/openbmc/linux/fs/ntfs/ |
H A D | index.c | 185 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 192 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 214 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 352 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 362 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 377 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
H A D | dir.c | 127 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 383 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 678 (u8*)ie + le16_to_cpu(ie->key_length) > 861 (u8*)ie + le16_to_cpu(ie->key_length) > 1188 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir() 1370 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir()
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | aes-cipher-glue.c | 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt()
|
H A D | aes-glue.c | 183 int err, rounds = 6 + ctx->key_length / 4; in ecb_encrypt() 203 int err, rounds = 6 + ctx->key_length / 4; in ecb_decrypt() 224 int err = 0, rounds = 6 + ctx->key_length / 4; in cbc_encrypt_walk() 253 int err = 0, rounds = 6 + ctx->key_length / 4; in cbc_decrypt_walk() 281 int err, rounds = 6 + ctx->key_length / 4; in cts_cbc_encrypt() 338 int err, rounds = 6 + ctx->key_length / 4; in cts_cbc_decrypt() 411 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_encrypt() 433 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_decrypt() 455 int err, rounds = 6 + ctx->key_length / 4; in xctr_encrypt() 501 int err, rounds = 6 + ctx->key_length / 4; in ctr_encrypt() [all …]
|
H A D | aes-ce-glue.c | 43 return 6 + ctx->key_length / 4; in num_rounds() 93 ctx->key_length = key_len; in ce_aes_expandkey()
|
/openbmc/linux/arch/arm/crypto/ |
H A D | aes-cipher-glue.c | 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt()
|
/openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/ |
H A D | triehash | 456 my $key_length = 0; 460 $key_length = length($key); 464 … x $indent) . "switch(%s | 0x%s) {\n", $self->switch_key($index, $key_length), '20' x $key_length); 466 … printf { $fh } ((' ' x $indent) . "switch(%s) {\n", $self->switch_key($index, $key_length));
|
/openbmc/linux/drivers/s390/crypto/ |
H A D | zcrypt_msgtype6.h | 130 short int key_length; in rng_type6cprb_msgx() member 157 msg->key_length = 0x02; in rng_type6cprb_msgx()
|
/openbmc/linux/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_linux.c | 99 pwep->key_length = wep_key_len; in wpa_set_encryption() 114 memcpy(pwep->key_material, param->u.crypt.key, pwep->key_length); in wpa_set_encryption() 128 memcpy(&psecuritypriv->dot11DefKey[wep_key_idx].skey[0], pwep->key_material, pwep->key_length); in wpa_set_encryption() 129 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->key_length; in wpa_set_encryption() 579 pwep->key_length = wep_key_len; in rtw_set_encryption() 585 memcpy(pwep->key_material, param->u.crypt.key, pwep->key_length); in rtw_set_encryption() 593 if (pwep->key_length == 13) { in rtw_set_encryption() 600 memcpy(&psecuritypriv->dot11DefKey[wep_key_idx].skey[0], pwep->key_material, pwep->key_length); in rtw_set_encryption() 602 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->key_length; in rtw_set_encryption() 604 rtw_ap_set_wep_key(padapter, pwep->key_material, pwep->key_length, wep_key_idx, 1); in rtw_set_encryption() [all …]
|
/openbmc/qemu/ui/ |
H A D | input-legacy.c | 59 int index_from_key(const char *key, size_t key_length) in index_from_key() argument 64 if (!strncmp(key, QKeyCode_str(i), key_length) && in index_from_key() 65 !QKeyCode_str(i)[key_length]) { in index_from_key()
|
/openbmc/linux/arch/x86/crypto/ |
H A D | camellia-x86_64-asm_64.S | 35 #define key_length CAMELLIA_TABLE_BYTE_LEN macro 202 cmpb $16, key_length(CTX); 233 cmpl $16, key_length(CTX); 437 cmpb $16, key_length(CTX); 469 cmpl $16, key_length(CTX);
