/kernel/linux/linux-6.6/drivers/net/wireless/marvell/libertas/ |
H A D | cfg.c | 1025 const u8 *key, u16 key_len) in lbs_set_key_material() 1052 cmd.param.keylen = cpu_to_le16(key_len); in lbs_set_key_material() 1053 if (key && key_len) in lbs_set_key_material() 1054 memcpy(cmd.param.key, key, key_len); in lbs_set_key_material() 1375 sme->key_idx, sme->key_len); in lbs_cfg_connect() 1388 priv->wep_key_len[sme->key_idx] = sme->key_len; in lbs_cfg_connect() 1389 memcpy(priv->wep_key[sme->key_idx], sme->key, sme->key_len); in lbs_cfg_connect() 1521 idx, params->key_len); in lbs_cfg_add_key() 1522 if (params->key_len) in lbs_cfg_add_key() 1524 params->key, params->key_len); in lbs_cfg_add_key() 1023 lbs_set_key_material(struct lbs_private *priv, int key_type, int key_info, const u8 *key, u16 key_len) lbs_set_key_material() argument [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.c | 511 int left, eoq, key_len; in copy_key_cpltx_pktxt() local 521 key_len = sa_entry->kctx_len; in copy_key_cpltx_pktxt() 538 if (likely(key_len <= left)) { in copy_key_cpltx_pktxt() 539 memcpy(key_ctx->key, sa_entry->key, key_len); in copy_key_cpltx_pktxt() 540 pos += key_len; in copy_key_cpltx_pktxt() 544 key_len - left); in copy_key_cpltx_pktxt() 545 pos = (u8 *)q->q.desc + (key_len - left); in copy_key_cpltx_pktxt()
|
/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | xattr.c | 681 u16 key_len = 0; in hfsplus_listxattr() local 723 key_len = hfs_bnode_read_u16(fd.bnode, fd.keyoffset); in hfsplus_listxattr() 724 if (key_len == 0 || key_len > fd.tree->max_key_len) { in hfsplus_listxattr() 725 pr_err("invalid xattr key length: %d\n", key_len); in hfsplus_listxattr() 731 fd.keyoffset, key_len + sizeof(key_len)); in hfsplus_listxattr()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.c | 515 int left, eoq, key_len; in copy_key_cpltx_pktxt() local 525 key_len = sa_entry->kctx_len; in copy_key_cpltx_pktxt() 542 if (likely(key_len <= left)) { in copy_key_cpltx_pktxt() 543 memcpy(key_ctx->key, sa_entry->key, key_len); in copy_key_cpltx_pktxt() 544 pos += key_len; in copy_key_cpltx_pktxt() 548 key_len - left); in copy_key_cpltx_pktxt() 549 pos = (u8 *)q->q.desc + (key_len - left); in copy_key_cpltx_pktxt()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_privsep.c | 220 size_t key_len = params->key_len; in wpa_driver_privsep_set_key() local 238 if (key && key_len > 0 && key_len < sizeof(cmd.key)) { in wpa_driver_privsep_set_key() 239 os_memcpy(cmd.key, key, key_len); in wpa_driver_privsep_set_key() 240 cmd.key_len = key_len; in wpa_driver_privsep_set_key()
|
/kernel/linux/linux-5.10/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 564 if ((sme->key_len) && in ath6kl_cfg80211_connect() 577 key->key_len = sme->key_len; in ath6kl_cfg80211_connect() 578 memcpy(key->key, sme->key, key->key_len); in ath6kl_cfg80211_connect() 585 key->key_len, in ath6kl_cfg80211_connect() 1142 if (params->key_len != WMI_KRK_LEN) in ath6kl_cfg80211_add_key() 1169 if (params->key_len > WLAN_MAX_KEY_LEN || in ath6kl_cfg80211_add_key() 1173 key->key_len = params->key_len; in ath6kl_cfg80211_add_key() 1174 memcpy(key->key, params->key, key->key_len); in ath6kl_cfg80211_add_key() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 564 if ((sme->key_len) && in ath6kl_cfg80211_connect() 577 key->key_len = sme->key_len; in ath6kl_cfg80211_connect() 578 memcpy(key->key, sme->key, key->key_len); in ath6kl_cfg80211_connect() 585 key->key_len, in ath6kl_cfg80211_connect() 1142 if (params->key_len != WMI_KRK_LEN) in ath6kl_cfg80211_add_key() 1169 if (params->key_len > WLAN_MAX_KEY_LEN || in ath6kl_cfg80211_add_key() 1173 key->key_len = params->key_len; in ath6kl_cfg80211_add_key() 1174 memcpy(key->key, params->key, key->key_len); in ath6kl_cfg80211_add_key() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
