/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aead_api.h | 11 size_t key_len, size_t mic_len);
|
/kernel/linux/linux-5.10/include/keys/ |
H A D | trusted-type.h | 22 unsigned int key_len; member
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 40 *master_keylen = tpayload->key_len; in request_trusted_key()
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aead_api.h | 11 size_t key_len, size_t mic_len);
|
/third_party/libwebsockets/lib/misc/cache-ttl/ |
H A D | private-lib-misc-cache-ttl.h | 46 size_t key_len; member 50 * len + key_len + 1 bytes of data overcommitted, user object first
|
/third_party/rust/crates/bindgen/bindgen-tests/tests/headers/ |
H A D | layout_array_too_long.h | 40 uint32_t key_len; /**< src/dst key length */ member
|
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_wx.c | 604 if (ext->key_len > 0 && (*crypt)->ops->set_key && in ieee80211_wx_set_encode_ext() 605 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in ieee80211_wx_set_encode_ext() 620 //memcpy(sec.keys[idx], ext->key, ext->key_len); in ieee80211_wx_set_encode_ext() 621 sec.key_sizes[idx] = ext->key_len; in ieee80211_wx_set_encode_ext() 686 ext->key_len = 0; in ieee80211_wx_get_encode_ext() 697 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, NULL, crypt->priv); in ieee80211_wx_get_encode_ext() 699 if (ext->key_len && in ieee80211_wx_get_encode_ext()
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | xattr.c | 721 u16 key_len = hfs_bnode_read_u16(fd.bnode, fd.keyoffset); in hfsplus_listxattr() local 723 if (key_len == 0 || key_len > fd.tree->max_key_len) { in hfsplus_listxattr() 724 pr_err("invalid xattr key length: %d\n", key_len); in hfsplus_listxattr() 730 fd.keyoffset, key_len + sizeof(key_len)); in hfsplus_listxattr()
|
/kernel/linux/linux-6.6/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_wx.c | 604 if (ext->key_len > 0 && (*crypt)->ops->set_key && in ieee80211_wx_set_encode_ext() 605 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in ieee80211_wx_set_encode_ext() 620 //memcpy(sec.keys[idx], ext->key, ext->key_len); in ieee80211_wx_set_encode_ext() 621 sec.key_sizes[idx] = ext->key_len; in ieee80211_wx_set_encode_ext() 686 ext->key_len = 0; in ieee80211_wx_get_encode_ext() 697 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, NULL, crypt->priv); in ieee80211_wx_get_encode_ext() 699 if (ext->key_len && in ieee80211_wx_get_encode_ext()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/sfc/ |
H A D | tc_encap_actions.c | 20 .key_len = offsetof(struct efx_neigh_binder, ha), 26 .key_len = offsetofend(struct efx_tc_encap_action, key), 544 if (n->tbl->key_len != keysize) { in efx_neigh_event() 545 netif_warn(efx, drv, efx->net_dev, "neigh_event with bad key_len %u\n", in efx_neigh_event() 546 n->tbl->key_len); in efx_neigh_event() 554 memcpy(&keys.dst_ip6, n->primary_key, n->tbl->key_len); in efx_neigh_event() 556 memcpy(&keys.dst_ip, n->primary_key, n->tbl->key_len); in efx_neigh_event()
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 672 p->key[p->key_len] = p->migratable; in key_seal() 675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 698 o->blobauth, p->key, &p->key_len); in key_unseal() 703 p->migratable = p->key[--p->key_len]; in key_unseal() 976 static int trusted_tpm_get_random(unsigned char *key, size_t key_len) in trusted_tpm_get_random() argument 978 return tpm_get_random(chip, key, key_len); in trusted_tpm_get_random()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_macsec_qca.c | 751 rx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_receive_sa() 752 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_receive_sa() 755 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_receive_sa() 941 tx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_transmit_sa() 942 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_transmit_sa() 945 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_transmit_sa()
|
