/kernel/linux/linux-5.10/fs/cifs/ |
H A D | fscache.c | 49 uint16_t key_len = sizeof(key.hdr); in cifs_fscache_get_client_cookie() local 62 key_len += sizeof(key.ipv4_addr); in cifs_fscache_get_client_cookie() 68 key_len += sizeof(key.ipv6_addr); in cifs_fscache_get_client_cookie() 80 &key, key_len, in cifs_fscache_get_client_cookie()
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | hfsplus_raw.h | 214 __be16 key_len; member 344 __be16 key_len; member 362 __be16 key_len; member 406 __be16 key_len; member
|
/kernel/linux/linux-6.6/drivers/net/netdevsim/ |
H A D | ipsec.c | 91 int key_len; in nsim_ipsec_parse_proto_keys() local 105 key_len = xs->aead->alg_key_len; in nsim_ipsec_parse_proto_keys() 115 if (key_len > NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys() 117 } else if (key_len == NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys()
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__htable.c | 415 unsigned int ares__htable_hash_FNV1a(const unsigned char *key, size_t key_len, in ares__htable_hash_FNV1a() argument 422 for (i = 0; i < key_len; i++) { in ares__htable_hash_FNV1a() 433 size_t key_len, unsigned int seed) in ares__htable_hash_FNV1a_casecmp() 439 for (i = 0; i < key_len; i++) { in ares__htable_hash_FNV1a_casecmp() 432 ares__htable_hash_FNV1a_casecmp(const unsigned char *key, size_t key_len, unsigned int seed) ares__htable_hash_FNV1a_casecmp() argument
|
H A D | ares_rand.c | 68 size_t key_len) in ares_rc4_generate_key() 75 if (key_len != ARES_RC4_KEY_LEN) { in ares_rc4_generate_key() 99 for (i = len; i < key_len; i++) { in ares_rc4_generate_key() 67 ares_rc4_generate_key(ares_rand_rc4 *rc4_state, unsigned char *key, size_t key_len) ares_rc4_generate_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_openssl.c | 709 size_t key_len) in crypto_cipher_init() 728 switch (key_len) { in crypto_cipher_init() 767 !EVP_CIPHER_CTX_set_key_length(ctx->enc, key_len) || in crypto_cipher_init() 778 !EVP_CIPHER_CTX_set_key_length(ctx->dec, key_len) || in crypto_cipher_init() 1057 size_t key_len) in crypto_hash_init() 1093 if (HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL) != 1) { in crypto_hash_init() 1143 size_t key_len, size_t num_elem, in openssl_hmac_vector() 1157 res = HMAC_Init_ex(ctx, key, key_len, type, NULL); in openssl_hmac_vector() 1174 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 1177 return openssl_hmac_vector(EVP_md5(), key ,key_len, num_ele in hmac_md5_vector() 707 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument 1056 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 1142 openssl_hmac_vector(const EVP_MD *type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) openssl_hmac_vector() argument 1182 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_md5() argument 1201 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha1_vector() argument 1209 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha1() argument 1218 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 1226 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 1237 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 1245 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 1256 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 1264 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 1282 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | ccp.h | 149 * @key_len: length in bytes of key 160 * - type, mode, action, key, key_len, src, dst, src_len 176 u32 key_len; /* In bytes */ member 216 * @key_len: length in bytes of key 225 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 236 u32 key_len; /* In bytes */ member 327 * @key_len: length of key (in bytes) 335 * - type, mode, action, key, key_len, src, dst, src_len 347 u32 key_len; /* In bytes */ member
|
/kernel/linux/linux-5.10/fs/hfs/ |
H A D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member 158 u8 key_len; /* number of bytes in the key */ member 165 u8 key_len; /* number of bytes in the key */ member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | ccp.h | 150 * @key_len: length in bytes of key 161 * - type, mode, action, key, key_len, src, dst, src_len 177 u32 key_len; /* In bytes */ member 217 * @key_len: length in bytes of key 226 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 237 u32 key_len; /* In bytes */ member 328 * @key_len: length of key (in bytes) 336 * - type, mode, action, key, key_len, src, dst, src_len 348 u32 key_len; /* In bytes */ member
|
/kernel/linux/linux-6.6/fs/hfs/ |
H A D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member 158 u8 key_len; /* number of bytes in the key */ member 165 u8 key_len; /* number of bytes in the key */ member
|
/third_party/mbedtls/library/ |
H A D | pk_ecc.c | 48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument 70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
|
/third_party/ffmpeg/libavformat/ |
H A D | hls.c | 372 int key_len, char **dest, int *dest_len) in handle_variant_args() 374 if (!strncmp(key, "BANDWIDTH=", key_len)) { in handle_variant_args() 377 } else if (!strncmp(key, "AUDIO=", key_len)) { in handle_variant_args() 380 } else if (!strncmp(key, "VIDEO=", key_len)) { in handle_variant_args() 383 } else if (!strncmp(key, "SUBTITLES=", key_len)) { in handle_variant_args() 396 int key_len, char **dest, int *dest_len) in handle_key_args() 398 if (!strncmp(key, "METHOD=", key_len)) { in handle_key_args() 401 } else if (!strncmp(key, "URI=", key_len)) { in handle_key_args() 404 } else if (!strncmp(key, "IV=", key_len)) { in handle_key_args() 460 int key_len, cha in handle_init_section_args() 371 handle_variant_args(struct variant_info *info, const char *key, int key_len, char **dest, int *dest_len) handle_variant_args() argument 395 handle_key_args(struct key_info *info, const char *key, int key_len, char **dest, int *dest_len) handle_key_args() argument 459 handle_init_section_args(struct init_section_info *info, const char *key, int key_len, char **dest, int *dest_len) handle_init_section_args() argument 567 handle_rendition_args(struct rendition_info *info, const char *key, int key_len, char **dest, int *dest_len) handle_rendition_args() argument [all...] |
