/linux-4.1.27/arch/x86/crypto/ |
H A D | aes_ctrby8_avx-x86_64.S | 155 * do_aes num_in_par load_keys key_len 158 .macro do_aes b, k, key_len 161 .set klen, \key_len 429 .macro do_aes_load val, key_len 430 do_aes \val, 1, \key_len 433 .macro do_aes_noload val, key_len 434 do_aes \val, 0, \key_len 439 .macro do_aes_ctrmain key_len 441 jb .Ldo_return2\key_len 449 jz .Lmult_of_8_blks\key_len 453 jg .Lgt4\key_len 454 je .Leq4\key_len 456 .Llt4\key_len: 458 jg .Leq3\key_len 459 je .Leq2\key_len 461 .Leq1\key_len: 462 do_aes_load 1, \key_len 465 jz .Ldo_return2\key_len 466 jmp .Lmain_loop2\key_len 468 .Leq2\key_len: 469 do_aes_load 2, \key_len 472 jz .Ldo_return2\key_len 473 jmp .Lmain_loop2\key_len 476 .Leq3\key_len: 477 do_aes_load 3, \key_len 480 jz .Ldo_return2\key_len 481 jmp .Lmain_loop2\key_len 483 .Leq4\key_len: 484 do_aes_load 4, \key_len 487 jz .Ldo_return2\key_len 488 jmp .Lmain_loop2\key_len 490 .Lgt4\key_len: 492 jg .Leq7\key_len 493 je .Leq6\key_len 495 .Leq5\key_len: 496 do_aes_load 5, \key_len 499 jz .Ldo_return2\key_len 500 jmp .Lmain_loop2\key_len 502 .Leq6\key_len: 503 do_aes_load 6, \key_len 506 jz .Ldo_return2\key_len 507 jmp .Lmain_loop2\key_len 509 .Leq7\key_len: 510 do_aes_load 7, \key_len 513 jz .Ldo_return2\key_len 514 jmp .Lmain_loop2\key_len 516 .Lmult_of_8_blks\key_len: 517 .if (\key_len != KEY_128) 529 .Lmain_loop2\key_len: 531 do_aes_noload 8, \key_len 534 jne .Lmain_loop2\key_len 536 .Ldo_return2\key_len:
|
H A D | aesni-intel_glue.c | 84 unsigned int key_len); 304 const u8 *in_key, unsigned int key_len) aes_set_key_common() 310 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && aes_set_key_common() 311 key_len != AES_KEYSIZE_256) { aes_set_key_common() 317 err = crypto_aes_expand_key(ctx, in_key, key_len); aes_set_key_common() 320 err = aesni_set_key(ctx, in_key, key_len); aes_set_key_common() 328 unsigned int key_len) aes_set_key() 330 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); aes_set_key() 837 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) rfc4106_set_hash_subkey() argument 850 ret = crypto_ablkcipher_setkey(ctr_tfm, key, key_len); rfc4106_set_hash_subkey() 896 unsigned int key_len) common_rfc4106_set_key() 903 if (key_len < 4) { common_rfc4106_set_key() 908 key_len -= 4; common_rfc4106_set_key() 909 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && common_rfc4106_set_key() 910 key_len != AES_KEYSIZE_256) { common_rfc4106_set_key() 915 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); common_rfc4106_set_key() 922 new_key_mem = kmalloc(key_len+AESNI_ALIGN, GFP_KERNEL); common_rfc4106_set_key() 927 memcpy(new_key_align, key, key_len); common_rfc4106_set_key() 933 key, key_len); common_rfc4106_set_key() 936 ret = aesni_set_key(&(ctx->aes_key_expanded), key, key_len); common_rfc4106_set_key() 944 ret = rfc4106_set_hash_subkey(ctx->hash_subkey, key, key_len); common_rfc4106_set_key() 951 unsigned int key_len) rfc4106_set_key() 959 ret = crypto_aead_setkey(child, key, key_len); rfc4106_set_key() 1004 u32 key_len = ctx->aes_key_expanded.key_length; __driver_rfc4106_encrypt() local 1021 if (unlikely(key_len != AES_KEYSIZE_128 && __driver_rfc4106_encrypt() 1022 key_len != AES_KEYSIZE_192 && __driver_rfc4106_encrypt() 1023 key_len != AES_KEYSIZE_256)) __driver_rfc4106_encrypt() 1090 u32 key_len = ctx->aes_key_expanded.key_length; __driver_rfc4106_decrypt() local 1106 if (unlikely(key_len != AES_KEYSIZE_128 && __driver_rfc4106_decrypt() 1107 key_len != AES_KEYSIZE_192 && __driver_rfc4106_decrypt() 1108 key_len != AES_KEYSIZE_256)) __driver_rfc4106_decrypt() 303 aes_set_key_common(struct crypto_tfm *tfm, void *raw_ctx, const u8 *in_key, unsigned int key_len) aes_set_key_common() argument 327 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 895 common_rfc4106_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) common_rfc4106_set_key() argument 950 rfc4106_set_key(struct crypto_aead *parent, const u8 *key, unsigned int key_len) rfc4106_set_key() argument
|
H A D | camellia_aesni_avx_glue.c | 203 unsigned int key_len) camellia_setkey() 205 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, camellia_setkey() 202 camellia_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) camellia_setkey() argument
|
H A D | camellia_glue.c | 1250 unsigned int key_len, u32 *flags) __camellia_setkey() 1252 if (key_len != 16 && key_len != 24 && key_len != 32) { __camellia_setkey() 1257 cctx->key_length = key_len; __camellia_setkey() 1259 switch (key_len) { __camellia_setkey() 1276 unsigned int key_len) camellia_setkey() 1278 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, camellia_setkey() 1249 __camellia_setkey(struct camellia_ctx *cctx, const unsigned char *key, unsigned int key_len, u32 *flags) __camellia_setkey() argument 1275 camellia_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) camellia_setkey() argument
|
H A D | camellia_aesni_avx2_glue.c | 199 unsigned int key_len) camellia_setkey() 201 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, camellia_setkey() 198 camellia_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) camellia_setkey() argument
|
/linux-4.1.27/arch/arm/crypto/ |
H A D | aes_glue.c | 29 unsigned int key_len) aes_set_key() 33 switch (key_len) { aes_set_key() 35 key_len = 128; aes_set_key() 38 key_len = 192; aes_set_key() 41 key_len = 256; aes_set_key() 48 if (private_AES_set_encrypt_key(in_key, key_len, &ctx->enc_key) == -1) { aes_set_key() 54 if (private_AES_set_decrypt_key(in_key, key_len, &ctx->dec_key) == -1) { aes_set_key() 28 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument
|
H A D | aes-ce-glue.c | 64 unsigned int key_len) ce_aes_expandkey() 73 u32 kwords = key_len / sizeof(u32); ce_aes_expandkey() 77 if (key_len != AES_KEYSIZE_128 && ce_aes_expandkey() 78 key_len != AES_KEYSIZE_192 && ce_aes_expandkey() 79 key_len != AES_KEYSIZE_256) ce_aes_expandkey() 82 memcpy(ctx->key_enc, in_key, key_len); ce_aes_expandkey() 83 ctx->key_length = key_len; ce_aes_expandkey() 96 if (key_len == AES_KEYSIZE_192) { ce_aes_expandkey() 101 } else if (key_len == AES_KEYSIZE_256) { ce_aes_expandkey() 131 unsigned int key_len) ce_aes_setkey() 136 ret = ce_aes_expandkey(ctx, in_key, key_len); ce_aes_setkey() 150 unsigned int key_len) xts_set_key() 155 ret = ce_aes_expandkey(&ctx->key1, in_key, key_len / 2); xts_set_key() 157 ret = ce_aes_expandkey(&ctx->key2, &in_key[key_len / 2], xts_set_key() 158 key_len / 2); xts_set_key() 63 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 130 ce_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument 149 xts_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument
|
