/kernel/linux/linux-5.10/drivers/staging/wfx/ |
H A D | key.c | 56 u8 *keybuf = key->key; in fill_tkip_pair() local 61 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data)); in fill_tkip_pair() 62 keybuf += sizeof(msg->tkip_key_data); in fill_tkip_pair() 63 memcpy(msg->tx_mic_key, keybuf, sizeof(msg->tx_mic_key)); in fill_tkip_pair() 64 keybuf += sizeof(msg->tx_mic_key); in fill_tkip_pair() 65 memcpy(msg->rx_mic_key, keybuf, sizeof(msg->rx_mic_key)); in fill_tkip_pair() 75 u8 *keybuf = key->key; in fill_tkip_group() local 84 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data)); in fill_tkip_group() 85 keybuf += sizeof(msg->tkip_key_data); in fill_tkip_group() 88 memcpy(msg->rx_mic_key, keybuf in fill_tkip_group() 119 u8 *keybuf = key->key; fill_sms4_pair() local 134 u8 *keybuf = key->key; fill_sms4_group() local [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/silabs/wfx/ |
H A D | key.c | 56 u8 *keybuf = key->key; in fill_tkip_pair() local 60 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data)); in fill_tkip_pair() 61 keybuf += sizeof(msg->tkip_key_data); in fill_tkip_pair() 62 memcpy(msg->tx_mic_key, keybuf, sizeof(msg->tx_mic_key)); in fill_tkip_pair() 63 keybuf += sizeof(msg->tx_mic_key); in fill_tkip_pair() 64 memcpy(msg->rx_mic_key, keybuf, sizeof(msg->rx_mic_key)); in fill_tkip_pair() 72 u8 *keybuf = key->key; in fill_tkip_group() local 79 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data)); in fill_tkip_group() 80 keybuf += sizeof(msg->tkip_key_data); in fill_tkip_group() 83 memcpy(msg->rx_mic_key, keybuf in fill_tkip_group() 113 u8 *keybuf = key->key; fill_sms4_pair() local 128 u8 *keybuf = key->key; fill_sms4_group() local [all...] |
/kernel/linux/linux-5.10/drivers/media/pci/ivtv/ |
H A D | ivtv-i2c.c | 140 unsigned char keybuf[4]; in get_key_adaptec() local 142 keybuf[0] = 0x00; in get_key_adaptec() 143 i2c_master_send(ir->c, keybuf, 1); in get_key_adaptec() 145 if (i2c_master_recv(ir->c, keybuf, sizeof(keybuf)) != sizeof(keybuf)) { in get_key_adaptec() 150 if (keybuf[2] == 0xff) in get_key_adaptec() 154 keybuf[2] &= 0x7f; in get_key_adaptec() 155 keybuf[3] |= 0x80; in get_key_adaptec() 158 *scancode = keybuf[ in get_key_adaptec() [all...] |
/kernel/linux/linux-6.6/drivers/media/pci/ivtv/ |
H A D | ivtv-i2c.c | 140 unsigned char keybuf[4]; in get_key_adaptec() local 142 keybuf[0] = 0x00; in get_key_adaptec() 143 i2c_master_send(ir->c, keybuf, 1); in get_key_adaptec() 145 if (i2c_master_recv(ir->c, keybuf, sizeof(keybuf)) != sizeof(keybuf)) { in get_key_adaptec() 150 if (keybuf[2] == 0xff) in get_key_adaptec() 154 keybuf[2] &= 0x7f; in get_key_adaptec() 155 keybuf[3] |= 0x80; in get_key_adaptec() 158 *scancode = keybuf[ in get_key_adaptec() [all...] |
/kernel/linux/linux-5.10/drivers/md/bcache/ |
H A D | btree.h | 403 typedef bool (keybuf_pred_fn)(struct keybuf *buf, struct bkey *k); 405 void bch_keybuf_init(struct keybuf *buf); 406 void bch_refill_keybuf(struct cache_set *c, struct keybuf *buf, 408 bool bch_keybuf_check_overlapping(struct keybuf *buf, struct bkey *start, 410 void bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w); 411 struct keybuf_key *bch_keybuf_next(struct keybuf *buf); 413 struct keybuf *buf,
|
H A D | bcache.h | 223 struct keybuf; 231 struct keybuf { struct 345 struct keybuf writeback_keys; 656 struct keybuf moving_gc_keys;