H A D | eap_sake_common.c | 196 * @key_len: Length of the key in bytes 209 static int eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf() argument 234 if (hmac_sha1_vector(key, key_len, 4, addr, len, in eap_sake_kdf() 239 if (hmac_sha1_vector(key, key_len, 4, addr, len, in eap_sake_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
H A D | eap_sake_common.c | 196 * @key_len: Length of the key in bytes 209 static int eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf() argument 234 if (hmac_sha1_vector(key, key_len, 4, addr, len, in eap_sake_kdf() 239 if (hmac_sha1_vector(key, key_len, 4, addr, len, in eap_sake_kdf()
|
/third_party/mbedtls/programs/cipher/ |
H A D | cipher_aead_demo.c | 156 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local 157 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
|
/kernel/linux/linux-6.6/drivers/net/wireless/microchip/wilc1000/ |
H A D | cfg80211.c | 523 key_info->key = kmemdup(params->key, params->key_len, GFP_KERNEL); in wilc_wfi_cfg_copy_wpa_info() 537 key_info->key_len = params->key_len; in wilc_wfi_cfg_copy_wpa_info() 548 int ret = 0, keylen = params->key_len; in add_key() 568 if (params->key_len > 16 && in add_key() 572 keylen = params->key_len - 16; in add_key() 598 if (params->key_len > 16 && in add_key() 602 keylen = params->key_len - 16; in add_key() 703 key_params.key_len = priv->wilc_igtk[key_index]->key_len; in get_key() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-rsa.c | 75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt() 150 ctx->u.rsa.key_len = ctx->u.rsa.n_len << 3; /* convert to bits */ in ccp_rsa_setkey() 151 if (ccp_check_key_length(ctx->u.rsa.key_len)) { in ccp_rsa_setkey()
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 44 static int key_len = KEY_LENGTH; variable 75 key_len)) in set_keys() 313 key_len = KEY_LENGTH * 2; in parse_opts()
|
/kernel/linux/linux-5.10/drivers/infiniband/core/ |
H A D | uverbs_std_types_flow_action.c | 74 if (aes_gcm->key_len != 32 && in validate_flow_action_esp_keymat_aes_gcm() 75 aes_gcm->key_len != 24 && in validate_flow_action_esp_keymat_aes_gcm() 76 aes_gcm->key_len != 16) in validate_flow_action_esp_keymat_aes_gcm()
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-rsa.c | 75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt() 150 ctx->u.rsa.key_len = ctx->u.rsa.n_len << 3; /* convert to bits */ in ccp_rsa_setkey() 151 if (ccp_check_key_length(ctx->u.rsa.key_len)) { in ccp_rsa_setkey()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 42 static int key_len = KEY_LENGTH; variable 73 key_len)) in set_keys() 311 key_len = KEY_LENGTH * 2; in parse_opts()
|
/third_party/node/src/crypto/ |
H A D | crypto_hmac.cc | 71 void Hmac::HmacInit(const char* hash_type, const char* key, int key_len) { in HmacInit() argument 78 if (key_len == 0) { in HmacInit() 82 if (!ctx_ || !HMAC_Init_ex(ctx_.get(), key, key_len, md, nullptr)) { in HmacInit()
|
/third_party/rust/crates/bindgen/bindgen-tests/tests/expectations/tests/ |
H A D | layout_array_too_long.rs | 100 pub key_len: u32, 138 unsafe { ::std::ptr::addr_of!((*ptr).key_len) as usize - ptr as usize }, in bindgen_test_layout_ip_frag_key() 144 stringify!(key_len) in bindgen_test_layout_ip_frag_key()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | asym_tpm_subtype.h | 10 uint16_t key_len; /* Size in bits of the key */ member
|
H A D | arc4.h | 20 int arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len);
|
H A D | blowfish.h | 22 unsigned int key_len);
|
/kernel/linux/linux-6.6/fs/smb/common/ |
H A D | arc4.h | 20 int cifs_arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len);
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | blowfish.h | 22 unsigned int key_len);
|