H A D | aesbs-glue.c | 58 unsigned int key_len) aesbs_cbc_set_key() 61 int bits = key_len * 8; aesbs_cbc_set_key() 74 unsigned int key_len) aesbs_ctr_set_key() 77 int bits = key_len * 8; aesbs_ctr_set_key() 88 unsigned int key_len) aesbs_xts_set_key() 91 int bits = key_len * 4; aesbs_xts_set_key() 99 private_AES_set_encrypt_key(in_key + key_len / 2, bits, &ctx->twkey); aesbs_xts_set_key() 57 aesbs_cbc_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_set_key() argument 73 aesbs_ctr_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_set_key() argument 87 aesbs_xts_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_set_key() argument
|
/linux-4.1.27/include/crypto/ |
H A D | blowfish.h | 21 unsigned int key_len);
|
H A D | twofish.h | 21 unsigned int key_len, u32 *flags); 22 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
H A D | aes.h | 36 unsigned int key_len); 38 unsigned int key_len);
|
H A D | ablk_helper.h | 17 unsigned int key_len);
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | camellia_glue.c | 29 int key_len; member in struct:camellia_sparc64_ctx 33 unsigned int key_len, u64 *decrypt_key); 36 unsigned int key_len) camellia_set_key() 42 if (key_len != 16 && key_len != 24 && key_len != 32) { camellia_set_key() 47 ctx->key_len = key_len; camellia_set_key() 50 key_len, &ctx->decrypt_key[0]); camellia_set_key() 55 u32 *output, unsigned int key_len); 63 (u32 *) dst, ctx->key_len); camellia_encrypt() 72 (u32 *) dst, ctx->key_len); camellia_decrypt() 75 extern void camellia_sparc64_load_keys(const u64 *key, unsigned int key_len); 96 if (ctx->key_len != 16) __ecb_crypt() 107 camellia_sparc64_load_keys(key, ctx->key_len); __ecb_crypt() 159 if (ctx->key_len != 16) cbc_encrypt() 167 camellia_sparc64_load_keys(key, ctx->key_len); cbc_encrypt() 198 if (ctx->key_len != 16) cbc_decrypt() 206 camellia_sparc64_load_keys(key, ctx->key_len); cbc_decrypt() 35 camellia_set_key(struct crypto_tfm *tfm, const u8 *_in_key, unsigned int key_len) camellia_set_key() argument
|
H A D | aes_glue.c | 164 unsigned int key_len); 167 unsigned int key_len) aes_set_key() 172 switch (key_len) { aes_set_key() 193 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); aes_set_key() 194 ctx->key_length = key_len; aes_set_key() 166 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument
|
H A D | aes_asm.S | 212 /* %o0=input_key, %o1=output_key, %o2=key_len */ 1046 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len */ 1089 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len */ 1132 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len */ 1264 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len, %o4=iv */ 1296 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len, %o4=iv */ 1328 /* %o0=&key[key_len], %o1=input, %o2=output, %o3=len, %o4=iv */
|
H A D | camellia_asm.S | 33 /* %o0=in_key, %o1=encrypt_key, %o2=key_len, %o3=decrypt_key */ 241 /* %o0=key, %o1=input, %o2=output, %o3=key_len */ 312 /* %o0=key, %o1=key_len */