|
/kernel/linux/linux-6.6/drivers/md/bcache/ |
H A D | btree.h | 403 typedef bool (keybuf_pred_fn)(struct keybuf *buf, struct bkey *k); 405 void bch_keybuf_init(struct keybuf *buf); 406 void bch_refill_keybuf(struct cache_set *c, struct keybuf *buf, 408 bool bch_keybuf_check_overlapping(struct keybuf *buf, struct bkey *start, 410 void bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w); 411 struct keybuf_key *bch_keybuf_next(struct keybuf *buf); 413 struct keybuf *buf,
|
H A D | bcache.h | 223 struct keybuf; 231 struct keybuf { struct 345 struct keybuf writeback_keys; 662 struct keybuf moving_gc_keys;
|
/kernel/linux/linux-5.10/drivers/media/usb/dvb-usb/ |
H A D | dvb-usb-remote.c | 363 u8 keybuf[5], u32 *event, int *state) in dvb_usb_nec_rc_key_to_event() 369 switch (keybuf[0]) { in dvb_usb_nec_rc_key_to_event() 373 if ((u8) ~keybuf[1] != keybuf[2] || in dvb_usb_nec_rc_key_to_event() 374 (u8) ~keybuf[3] != keybuf[4]) { in dvb_usb_nec_rc_key_to_event() 380 if (rc5_custom(&keymap[i]) == keybuf[1] && in dvb_usb_nec_rc_key_to_event() 381 rc5_data(&keymap[i]) == keybuf[3]) { in dvb_usb_nec_rc_key_to_event() 392 deb_err("unknown type of remote status: %d\n",keybuf[0]); in dvb_usb_nec_rc_key_to_event() 362 dvb_usb_nec_rc_key_to_event(struct dvb_usb_device *d, u8 keybuf[5], u32 *event, int *state) dvb_usb_nec_rc_key_to_event() argument
|
/kernel/linux/linux-6.6/drivers/media/usb/dvb-usb/ |
H A D | dvb-usb-remote.c | 363 u8 keybuf[5], u32 *event, int *state) in dvb_usb_nec_rc_key_to_event() 369 switch (keybuf[0]) { in dvb_usb_nec_rc_key_to_event() 373 if ((u8) ~keybuf[1] != keybuf[2] || in dvb_usb_nec_rc_key_to_event() 374 (u8) ~keybuf[3] != keybuf[4]) { in dvb_usb_nec_rc_key_to_event() 380 if (rc5_custom(&keymap[i]) == keybuf[1] && in dvb_usb_nec_rc_key_to_event() 381 rc5_data(&keymap[i]) == keybuf[3]) { in dvb_usb_nec_rc_key_to_event() 392 deb_err("unknown type of remote status: %d\n",keybuf[0]); in dvb_usb_nec_rc_key_to_event() 362 dvb_usb_nec_rc_key_to_event(struct dvb_usb_device *d, u8 keybuf[5], u32 *event, int *state) dvb_usb_nec_rc_key_to_event() argument
|
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | paes_s390.c | 46 * Small keys will be stored in the keybuf. Larger keys are 50 * sizeof(keybuf). See the two following helper functions. 53 u8 keybuf[128]; member 74 /* clear key value, prepare pkey clear key token in keybuf */ in _key_to_kb() 75 memset(kb->keybuf, 0, sizeof(kb->keybuf)); in _key_to_kb() 76 h = (struct clearkey_header *) kb->keybuf; in _key_to_kb() 80 memcpy(kb->keybuf + sizeof(*h), key, keylen); in _key_to_kb() 82 kb->key = kb->keybuf; in _key_to_kb() 86 if (keylen <= sizeof(kb->keybuf)) in _key_to_kb() [all...] |
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | paes_s390.c | 47 * Small keys will be stored in the keybuf. Larger keys are 51 * sizeof(keybuf). See the two following helper functions. 54 u8 keybuf[128]; member 75 /* clear key value, prepare pkey clear key token in keybuf */ in _key_to_kb() 76 memset(kb->keybuf, 0, sizeof(kb->keybuf)); in _key_to_kb() 77 h = (struct clearkey_header *) kb->keybuf; in _key_to_kb() 81 memcpy(kb->keybuf + sizeof(*h), key, keylen); in _key_to_kb() 83 kb->key = kb->keybuf; in _key_to_kb() 87 if (keylen <= sizeof(kb->keybuf)) in _key_to_kb() [all...] |