H A D | driver_privsep.c | 212 const u8 *key, size_t key_len) in wpa_driver_privsep_set_key() 232 if (key && key_len > 0 && key_len < sizeof(cmd.key)) { in wpa_driver_privsep_set_key() 233 os_memcpy(cmd.key, key, key_len); in wpa_driver_privsep_set_key() 234 cmd.key_len = key_len; in wpa_driver_privsep_set_key() 208 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) wpa_driver_privsep_set_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 142 const u8 *key, size_t key_len) in supp_set_key() 150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); in supp_set_key() 169 set_tx, seq, seq_len, key, key_len); in supp_set_key() 298 const u8 *addr, int idx, u8 *key, size_t key_len) in auth_set_key() 313 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key() 337 1, seq, 6, key, key_len); in auth_set_key() 139 supp_set_key(void *ctx, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) supp_set_key() argument 297 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) auth_set_key() argument
|
H A D | wpas_glue.c | 495 const u8 *key, size_t key_len) in wpa_supplicant_set_key() 498 if (alg == WPA_ALG_TKIP && key_idx == 0 && key_len == 32) { in wpa_supplicant_set_key() 504 alg != WPA_ALG_NONE && key_len <= sizeof(wpa_s->last_gtk)) { in wpa_supplicant_set_key() 505 os_memcpy(wpa_s->last_gtk, key, key_len); in wpa_supplicant_set_key() 506 wpa_s->last_gtk_len = key_len; in wpa_supplicant_set_key() 515 os_memcpy(wpa_s->last_tk, key, key_len); in wpa_supplicant_set_key() 516 wpa_s->last_tk_len = key_len; in wpa_supplicant_set_key() 520 key, key_len); in wpa_supplicant_set_key() 492 wpa_supplicant_set_key(void *_wpa_s, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) wpa_supplicant_set_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_macsec_qca.c | 773 rx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_receive_sa() 774 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_receive_sa() 777 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_receive_sa() 963 tx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_transmit_sa() 964 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_transmit_sa() 967 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_transmit_sa()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.c | 152 const u8 *key, size_t key_len, enum key_flag key_flag) in supp_set_key() 160 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); in supp_set_key() 183 set_tx, seq, seq_len, key, key_len, in supp_set_key() 324 const u8 *addr, int idx, u8 *key, size_t key_len, in auth_set_key() 340 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key() 368 1, seq, 6, key, key_len, key_flag); in auth_set_key() 145 supp_set_key(void *ctx, int link_id, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len, enum key_flag key_flag) supp_set_key() argument 323 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len, enum key_flag key_flag) auth_set_key() argument
|
H A D | wpas_glue.c | 537 const u8 *key, size_t key_len, in wpa_supplicant_set_key() 541 if (alg == WPA_ALG_TKIP && key_idx == 0 && key_len == 32) { in wpa_supplicant_set_key() 547 alg != WPA_ALG_NONE && key_len <= sizeof(wpa_s->last_gtk)) { in wpa_supplicant_set_key() 548 os_memcpy(wpa_s->last_gtk, key, key_len); in wpa_supplicant_set_key() 549 wpa_s->last_gtk_len = key_len; in wpa_supplicant_set_key() 559 os_memcpy(wpa_s->last_tk, key, key_len); in wpa_supplicant_set_key() 560 wpa_s->last_tk_len = key_len; in wpa_supplicant_set_key() 568 key, key_len, key_flag); in wpa_supplicant_set_key() 530 wpa_supplicant_set_key(void *_wpa_s, int link_id, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len, enum key_flag key_flag) wpa_supplicant_set_key() argument
|
/kernel/linux/linux-5.10/drivers/staging/rtl8188eu/os_dep/ |
