/kernel/linux/linux-6.6/fs/nfsd/ |
H A D | nfsfh.c | 178 len = key_len(fh->fh_fsid_type) / 4; in nfsd_set_fh_dentry() 183 len = key_len(FSID_ENCODE_DEV)/4; in nfsd_set_fh_dentry() 562 key_len(fhp->fh_handle.fh_fsid_type) + 4; in fh_compose()
|
/kernel/linux/linux-6.6/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 169 if (prism2_domibset_pstr32(wlandev, did, params->key_len, params->key)) in prism2_add_key() 195 params.key_len = len; in prism2_get_key() 488 did, sme->key_len, in prism2_connect()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/marvell/prestera/ |
H A D | prestera_router_hw.c | 38 .key_len = sizeof(struct prestera_fib_key), 44 .key_len = sizeof(struct prestera_nh_neigh_key), 50 .key_len = sizeof(struct prestera_nexthop_group_key),
|
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath6kl/ |
H A D | core.h | 375 u8 key_len; member 383 u8 key_len; member 550 u8 key_len; member
|
/kernel/linux/linux-6.6/lib/ |
H A D | kobject_uevent.c | 119 int key_len; in kobject_action_args() local 157 key_len = next - buf; in kobject_action_args() 169 key_len, key, (int) (next - buf), buf)) in kobject_action_args()
|
H A D | rhashtable.c | 996 * .key_len = sizeof(int), 1025 if ((!params->key_len && !params->obj_hashfn) || in rhashtable_init() 1050 ht->key_len = ht->p.key_len; in rhashtable_init() 1054 if (!(ht->key_len & (sizeof(u32) - 1))) { in rhashtable_init() 1055 ht->key_len /= sizeof(u32); in rhashtable_init()
|
/third_party/curl/lib/ |
H A D | http_aws_sigv4.c | 327 size_t key_len; in parse_content_sha_hdr() local 331 key_len = msnprintf(key, sizeof(key), "x-%s-content-sha256", provider1); in parse_content_sha_hdr() 333 value = Curl_checkheaders(data, key, key_len); in parse_content_sha_hdr()
|
/third_party/mbedtls/library/ |
H A D | lms.c | 271 size_t key_size, size_t *key_len) in mbedtls_lms_export_public_key() 290 if (key_len != NULL) { in mbedtls_lms_export_public_key() 291 *key_len = MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lms_export_public_key() 269 mbedtls_lms_export_public_key(const mbedtls_lms_public_t *ctx, unsigned char *key, size_t key_size, size_t *key_len) mbedtls_lms_export_public_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 1772 sa_key->key_len = sak_len; in ieee802_1x_mka_decode_dist_sak_body() 2085 unsigned int key_len; in ieee802_1x_kay_generate_new_sak() local 2115 key_len = cs->sak_len; in ieee802_1x_kay_generate_new_sak() 2116 key = os_zalloc(key_len); in ieee802_1x_kay_generate_new_sak() 2122 ctx_len = key_len + sizeof(kay->dist_kn); in ieee802_1x_kay_generate_new_sak() 2133 if (os_get_random(context + ctx_offset, key_len) < 0) in ieee802_1x_kay_generate_new_sak() 2136 ctx_offset += key_len; in ieee802_1x_kay_generate_new_sak() 2147 if (key_len == 16 || key_len == 32) { in ieee802_1x_kay_generate_new_sak() 2151 key, key_len)) { in ieee802_1x_kay_generate_new_sak() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_kay.c | 1809 sa_key->key_len = sak_len; in ieee802_1x_mka_decode_dist_sak_body() 2122 unsigned int key_len; in ieee802_1x_kay_generate_new_sak() local 2152 key_len = cs->sak_len; in ieee802_1x_kay_generate_new_sak() 2153 key = os_zalloc(key_len); in ieee802_1x_kay_generate_new_sak() 2159 ctx_len = key_len + sizeof(kay->dist_kn); in ieee802_1x_kay_generate_new_sak() 2170 if (os_get_random(context + ctx_offset, key_len) < 0) in ieee802_1x_kay_generate_new_sak() 2173 ctx_offset += key_len; in ieee802_1x_kay_generate_new_sak() 2184 if (key_len == 16 || key_len == 32) { in ieee802_1x_kay_generate_new_sak() 2188 key, key_len)) { in ieee802_1x_kay_generate_new_sak() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_registrar.c | 1576 (int) cred->key_len); in wps_build_cred_network_key() 1578 cred->key, cred->key_len); in wps_build_cred_network_key() 1580 wpabuf_put_be16(msg, cred->key_len); in wps_build_cred_network_key() 1581 wpabuf_put_data(msg, cred->key, cred->key_len); in