332 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sclp_ctl.h
465 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sembuf.h
864 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
setup.h
292 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
shmbuf.h
1.34 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sie.h
9.25 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sigcontext.h
1.73 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
siginfo.h
302 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
signal.h
3.26 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
socket.h
2.24 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stat.h
2.9 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
statfs.h
1.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sthyi.h
178 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
tape390.h
2.76 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
termios.h
1.14 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
types.h
525 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ucontext.h
1.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
unistd.h
12.32 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
virtio-ccw.h
444 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
vmcp.h
737 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
vtoc.h
7.36 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
zcrypt.h
10.94 KB
06/16/2023 05:32:39 PM
rw-r--r--
Editing: pkey.h
Close
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ /* * Userspace interface to the pkey device driver * * Copyright IBM Corp. 2017 * * Author: Harald Freudenberger <freude@de.ibm.com> * */ #ifndef _UAPI_PKEY_H #define _UAPI_PKEY_H #include <linux/ioctl.h> #include <linux/types.h> /* * Ioctl calls supported by the pkey device driver */ #define PKEY_IOCTL_MAGIC 'p' #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ #define MAXCLRKEYSIZE 32 /* a clear key value may be up to 32 bytes */ /* defines for the type field within the pkey_protkey struct */ #define PKEY_KEYTYPE_AES_128 1 #define PKEY_KEYTYPE_AES_192 2 #define PKEY_KEYTYPE_AES_256 3 /* Struct to hold a secure key blob */ struct pkey_seckey { __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ }; /* Struct to hold protected key and length info */ struct pkey_protkey { __u32 type; /* key type, one of the PKEY_KEYTYPE values */ __u32 len; /* bytes actually stored in protkey[] */ __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ }; /* Struct to hold a clear key value */ struct pkey_clrkey { __u8 clrkey[MAXCLRKEYSIZE]; /* 16, 24, or 32 byte clear key value */ }; /* * Generate secure key */ struct pkey_genseck { __u16 cardnr; /* in: card to use or FFFF for any */ __u16 domain; /* in: domain or FFFF for any */ __u32 keytype; /* in: key type to generate */ struct pkey_seckey seckey; /* out: the secure key blob */ }; #define PKEY_GENSECK _IOWR(PKEY_IOCTL_MAGIC, 0x01, struct pkey_genseck) /* * Construct secure key from clear key value */ struct pkey_clr2seck { __u16 cardnr; /* in: card to use or FFFF for any */ __u16 domain; /* in: domain or FFFF for any */ __u32 keytype; /* in: key type to generate */ struct pkey_clrkey clrkey; /* in: the clear key value */ struct pkey_seckey seckey; /* out: the secure key blob */ }; #define PKEY_CLR2SECK _IOWR(PKEY_IOCTL_MAGIC, 0x02, struct pkey_clr2seck) /* * Fabricate protected key from a secure key */ struct pkey_sec2protk { __u16 cardnr; /* in: card to use or FFFF for any */ __u16 domain; /* in: domain or FFFF for any */ struct pkey_seckey seckey; /* in: the secure key blob */ struct pkey_protkey protkey; /* out: the protected key */ }; #define PKEY_SEC2PROTK _IOWR(PKEY_IOCTL_MAGIC, 0x03, struct pkey_sec2protk) /* * Fabricate protected key from an clear key value */ struct pkey_clr2protk { __u32 keytype; /* in: key type to generate */ struct pkey_clrkey clrkey; /* in: the clear key value */ struct pkey_protkey protkey; /* out: the protected key */ }; #define PKEY_CLR2PROTK _IOWR(PKEY_IOCTL_MAGIC, 0x04, struct pkey_clr2protk) /* * Search for matching crypto card based on the Master Key * Verification Pattern provided inside a secure key. */ struct pkey_findcard { struct pkey_seckey seckey; /* in: the secure key blob */ __u16 cardnr; /* out: card number */ __u16 domain; /* out: domain number */ }; #define PKEY_FINDCARD _IOWR(PKEY_IOCTL_MAGIC, 0x05, struct pkey_findcard) /* * Combined together: findcard + sec2prot */ struct pkey_skey2pkey { struct pkey_seckey seckey; /* in: the secure key blob */ struct pkey_protkey protkey; /* out: the protected key */ }; #define PKEY_SKEY2PKEY _IOWR(PKEY_IOCTL_MAGIC, 0x06, struct pkey_skey2pkey) /* * Verify the given secure key for being able to be useable with * the pkey module. Check for correct key type and check for having at * least one crypto card being able to handle this key (master key * or old master key verification pattern matches). * Return some info about the key: keysize in bits, keytype (currently * only AES), flag if key is wrapped with an old MKVP. */ struct pkey_verifykey { struct pkey_seckey seckey; /* in: the secure key blob */ __u16 cardnr; /* out: card number */ __u16 domain; /* out: domain number */ __u16 keysize; /* out: key size in bits */ __u32 attributes; /* out: attribute bits */ }; #define PKEY_VERIFYKEY _IOWR(PKEY_IOCTL_MAGIC, 0x07, struct pkey_verifykey) #define PKEY_VERIFY_ATTR_AES 0x00000001 /* key is an AES key */ #define PKEY_VERIFY_ATTR_OLD_MKVP 0x00000100 /* key has old MKVP value */ #endif /* _UAPI_PKEY_H */