H A D | ioctl_linux.c | 355 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { in wpa_set_encryption() 379 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption() 445 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, min_t(u16, param->u.crypt.key_len, 16)); in wpa_set_encryption() 457 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, min_t(u16, param->u.crypt.key_len, 16)); in wpa_set_encryption() 1642 DBG_88E("(keyindex_provided == 1), keyid =%d, key_len =%d\n", key, padapter->securitypriv.dot11DefKeylen[key]); in rtw_wx_set_enc() 1851 param_len = sizeof(struct ieee_param) + pext->key_len; in rtw_wx_set_enc_ext() 1898 if (pext->key_len) { in rtw_wx_set_enc_ext() 1899 param->u.crypt.key_len = pext->key_len; in rtw_wx_set_enc_ext() 1900 memcpy(param->u.crypt.key, pext + 1, pext->key_len); in rtw_wx_set_enc_ext() [all...] |
/kernel/linux/linux-5.10/drivers/net/phy/mscc/ |
H A D | mscc_macsec.c | 505 u16 key_len, u8 hkey[16]) in vsc8584_macsec_derive_key() 511 ret = aes_expandkey(&ctx, key, key_len); in vsc8584_macsec_derive_key() 530 ret = vsc8584_macsec_derive_key(flow->key, priv->secy->key_len, hkey); in vsc8584_macsec_transformation() 534 switch (priv->secy->key_len) { in vsc8584_macsec_transformation() 563 for (i = 0; i < priv->secy->key_len / sizeof(u32); i++) in vsc8584_macsec_transformation() 715 memcpy(flow->key, ctx->sa.key, priv->secy->key_len); in __vsc8584_macsec_add_rxsa() 742 memcpy(flow->key, ctx->sa.key, priv->secy->key_len); in __vsc8584_macsec_add_txsa() 1017 rec = 6 + priv->secy->key_len / sizeof(u32); in vsc8584_handle_macsec_interrupt() 504 vsc8584_macsec_derive_key(const u8 key[MACSEC_MAX_KEY_LEN], u16 key_len, u8 hkey[16]) vsc8584_macsec_derive_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_glue.c | 360 size_t key_len) in hostapd_wpa_auth_set_key() 380 os_memcpy(sta->last_tk, key, key_len); in hostapd_wpa_auth_set_key() 381 sta->last_tk_len = key_len; in hostapd_wpa_auth_set_key() 391 os_memcpy(hapd->last_igtk, key, key_len); in hostapd_wpa_auth_set_key() 392 hapd->last_igtk_len = key_len; in hostapd_wpa_auth_set_key() 398 os_memcpy(hapd->last_gtk, key, key_len); in hostapd_wpa_auth_set_key() 399 hapd->last_gtk_len = key_len; in hostapd_wpa_auth_set_key() 403 key, key_len); in hostapd_wpa_auth_set_key() 358 hostapd_wpa_auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) hostapd_wpa_auth_set_key() argument
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | offload.c | 95 u32 meta_len, key_len, mask_len, act_len, tot_len; in nfp_flower_xmit_flow() local 100 key_len = nfp_flow->meta.key_len; in nfp_flower_xmit_flow() 104 tot_len = meta_len + key_len + mask_len + act_len; in nfp_flower_xmit_flow() 109 nfp_flow->meta.key_len >>= NFP_FL_LW_SIZ; in nfp_flower_xmit_flow() 119 memcpy(&msg[meta_len], nfp_flow->unmasked_data, key_len); in nfp_flower_xmit_flow() 120 memcpy(&msg[meta_len + key_len], nfp_flow->mask_data, mask_len); in nfp_flower_xmit_flow() 121 memcpy(&msg[meta_len + key_len + mask_len], in nfp_flower_xmit_flow() 127 nfp_flow->meta.key_len <<= NFP_FL_LW_SIZ; in nfp_flower_xmit_flow() 554 flow_pay->meta.key_len in nfp_flower_allocate_new() [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | offload.c | 98 u32 meta_len, key_len, mask_len, act_len, tot_len; in nfp_flower_xmit_flow() local 103 key_len = nfp_flow->meta.key_len; in nfp_flower_xmit_flow() 107 tot_len = meta_len + key_len + mask_len + act_len; in nfp_flower_xmit_flow() 112 nfp_flow->meta.key_len >>= NFP_FL_LW_SIZ; in nfp_flower_xmit_flow() 122 memcpy(&msg[meta_len], nfp_flow->unmasked_data, key_len); in nfp_flower_xmit_flow() 123 memcpy(&msg[meta_len + key_len], nfp_flow->mask_data, mask_len); in nfp_flower_xmit_flow() 124 memcpy(&msg[meta_len + key_len + mask_len], in nfp_flower_xmit_flow() 130 nfp_flow->meta.key_len <<= NFP_FL_LW_SIZ; in nfp_flower_xmit_flow() 552 flow_pay->meta.key_len in nfp_flower_allocate_new() [all...] |
/kernel/linux/linux-5.10/fs/ntfs/ |
H A D | index.h | 77 extern int ntfs_index_lookup(const void *key, const int key_len,
|
/kernel/linux/linux-6.6/fs/ntfs/ |
H A D | index.h | 77 extern int ntfs_index_lookup(const void *key, const int key_len,
|