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.h | 110 u8 *keybuf, size_t *keybufsize); 116 const u8 *clrkey, u8 *keybuf, size_t *keybufsize);
|
H A D | zcrypt_ccamisc.h | 181 u8 *keybuf, size_t *keybufsize); 193 const u8 *clrkey, u8 *keybuf, size_t *keybufsize);
|
H A D | zcrypt_ep11misc.c | 669 u8 *keybuf, size_t *keybufsize) in ep11_genaeskey() 785 memcpy(keybuf, rep_pl->data, rep_pl->data_len); in ep11_genaeskey() 787 kb = (struct ep11keyblob *) keybuf; in ep11_genaeskey() 933 u8 *keybuf, size_t *keybufsize) in ep11_unwrapkey() 1053 memcpy(keybuf, rep_pl->data, rep_pl->data_len); in ep11_unwrapkey() 1055 kb = (struct ep11keyblob *) keybuf; in ep11_unwrapkey() 1202 const u8 *clrkey, u8 *keybuf, size_t *keybufsize) in ep11_clr2keyblob() 1252 keybitsize, 0, keybuf, keybufsize); in ep11_clr2keyblob() 668 ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) ep11_genaeskey() argument 928 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) ep11_unwrapkey() argument 1201 ep11_clr2keyblob(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, const u8 *clrkey, u8 *keybuf, size_t *keybufsize) ep11_clr2keyblob() argument
|
H A D | pkey_api.c | 194 u8 *keybuf, size_t *keybuflen) in pkey_clr2ep11key() 211 0, clrkey, keybuf, keybuflen); in pkey_clr2ep11key() 543 u32 kflags, u8 *keybuf, size_t *keybufsize) in pkey_genseckey2() 580 keybuf, keybufsize); in pkey_genseckey2() 582 rc = cca_genseckey(card, dom, ksize, keybuf); in pkey_genseckey2() 586 keybuf, keybufsize); in pkey_genseckey2() 597 u8 *keybuf, size_t *keybufsize) in pkey_clr2seckey2() 634 clrkey, keybuf, keybufsize); in pkey_clr2seckey2() 637 clrkey, keybuf); in pkey_clr2seckey2() 641 clrkey, keybuf, keybufsiz in pkey_clr2seckey2() 193 pkey_clr2ep11key(const u8 *clrkey, size_t clrkeylen, u8 *keybuf, size_t *keybuflen) pkey_clr2ep11key() argument 541 pkey_genseckey2(const struct pkey_apqn *apqns, size_t nr_apqns, enum pkey_key_type ktype, enum pkey_key_size ksize, u32 kflags, u8 *keybuf, size_t *keybufsize) pkey_genseckey2() argument 594 pkey_clr2seckey2(const struct pkey_apqn *apqns, size_t nr_apqns, enum pkey_key_type ktype, enum pkey_key_size ksize, u32 kflags, const u8 *clrkey, u8 *keybuf, size_t *keybufsize) pkey_clr2seckey2() argument [all...] |
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.h | 118 u8 *keybuf, size_t *keybufsize, u32 keybufver); 124 const u8 *clrkey, u8 *keybuf, size_t *keybufsize,
|
H A D | zcrypt_ccamisc.h | 181 u8 *keybuf, size_t *keybufsize); 193 const u8 *clrkey, u8 *keybuf, size_t *keybufsize);
|
H A D | zcrypt_ep11misc.c | 774 u8 *keybuf, size_t *keybufsize) in _ep11_genaeskey() 903 memcpy(keybuf, rep_pl->data, rep_pl->data_len); in _ep11_genaeskey() 914 u8 *keybuf, size_t *keybufsize, u32 keybufver) in ep11_genaeskey() 929 rc = ep11_kb_split(keybuf, *keybufsize, keybufver, in ep11_genaeskey() 1083 u8 *keybuf, size_t *keybufsize) in _ep11_unwrapkey() 1213 memcpy(keybuf, rep_pl->data, rep_pl->data_len); in _ep11_unwrapkey() 1228 u8 *keybuf, size_t *keybufsize, in ep11_unwrapkey() 1236 rc = ep11_kb_split(keybuf, *keybufsize, keybufver, in ep11_unwrapkey() 1250 hdr = (struct ep11kblob_header *)keybuf; in ep11_unwrapkey() 1379 const u8 *clrkey, u8 *keybuf, size_ in ep11_clr2keyblob() 772 _ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) _ep11_genaeskey() argument 913 ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize, u32 keybufver) ep11_genaeskey() argument 1078 _ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) _ep11_unwrapkey() argument 1223 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize, u8 keybufver) ep11_unwrapkey() argument 1378 ep11_clr2keyblob(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, const u8 *clrkey, u8 *keybuf, size_t *keybufsize, u32 keytype) ep11_clr2keyblob() argument [all...] |
