Home
last modified time | relevance | path

Searched refs:key_type (Results 1 - 20 of 20) sorted by relevance

/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/
H A Dupg_check_boot_bin.h75 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member
99 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member
119 hi_u32 key_type; /* 0x3C965AC3: Maintenance mode, should check die_id; member
H A Dupg_check_boot_bin.c59 if (sub_key->key_type == MAINTENANCE_KEY_TPYE) { in upg_check_die_id()
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/mac/hmac/
H A Dhmac_11i.c1208 wlan_cipher_key_type_enum_uint8 key_type; in hmac_en_mic() local
1211 key_type = hmac_user->base_user->user_tx_info.security.cipher_key_type; in hmac_en_mic()
1213 key = mac_user_get_key(hmac_user->base_user, key_type - 1); in hmac_en_mic()
1215 oam_error_log1(0, OAM_SF_WPA, "{hmac_en_mic::mac_user_get_key FAIL. en_key_type[%d]}", key_type); in hmac_en_mic()
1221 if (key_type == 0 || key_type > 5) { /* 5 边界 */ in hmac_en_mic()
1255 wlan_cipher_key_type_enum_uint8 key_type; in hmac_de_mic() local
1257 key_type = hmac_user->base_user->user_tx_info.security.cipher_key_type; in hmac_de_mic()
1259 key = mac_user_get_key(hmac_user->base_user, key_type - 1); in hmac_de_mic()
1261 oam_error_log1(0, OAM_SF_WPA, "{hmac_de_mic::mac_user_get_key FAIL. en_key_type[%d]}", key_type); in hmac_de_mic()
[all...]
H A Dhmac_ext_if.h176 oal_nl80211_key_type key_type; member
H A Ddmac_ext_if.h437 oal_nl80211_key_type key_type; member
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/oal/
H A Doal_cfg80211.c222 enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp) in oal_cfg80211_mic_failure()
225 cfg80211_michael_mic_failure(net_device, mac_addr, key_type, key_id, tsc, en_gfp); in oal_cfg80211_mic_failure()
229 hi_unref_param(key_type); in oal_cfg80211_mic_failure()
221 oal_cfg80211_mic_failure(oal_net_device_stru *net_device, const hi_u8 *mac_addr, enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp) oal_cfg80211_mic_failure() argument
H A Doal_cfg80211.h86 enum nl80211_key_type key_type, hi_s32 key_id, const hi_u8 *tsc, oal_gfp_enum_uint8 en_gfp);
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/libcoap/include/coap2/
H A Dcoap_dtls.h164 coap_pki_key_t key_type; /**< key format type */ member
/device/soc/hisilicon/common/platform/wifi/hi3881v100/driver/wal/
H A Dwal_cfg80211_apt.c613 cfg80211_michael_mic_failure(netdev, mic_event->auc_user_mac, mic_event->key_type, mic_event->l_key_id, puc_tsc, in cfg80211_mic_failure()
616 mic_failure.key_type = mic_event->key_type; in cfg80211_mic_failure()
H A Dhi_wifi_driver_wpa_if.h565 oal_nl80211_key_type key_type; member
H A Dwal_event.c528 oal_cfg80211_mic_failure(netdev, mic_event->auc_user_mac, mic_event->key_type, mic_event->l_key_id, HI_NULL, in wal_mic_failure_proc()
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/
H A Dhks_types.h219 uint32_t key_type; /* algorithm */ member
/device/soc/hisilicon/hi3861v100/sdk_liteos/components/at/src/
H A Dat_demo_hks.c230 key_param->key_type = HKS_KEY_TYPE_AES; in hks_set_conn_key_param()
509 key_param->key_type = HKS_KEY_TYPE_AES; in hks_set_cert_key_param()
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/
H A Dwl_cfgnan.h414 nan_security_key_input_type key_type; /* cipher suite type */ member
440 nan_security_key_input_type key_type; /* cipher suite type */ member
H A Dwl_cfgnan.c4486 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_sd_params_handler()
4487 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_sd_params_handler()
5982 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_data_path_request_handler()
5983 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_data_path_request_handler()
6249 if ((cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PMK) || in wl_cfgnan_data_path_response_handler()
6250 (cmd_data->key_type == NAN_SECURITY_KEY_INPUT_PASSPHRASE)) { in wl_cfgnan_data_path_response_handler()
H A Dwl_cfgvendor.c3512 cmd_data->key_type = nla_get_u8(iter); in wl_cfgvendor_nan_parse_datapath_args()
3513 WL_TRACE(("Key Type = %u\n", cmd_data->key_type)); in wl_cfgvendor_nan_parse_datapath_args()
4065 cmd_data->key_type = nla_get_u8(iter); in wl_cfgvendor_nan_parse_discover_args()
4066 WL_TRACE(("Key Type = %u\n", cmd_data->key_type)); in wl_cfgvendor_nan_parse_discover_args()
H A Dwl_cfg80211.c16407 enum nl80211_key_type key_type; in wl_notify_mic_status() local
16415 key_type = NL80211_KEYTYPE_GROUP; in wl_notify_mic_status()
16417 key_type = NL80211_KEYTYPE_PAIRWISE; in wl_notify_mic_status()
16420 cfg80211_michael_mic_failure(ndev, (const u8 *)&e->addr, key_type, -1, in wl_notify_mic_status() local
/device/soc/rockchip/common/sdk_linux/kernel/bpf/
H A Dsyscall.c740 int map_check_no_btf(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type, in map_check_no_btf() argument
748 const struct btf_type *key_type, *value_type; in map_check_btf() local
754 key_type = btf_type_id_size(btf, &btf_key_id, &key_size); in map_check_btf()
755 if (!key_type || key_size != map->key_size) { in map_check_btf()
759 key_type = btf_type_by_id(btf, 0); in map_check_btf()
788 ret = map->ops->map_check_btf(map, btf, key_type, value_type); in map_check_btf()
/device/soc/rockchip/common/sdk_linux/include/linux/
H A Dbpf.h84 int (*map_check_btf)(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type,
226 int map_check_no_btf(const struct bpf_map *map, const struct btf *btf, const struct btf_type *key_type,
/device/soc/rockchip/common/sdk_linux/fs/ubifs/
H A Drecovery.c1424 switch (key_type(c, key)) { in ubifs_recover_size_accum()

Completed in 104 milliseconds