/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/ |
H A D | upg_check_boot_bin.h | 75 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member 99 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member 119 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member
|
H A D | upg_check_boot_bin.c | 59 if (sub_key->key_type == MAINTENANCE_KEY_TPYE) { in upg_check_die_id()
|
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/mac/hmac/ |
H A D | hmac_11i.c | 1208 wlan_cipher_key_type_enum_uint8 key_type; in hmac_en_mic() local 1211 key_type = hmac_user->base_user->user_tx_info.security.cipher_key_type; in hmac_en_mic() 1213 key = mac_user_get_key(hmac_user->base_user, key_type - 1); in hmac_en_mic() 1215 oam_error_log1(0, OAM_SF_WPA, "{hmac_en_mic::mac_user_get_key FAIL. en_key_type[%d]}", key_type); in hmac_en_mic() 1221 if (key_type == 0 || key_type > 5) { /* 5 边界 */ in hmac_en_mic() 1255 wlan_cipher_key_type_enum_uint8 key_type; in hmac_de_mic() local 1257 key_type = hmac_user->base_user->user_tx_info.security.cipher_key_type; in hmac_de_mic() 1259 key = mac_user_get_key(hmac_user->base_user, key_type - 1); in hmac_de_mic() 1261 oam_error_log1(0, OAM_SF_WPA, "{hmac_de_mic::mac_user_get_key FAIL. en_key_type[%d]}", key_type); in hmac_de_mic() [all...] |
H A D | hmac_ext_if.h | 176 oal_nl80211_key_type key_type; member
|
H A D | dmac_ext_if.h | 437 oal_nl80211_key_type key_type; member
|
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/oal/ |
H A D | oal_cfg80211.c | 222 enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp) in oal_cfg80211_mic_failure() 225 cfg80211_michael_mic_failure(net_device, mac_addr, key_type, key_id, tsc, en_gfp); in oal_cfg80211_mic_failure() 229 hi_unref_param(key_type); in oal_cfg80211_mic_failure() 221 oal_cfg80211_mic_failure(oal_net_device_stru *net_device, const hi_u8 *mac_addr, enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp) oal_cfg80211_mic_failure() argument
|
H A D | oal_cfg80211.h | 86 enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp);
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/libcoap/include/coap2/ |
H A D | coap_dtls.h | 164 coap_pki_key_t key_type; /**< key format type */ member
|
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/wal/ |
H A D | wal_cfg80211_apt.c | 613 cfg80211_michael_mic_failure(netdev, mic_event->auc_user_mac, mic_event->key_type, mic_event->l_key_id, puc_tsc, in cfg80211_mic_failure() 616 mic_failure.key_type = mic_event->key_type; in cfg80211_mic_failure()
|
H A D | hi_wifi_driver_wpa_if.h | 565 oal_nl80211_key_type key_type; member
|
H A D | wal_event.c | 528 oal_cfg80211_mic_failure(netdev, mic_event->auc_user_mac, mic_event->key_type, mic_event->l_key_id, HI_NULL, in wal_mic_failure_proc()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/ |
H A D | hks_types.h | 219 uint32_t key_type; /* algorithm */ member
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/components/at/src/ |
H A D | at_demo_hks.c | 230 key_param->key_type = HKS_KEY_TYPE_AES; in hks_set_conn_key_param() 509 key_param->key_type = HKS_KEY_TYPE_AES; in hks_set_cert_key_param()
|
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/ |
H A D | wl_cfgnan.h | 414 nan_security_key_input_type key_type; /* cipher suite type */ member 440 nan_security_key_input_type key_type; /* cipher suite type */ member
|
H A D | wl_cfgnan.c | 4486 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_sd_params_handler() 4487 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_sd_params_handler() 5982 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_data_path_request_handler() 5983 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_data_path_request_handler() 6249 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_data_path_response_handler() 6250 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_data_path_response_handler()
|
H A D | wl_cfgvendor.c | 3512 cmd_data->key_type = nla_get_u8(iter); in wl_cfgvendor_nan_parse_datapath_args() 3513 WL_TRACE(("Key Type = %u\n", cmd_data->key_type)); in wl_cfgvendor_nan_parse_datapath_args() 4065 cmd_data->key_type = nla_get_u8(iter); in wl_cfgvendor_nan_parse_discover_args() 4066 WL_TRACE(("Key Type = %u\n", cmd_data->key_type)); in wl_cfgvendor_nan_parse_discover_args()
|
H A D | wl_cfg80211.c | 16407 enum nl80211_key_type key_type; in wl_notify_mic_status() local 16415 key_type = NL80211_KEYTYPE_GROUP; in wl_notify_mic_status() 16417 key_type = NL80211_KEYTYPE_PAIRWISE; in wl_notify_mic_status() 16420 cfg80211_michael_mic_failure(ndev, (const u8 *)&e->addr, key_type, -1, in wl_notify_mic_status() local
|
/device/soc/rockchip/common/sdk_linux/kernel/bpf/ |
H A D | syscall.c | 740 int map_check_no_btf(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type, in map_check_no_btf() argument 748 const struct btf_type *key_type, *value_type; in map_check_btf() local 754 key_type = btf_type_id_size(btf, &btf_key_id, &key_size); in map_check_btf() 755 if (!key_type || key_size != map->key_size) { in map_check_btf() 759 key_type = btf_type_by_id(btf, 0); in map_check_btf() 788 ret = map->ops->map_check_btf(map, btf, key_type, value_type); in map_check_btf()
|
/device/soc/rockchip/common/sdk_linux/include/linux/ |
H A D | bpf.h | 84 int (*map_check_btf)(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type, 226 int map_check_no_btf(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type,
|
/device/soc/rockchip/common/sdk_linux/fs/ubifs/ |
H A D | recovery.c | 1424 switch (key_type(c, key)) { in ubifs_recover_size_accum()
|