|
H A D | camellia.h | 19 u32 key_length; member
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/pidgin/pidgin-sipe/ |
H A D | 0001-Migrate-to-use-g_memdup2.patch | 123 ctx->key_length = state->key_length; 126 state->key_length); 129 state->key_length);
|
/openbmc/linux/lib/crypto/ |
H A D | aes.c | 196 ctx->key_length = key_len; in aes_expandkey() 261 int rounds = 6 + ctx->key_length / 4; in aes_encrypt() 312 int rounds = 6 + ctx->key_length / 4; in aes_decrypt()
|
/openbmc/linux/drivers/staging/rtl8723bs/core/ |
H A D | rtw_ioctl_set.c | 438 switch (wep->key_length) { in rtw_set_802_11_add_wep() 450 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->key_material), wep->key_length); in rtw_set_802_11_add_wep() 452 psecuritypriv->dot11DefKeylen[keyid] = wep->key_length; in rtw_set_802_11_add_wep()
|
/openbmc/linux/include/crypto/ |
H A D | aes.h | 28 u32 key_length; member
|
/openbmc/linux/drivers/staging/ks7010/ |
H A D | eap_packet.h | 43 unsigned short key_length; member
|
/openbmc/linux/drivers/crypto/marvell/cesa/ |
H A D | cipher.c | 274 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 275 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 711 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 714 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() 716 else if (ctx->aes.key_length == 32) in mv_cesa_aes_op()
|
/openbmc/u-boot/lib/ |
H A D | tpm-v1.c | 700 size_t key_length, const void *parent_key_usage_auth, in tpm1_load_key2_oiap() argument 727 sizeof(command) + key_length in tpm1_load_key2_oiap() 730 req_key_offset, key, key_length in tpm1_load_key2_oiap() 734 err = create_request_auth(request, sizeof(command) + key_length, 4, in tpm1_load_key2_oiap() 736 request + sizeof(command) + key_length, in tpm1_load_key2_oiap()
|
/openbmc/linux/crypto/ |
H A D | aes_generic.c | 1181 const int key_len = ctx->key_length; in crypto_aes_encrypt() 1250 const int key_len = ctx->key_length; in crypto_aes_decrypt()
|
/openbmc/linux/drivers/crypto/axis/ |
H A D | artpec6_crypto.c | 327 size_t key_length; member 1200 ctx->key_length); in artpec6_crypto_ctr_crypt() 1256 ctx->key_length = len; in artpec6_crypto_aead_set_key() 1612 ctx->key_length = keylen; in artpec6_crypto_cipher_set_key() 1638 ctx->key_length = keylen; in artpec6_crypto_xts_set_key() 1692 ctx->key_length, true, false); in artpec6_crypto_prepare_crypto() 1699 cipher_klen = ctx->key_length/2; in artpec6_crypto_prepare_crypto() 1701 cipher_klen = ctx->key_length; in artpec6_crypto_prepare_crypto() 1716 MODULE_NAME, ctx->key_length); in artpec6_crypto_prepare_crypto() 1856 ctx->key_length, true, false); in artpec6_crypto_prepare_aead() [all …]
|
/openbmc/linux/drivers/net/wireless/silabs/wfx/ |
H A D | key.c | 37 msg->key_length = key->keylen; in fill_wep_pair() 48 msg->key_length = key->keylen; in fill_wep_group()
|
/openbmc/linux/drivers/staging/rtl8723bs/include/ |
H A D | wlan_bssdef.h | 115 u32 key_length; /* length of key in bytes */ member
|
/openbmc/linux/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_ioctl.c | 919 if (!wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key() 927 wep_key->key_material, wep_key->key_length); in mwifiex_sec_ioctl_set_wep_key() 928 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 941 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 944 if (wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key()
|
/openbmc/linux/drivers/net/ethernet/mscc/ |
H A D | ocelot_flower.c | 526 int key_length = vcap->keys[VCAP_ES0_IGR_PORT].length; in ocelot_flower_parse_indev() local 566 filter->ingress_port.mask = GENMASK(key_length - 1, 0); in ocelot_flower_parse_indev() 817 int key_length = vcap->keys[VCAP_ES0_EGR_PORT].length; in ocelot_vcap_filter_create() local 820 filter->egress_port.mask = GENMASK(key_length - 1, 0); in ocelot_vcap_filter_create()
|