/kernel/linux/linux-5.10/drivers/firmware/ |
H A D | qcom_scm.c | 1030 void *keybuf; in qcom_scm_ice_set_key() local 1044 keybuf = dma_alloc_coherent(__scm->dev, key_size, &key_phys, in qcom_scm_ice_set_key() 1046 if (!keybuf) in qcom_scm_ice_set_key() 1048 memcpy(keybuf, key, key_size); in qcom_scm_ice_set_key() 1053 memzero_explicit(keybuf, key_size); in qcom_scm_ice_set_key() 1055 dma_free_coherent(__scm->dev, key_size, keybuf, key_phys); in qcom_scm_ice_set_key()
|
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/hostap/ |
H A D | hostap_main.c | 330 char keybuf[WEP_KEY_LEN + 1]; in hostap_set_encryption() local 385 len = local->crypt_info.crypt[idx]->ops->get_key(keybuf, sizeof(keybuf), NULL, in hostap_set_encryption() 391 memset(keybuf, 0, sizeof(keybuf)); in hostap_set_encryption() 394 keybuf, sizeof(keybuf), in hostap_set_encryption() 399 keybuf, keylen)) { in hostap_set_encryption()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/hostap/ |
H A D | hostap_main.c | 330 char keybuf[WEP_KEY_LEN + 1]; in hostap_set_encryption() local 385 len = local->crypt_info.crypt[idx]->ops->get_key(keybuf, sizeof(keybuf), NULL, in hostap_set_encryption() 391 memset(keybuf, 0, sizeof(keybuf)); in hostap_set_encryption() 394 keybuf, sizeof(keybuf), in hostap_set_encryption() 399 keybuf, keylen)) { in hostap_set_encryption()
|
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | amp.c | 171 u8 keybuf[HCI_AMP_LINK_KEY_SIZE]; in phylink_gen_key() local 196 memcpy(&keybuf[0], key->val, HCI_LINK_KEY_SIZE); in phylink_gen_key() 197 memcpy(&keybuf[HCI_LINK_KEY_SIZE], key->val, HCI_LINK_KEY_SIZE); in phylink_gen_key() 200 err = hmac_sha256(keybuf, HCI_AMP_LINK_KEY_SIZE, "gamp", 4, gamp_key); in phylink_gen_key()
|
/kernel/linux/linux-5.10/fs/befs/ |
H A D | btree.c | 396 * @keybuf: Pointer to a buffer to put the key in 401 * return in keybuf/value. 402 * Bufsize is the size of keybuf (BEFS_NAME_LEN+1 is a good size). Keysize is 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() 497 befs_error(sb, "%s keybuf too small (%zu) " in befs_btree_read() 503 strlcpy(keybuf, keystart, keylen + 1); in befs_btree_read() 508 cur_key, keylen, keybuf, *value); in befs_btree_read() 411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) befs_btree_read() argument
|
/kernel/linux/linux-6.6/fs/befs/ |
H A D | btree.c | 396 * @keybuf: Pointer to a buffer to put the key in 401 * return in keybuf/value. 402 * Bufsize is the size of keybuf (BEFS_NAME_LEN+1 is a good size). Keysize is 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() 497 befs_error(sb, "%s keybuf too small (%zu) " in befs_btree_read() 503 strscpy(keybuf, keystart, keylen + 1); in befs_btree_read() 508 cur_key, keylen, keybuf, *value); in befs_btree_read() 411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) befs_btree_read() argument
|