/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | sta.h | 578 u8 *key, u32 key_len,
|
H A D | d3.c | 2205 status->gtk[0].len = data->key_len; 2227 if (!(data[data_idx].key_len)) 2229 status->gtk[status_idx].len = data[data_idx].key_len; 2256 if (!data->key_len) 2259 status->igtk.len = data->key_len; 2280 if (!data[data_idx].key_len) 2283 status->bigtk[status_idx].len = data[data_idx].key_len;
|
/linux-master/drivers/crypto/ |
H A D | n2_core.c | 661 int key_len; member in struct:n2_skcipher_context 750 ctx->key_len = keylen; 769 ctx->key_len = keylen; 788 ctx->key_len = keylen;
|
/linux-master/fs/xfs/libxfs/ |
H A D | xfs_refcount_btree.c | 326 .key_len = sizeof(struct xfs_refcount_key),
|
/linux-master/fs/bcachefs/ |
H A D | movinggc.c | 40 .key_len = sizeof(struct move_bucket_key),
|
/linux-master/fs/ubifs/ |
H A D | sb.c | 94 /* Some functions called from here depend on the @c->key_len filed */ 95 c->key_len = UBIFS_SK_LEN; 707 c->key_len = UBIFS_SK_LEN;
|
/linux-master/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum_nve.c | 80 .key_len = sizeof(struct mlxsw_sp_nve_mc_list_key), 813 .key_len = sizeof(struct mlxsw_sp_nve_ipv6_ht_key),
|
H A D | spectrum_acl.c | 81 .key_len = sizeof(struct mlxsw_sp_acl_ruleset_ht_key), 88 .key_len = sizeof(unsigned long),
|
H A D | core_acl_flex_actions.c | 109 .key_len = sizeof(struct mlxsw_afa_set_ht_key), 127 .key_len = sizeof(struct mlxsw_afa_fwd_entry_ht_key), 191 .key_len = sizeof(u32),
|
/linux-master/drivers/net/ethernet/chelsio/cxgb4/ |
H A D | l2t.c | 422 unsigned int addr_len = neigh->tbl->key_len; 511 unsigned int addr_len = neigh->tbl->key_len;
|
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_tun.c | 267 memcpy(&m_neigh.dst_ip, attr.n->primary_key, attr.n->tbl->key_len); 538 memcpy(&m_neigh.dst_ip, attr.n->primary_key, attr.n->tbl->key_len);
|
/linux-master/lib/ |
H A D | test_rhashtable.c | 98 .key_len = sizeof(struct test_obj_val), 105 .key_len = sizeof(struct test_obj_val),
|
/linux-master/security/keys/encrypted-keys/ |
H A D | encrypted.c | 384 unsigned int key_len) 397 ret = crypto_skcipher_setkey(tfm, key, key_len); 383 init_skcipher_req(const u8 *key, unsigned int key_len) argument
|
/linux-master/fs/nfsd/ |
H A D | nfs4layouts.c | 59 size_t fsid_len = key_len(fh->fh_fsid_type); 79 key_len(old->fsid_type)))
|
/linux-master/net/ipv6/ |
H A D | ioam6.c | 64 .key_len = sizeof(__be16), 72 .key_len = sizeof(u32),
|
/linux-master/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_wx.c | 694 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) 702 if (ext->key_len == 13)
|
/linux-master/net/mac80211/ |
H A D | mesh_pathtbl.c | 31 .key_len = ETH_ALEN, 40 .key_len = sizeof_field(struct ieee80211_mesh_fast_tx, key),
|
/linux-master/drivers/net/ethernet/sfc/ |
H A D | tc.c | 93 .key_len = offsetofend(struct efx_tc_mac_pedit_action, h_addr), 99 .key_len = offsetof(struct efx_tc_encap_match, linkage), 105 .key_len = sizeof(unsigned long), 111 .key_len = sizeof(unsigned long), 117 .key_len = offsetof(struct efx_tc_recirc_id, linkage),
|
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.c | 327 cipher_parms.key_len = ctx->enckeylen; 707 hash_parms.key_len = ctx->authkeylen; 799 hash_parms.key_len = digestsize; 1304 cipher_parms.key_len = ctx->enckeylen; 1312 hash_parms.key_len = ctx->authkeylen; 1317 hash_parms.key_len = SHA224_DIGEST_SIZE; 1872 cipher_parms.key_len = ctx->enckeylen;
|
/linux-master/drivers/net/wireless/marvell/mwifiex/ |
H A D | cfg80211.c | 471 if (params->key && params->key_len) { 475 params->key_len); 477 wep_key->key_length = params->key_len; 483 if (mwifiex_set_encode(priv, params, params->key, params->key_len, 507 encrypt_key.key_len = WLAN_KEY_LEN_CCMP; 2319 "with key len %d\n", sme->key_len); 2322 sme->key_len, sme->key_idx,
|
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 2255 unsigned int key_len) 2261 err = chcr_cipher_fallback_setkey(cipher, key, key_len); 2265 memcpy(ablkctx->key, key, key_len); 2266 ablkctx->enckey_len = key_len; 2267 get_aes_decrypt_key(ablkctx->rrkey, ablkctx->key, key_len << 2); 2268 context_size = (KEY_CONTEXT_HDR_SALT_AND_PAD + key_len) >> 4; 2272 if (key_len == 48) { 2273 context_size = (KEY_CONTEXT_HDR_SALT_AND_PAD + key_len 2285 FILL_KEY_CTX_HDR((key_len == AES_KEYSIZE_256) ? 2254 chcr_aes_xts_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int key_len) argument
|
/linux-master/drivers/net/wireless/broadcom/b43/ |
H A D | main.c | 964 const u8 *key, size_t key_len, const u8 *mac_addr) 973 B43_WARN_ON(key_len > B43_SEC_KEYSIZE); 991 memcpy(buf, key, key_len); 1001 const u8 *key, size_t key_len, 1015 if (algorithm == B43_SEC_ALGO_TKIP && key_len == 32) 1016 key_len = 16; 1017 if (key_len > B43_SEC_KEYSIZE) 1046 do_key_write(dev, index, algorithm, key, key_len, mac_addr); 1050 do_key_write(dev, index + 4, algorithm, key, key_len, NULL); 962 do_key_write(struct b43_wldev *dev, u8 index, u8 algorithm, const u8 *key, size_t key_len, const u8 *mac_addr) argument 999 b43_key_write(struct b43_wldev *dev, int index, u8 algorithm, const u8 *key, size_t key_len, const u8 *mac_addr, struct ieee80211_key_conf *keyconf) argument
|
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 515 static int qat_alg_validate_key(int key_len, int *alg, int mode) argument 518 switch (key_len) { 532 switch (key_len) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7603/ |
H A D | mac.c | 895 int key_len = sizeof(key_data); local 903 key_len = 16; 906 mt76_wr_copy(dev, addr, key_data, key_len);
|
/linux-master/block/ |
H A D | blk-cgroup.c | 764 int key_len; local 769 if (sscanf(input, "%u:%u%n", &major, &minor, &key_len) != 2) 772 input += key_len;
|