wps_build_cred_network_key() 1653 wps->cred.key_len = in wps_build_cred() 1743 wps->cred.key_len = wps->new_psk_len; in wps_build_cred() 1749 wps->cred.key_len = PMK_LEN * 2; in wps_build_cred() 1755 wps->cred.key_len = PMK_LEN * 2; in wps_build_cred() 1762 wps->cred.key_len = wps->wps->network_key_len; in wps_build_cred() 1783 wps->cred.key_len in wps_build_cred() [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | twofish_common.c | 570 unsigned int key_len) in __twofish_setkey() 586 if (key_len % 8) in __twofish_setkey() 610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey() 569 __twofish_setkey(struct twofish_ctx *ctx, const u8 *key, unsigned int key_len) __twofish_setkey() argument
|
H A D | testmgr.h | 154 unsigned int key_len; member 211 .key_len = 157, 244 .key_len = 289, 302 .key_len = 547, 344 .key_len = 269, 562 .key_len = 2349, 579 .key_len = 49, 603 .key_len = 49, 627 .key_len = 49, 651 .key_len [all...] |
/kernel/linux/linux-5.10/net/wireless/ |
H A D | wext-compat.c | 468 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 507 params->key, params->key_len); in __cfg80211_set_encryption() 610 params.key_len = erq->length; in cfg80211_wext_siwencode() 652 if (ext->key_len == 5) in cfg80211_wext_siwencodeext() 654 else if (ext->key_len == 13) in cfg80211_wext_siwencodeext() 698 params.key_len = ext->key_len; in cfg80211_wext_siwencodeext() 744 wdev->wext.keys->params[idx].key_len); in cfg80211_wext_giwencode()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/marvell/octeontx2/nic/ |
H A D | cn10k_macsec.c | 282 switch (secy->key_len) { in cn10k_mcs_write_rx_secy() 396 err = cn10k_ecb_aes_encrypt(pfvf, sak, secy->key_len, hash); in cn10k_mcs_write_keys() 402 for (i = 0; i < secy->key_len; i++) in cn10k_mcs_write_keys() 403 sak_rev[i] = sak[secy->key_len - 1 - i]; in cn10k_mcs_write_keys() 413 memcpy(&req->plcy[0][0], sak_rev, secy->key_len); in cn10k_mcs_write_keys() 543 switch (secy->key_len) { in cn10k_mcs_write_tx_secy() 1316 memcpy(&txsc->sa_key[sa_num], ctx->sa.key, secy->key_len); in cn10k_mdo_add_txsa() 1489 memcpy(&rxsc->sa_key[sa_num], ctx->sa.key, ctx->secy->key_len); in cn10k_mdo_add_rxsa()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | twofish_common.c | 570 unsigned int key_len) in __twofish_setkey() 586 if (key_len % 8) in __twofish_setkey() 610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey() 569 __twofish_setkey(struct twofish_ctx *ctx, const u8 *key, unsigned int key_len) __twofish_setkey() argument
|
H A D | testmgr.h | 156 unsigned int key_len; member 226 .key_len = 316, 282 .key_len = 607, 383 .key_len = 1191, 425 .key_len = 269, 643 .key_len = 2349, 660 .key_len = 49, 684 .key_len = 49, 708 .key_len = 49, 732 .key_len [all...] |
/kernel/linux/linux-6.6/net/wireless/ |
H A D | wext-compat.c | 496 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 537 params->key, params->key_len); in __cfg80211_set_encryption() 656 params.key_len = erq->length; in cfg80211_wext_siwencode() 713 if (ext->key_len == 5) in cfg80211_wext_siwencodeext() 715 else if (ext->key_len == 13) in cfg80211_wext_siwencodeext() 759 params.key_len = ext->key_len; in cfg80211_wext_siwencodeext() 810 wdev->wext.keys->params[idx].key_len); in cfg80211_wext_giwencode()
|
/kernel/linux/linux-5.10/block/ |
H A D | sed-opal.c | 1402 u8 key_len) in start_generic_opal_session() 1426 add_token_bytestring(&err, dev, key, key_len); in start_generic_opal_session() 1464 okey->key_len); in start_SIDASP_opal_session() 1482 key->key, key->key_len); in start_admin1LSP_opal_session() 1492 okey->key_len); in start_PSID_opal_session() 1499 size_t keylen = session->opal_key.key_len; in start_auth_opal_session() 1662 static int generic_pw_cmd(u8 *key, size_t key_len, u8 *cpin_uid, in generic_pw_cmd() argument 1674 add_token_bytestring(&err, dev, key, key_len); in generic_pw_cmd() 1697 if (generic_pw_cmd(usr->opal_key.key, usr->opal_key.key_len, in