/kernel/linux/linux-5.10/net/core/ |
H A D | neighbour.c | 587 u32 hash_val, key_len = tbl->key_len; in ___neigh_create() local 599 memcpy(n->primary_key, pkey, key_len); in ___neigh_create() 645 if (dev == n1->dev && !memcmp(n1->primary_key, n->primary_key, key_len)) { in ___neigh_create() 684 static u32 pneigh_hash(const void *pkey, unsigned int key_len) in pneigh_hash() argument 686 u32 hash_val = *(u32 *)(pkey + key_len - 4); in pneigh_hash() 697 unsigned int key_len, in __pneigh_lookup_1() 701 if (!memcmp(n->key, pkey, key_len) && in __pneigh_lookup_1() 713 unsigned int key_len = tbl->key_len; in __pneigh_lookup() local 694 __pneigh_lookup_1(struct pneigh_entry *n, struct net *net, const void *pkey, unsigned int key_len, struct net_device *dev) __pneigh_lookup_1() argument 726 unsigned int key_len = tbl->key_len; pneigh_lookup() local 771 unsigned int key_len = tbl->key_len; pneigh_delete() local [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/ |
H A D | upg_check_secure.c | 285 param.key_len = key_length; in upg_check_upg_file_code() 335 param.total_size[0] = sizeof(hi_upg_common_head) + head->key_len; in upg_check_upg_file_head() 338 param.key_len = (key_length / 2); /* 2: ken len include (px+py) or (key_n+key_e) */ in upg_check_upg_file_head() 339 param.key_e = key + param.key_len; in upg_check_upg_file_head() 340 param.sign = (hi_u8 *)upg_head + sizeof(hi_upg_common_head) + head->key_len; in upg_check_upg_file_head()
|
H A D | upg_common.h | 107 hi_u32 upg_get_rsa_key_from_boot(hi_u8 *key, hi_u32 key_len); 108 hi_u32 upg_get_ecc_key_from_boot(hi_u8 *key, hi_u32 key_len);
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 269 tpm_buf_append_u16(&buf, 4 + options->blobauth_len + payload->key_len); in tpm2_seal_trusted() 275 tpm_buf_append_u16(&buf, payload->key_len); in tpm2_seal_trusted() 276 tpm_buf_append(&buf, payload->key, payload->key_len); in tpm2_seal_trusted() 502 payload->key_len = data_len - 1; in tpm2_unseal_cmd() 510 payload->key_len = data_len; in tpm2_unseal_cmd()
|
/third_party/pulseaudio/src/pulse/ |
H A D | proplist.c | 466 size_t key_len = 0, value_len = 0; in pa_proplist_from_string() local 485 key_len = 1; in pa_proplist_from_string() 497 key_len++; in pa_proplist_from_string() 534 if (proplist_setn(pl, key, key_len, value, value_len) < 0) in pa_proplist_from_string() 553 if (proplist_setn(pl, key, key_len, v, strlen(v)) < 0) { in pa_proplist_from_string() 584 if (proplist_setn(pl, key, key_len, v, strlen(v)) < 0) { in pa_proplist_from_string() 614 if (proplist_sethex(pl, key, key_len, value, value_len) < 0) in pa_proplist_from_string()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wps_supplicant.c | 400 cred->key, cred->key_len); in wpa_supplicant_wps_cred() 421 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 424 (unsigned long) cred->key_len); in wpa_supplicant_wps_cred() 534 cred->key_len != 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 545 if (cred->key_len == 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 554 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 556 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred() 559 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wps_supplicant.c | 411 cred->key, cred->key_len); in wpa_supplicant_wps_cred() 432 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 435 (unsigned long) cred->key_len); in wpa_supplicant_wps_cred() 549 if (add_sae && cred->key_len != 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 559 if (cred->key_len == 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 568 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 570 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred() 573 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.h | 130 u32 key_len; member 137 u32 key_len; member
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | misc.h | 188 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len + c->hash_len) in ubifs_idx_node_sz() 204 (UBIFS_BRANCH_SZ + c->key_len + c->hash_len) * bnum); in ubifs_idx_branch()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aead_api.c | 87 size_t key_len, size_t mic_len) in aead_key_setup_encrypt() 96 err = crypto_aead_setkey(tfm, key, key_len); in aead_key_setup_encrypt() 86 aead_key_setup_encrypt(const char *alg, const u8 key[], size_t key_len, size_t mic_len) aead_key_setup_encrypt() argument
|
H A D | aes_gmac.c | 70 size_t key_len) in ieee80211_aes_gmac_key_setup() 79 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup() 69 ieee80211_aes_gmac_key_setup(const u8 key[], size_t key_len) ieee80211_aes_gmac_key_setup() argument
|
/kernel/linux/linux-5.10/include/keys/ |
H A D | trusted_tpm.h | 65 pr_info("trusted_key: key_len %d\n", p->key_len); in dump_payload() 67 16, 1, p->key, p->key_len, 0); in dump_payload()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | misc.h | 188 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len + c->hash_len) in ubifs_idx_node_sz() 204 (UBIFS_BRANCH_SZ + c->key_len + c->hash_len) * bnum); in ubifs_idx_branch()
|