set_new_pw() 1713 if (generic_pw_cmd(key->key, key->key_len, cpin_ui in set_sid_cpin_pin() 1398 start_generic_opal_session(struct opal_dev *dev, enum opal_uid auth, enum opal_uid sp_type, const char *key, u8 key_len) start_generic_opal_session() argument [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_server.c | 128 long key_len = 0; in psk_server_cb() local 162 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_server_cb() 168 if (key_len > (int)max_psk_len) { in psk_server_cb() 171 max_psk_len, key_len); in psk_server_cb() 176 memcpy(psk, key, key_len); in psk_server_cb() 180 BIO_printf(bio_s_out, "fetched PSK len=%ld\n", key_len); in psk_server_cb() 181 return key_len; in psk_server_cb() 196 long key_len; in psk_find_session_cb() local 211 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_find_session_cb() 228 || !SSL_SESSION_set1_master_key(tmpsess, key, key_len) in psk_find_session_cb() [all...] |
H A D | s_client.c | 102 long key_len; in psk_client_cb() local 127 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_client_cb() 133 if (max_psk_len > INT_MAX || key_len > (long)max_psk_len) { in psk_client_cb() 136 max_psk_len, key_len); in psk_client_cb() 141 memcpy(psk, key, key_len); in psk_client_cb() 145 BIO_printf(bio_c_out, "created PSK len=%ld\n", key_len); in psk_client_cb() 147 return key_len; in psk_client_cb() 169 long key_len; in psk_use_session_cb() local 170 unsigned char *key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_use_session_cb() 188 || !SSL_SESSION_set1_master_key(usesess, key, key_len) in psk_use_session_cb() [all...] |
/third_party/openssl/apps/ |
H A D | s_server.c | 128 long key_len = 0; in psk_server_cb() local 162 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_server_cb() 168 if (key_len > (int)max_psk_len) { in psk_server_cb() 171 max_psk_len, key_len); in psk_server_cb() 176 memcpy(psk, key, key_len); in psk_server_cb() 180 BIO_printf(bio_s_out, "fetched PSK len=%ld\n", key_len); in psk_server_cb() 181 return key_len; in psk_server_cb() 196 long key_len; in psk_find_session_cb() local 211 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_find_session_cb() 228 || !SSL_SESSION_set1_master_key(tmpsess, key, key_len) in psk_find_session_cb() [all...] |
H A D | s_client.c | 102 long key_len; in psk_client_cb() local 127 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_client_cb() 133 if (max_psk_len > INT_MAX || key_len > (long)max_psk_len) { in psk_client_cb() 136 max_psk_len, key_len); in psk_client_cb() 141 memcpy(psk, key, key_len); in psk_client_cb() 145 BIO_printf(bio_c_out, "created PSK len=%ld\n", key_len); in psk_client_cb() 147 return key_len; in psk_client_cb() 169 long key_len; in psk_use_session_cb() local 170 unsigned char *key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_use_session_cb() 188 || !SSL_SESSION_set1_master_key(usesess, key, key_len) in psk_use_session_cb() [all...] |
/kernel/linux/linux-5.10/lib/ |
H A D | rhashtable.c | 992 * .key_len = sizeof(int), 1021 if ((!params->key_len && !params->obj_hashfn) || in rhashtable_init() 1046 ht->key_len = ht->p.key_len; in rhashtable_init() 1050 if (!(ht->key_len & (sizeof(u32) - 1))) { in rhashtable_init() 1051 ht->key_len /= sizeof(u32); in rhashtable_init()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/orinoco/ |
H A D | hw.c | 832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys() 862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys() 880 priv->keys[i].key_len); in __orinoco_hw_setup_wepkeys() 993 int set_tx, const u8 *key, size_t key_len, in __orinoco_hw_set_tkip_key() 1019 if (key_len != sizeof(buf.tkip)) in __orinoco_hw_set_tkip_key() 992 __orinoco_hw_set_tkip_key(struct orinoco_private *priv, int key_idx, int set_tx, const u8 *key, size_t key_len, const u8 *rsc, size_t rsc_len, const u8 *tsc, size_t tsc_len) __orinoco_hw_set_tkip_key() argument
|