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | aes_s390.c | 43 int key_len; member in struct:s390_aes_ctx 63 int key_len; member in struct:s390_xts_ctx 68 * Check if the key_len is supported by the HW. 72 static int need_fallback(unsigned int key_len) need_fallback() argument 74 switch (key_len) { need_fallback() 95 unsigned int key_len) setkey_fallback_cip() 104 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); setkey_fallback_cip() 114 unsigned int key_len) aes_set_key() 120 ret = need_fallback(key_len); aes_set_key() 126 sctx->key_len = key_len; aes_set_key() 128 memcpy(sctx->key, in_key, key_len); aes_set_key() 132 return setkey_fallback_cip(tfm, in_key, key_len); aes_set_key() 139 if (unlikely(need_fallback(sctx->key_len))) { aes_encrypt() 144 switch (sctx->key_len) { aes_encrypt() 164 if (unlikely(need_fallback(sctx->key_len))) { aes_decrypt() 169 switch (sctx->key_len) { aes_decrypt() 286 unsigned int key_len) ecb_aes_set_key() 291 ret = need_fallback(key_len); ecb_aes_set_key() 293 sctx->key_len = key_len; ecb_aes_set_key() 294 return setkey_fallback_blk(tfm, in_key, key_len); ecb_aes_set_key() 297 switch (key_len) { ecb_aes_set_key() 312 return aes_set_key(tfm, in_key, key_len); ecb_aes_set_key() 345 if (unlikely(need_fallback(sctx->key_len))) ecb_aes_encrypt() 359 if (unlikely(need_fallback(sctx->key_len))) ecb_aes_decrypt() 415 unsigned int key_len) cbc_aes_set_key() 420 ret = need_fallback(key_len); cbc_aes_set_key() 422 sctx->key_len = key_len; cbc_aes_set_key() 423 return setkey_fallback_blk(tfm, in_key, key_len); cbc_aes_set_key() 426 switch (key_len) { cbc_aes_set_key() 441 return aes_set_key(tfm, in_key, key_len); cbc_aes_set_key() 459 memcpy(param.key, sctx->key, sctx->key_len); cbc_aes_crypt() 486 if (unlikely(need_fallback(sctx->key_len))) cbc_aes_encrypt() 500 if (unlikely(need_fallback(sctx->key_len))) cbc_aes_decrypt() 585 unsigned int key_len) xts_aes_set_key() 590 switch (key_len) { xts_aes_set_key() 600 xts_fallback_setkey(tfm, in_key, key_len); xts_aes_set_key() 612 xts_ctx->key_len = key_len; xts_aes_set_key() 620 unsigned int offset = (xts_ctx->key_len >> 1) & 0x10; xts_aes_crypt() 669 if (unlikely(xts_ctx->key_len == 48)) xts_aes_encrypt() 683 if (unlikely(xts_ctx->key_len == 48)) xts_aes_decrypt() 741 unsigned int key_len) ctr_aes_set_key() 745 switch (key_len) { ctr_aes_set_key() 760 return aes_set_key(tfm, in_key, key_len); ctr_aes_set_key() 94 setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) setkey_fallback_cip() argument 113 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 285 ecb_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ecb_aes_set_key() argument 414 cbc_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) cbc_aes_set_key() argument 584 xts_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) xts_aes_set_key() argument 740 ctr_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_set_key() argument
|
H A D | des_s390.c | 36 unsigned int key_len) des_setkey() 48 memcpy(ctx->key, key, key_len); des_setkey() 240 unsigned int key_len) des3_setkey() 252 memcpy(ctx->key, key, key_len); des3_setkey() 35 des_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des_setkey() argument 239 des3_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des3_setkey() argument
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | aes-ce-cipher.c | 150 unsigned int key_len) ce_aes_expandkey() 159 u32 kwords = key_len / sizeof(u32); ce_aes_expandkey() 163 if (key_len != AES_KEYSIZE_128 && ce_aes_expandkey() 164 key_len != AES_KEYSIZE_192 && ce_aes_expandkey() 165 key_len != AES_KEYSIZE_256) ce_aes_expandkey() 168 memcpy(ctx->key_enc, in_key, key_len); ce_aes_expandkey() 169 ctx->key_length = key_len; ce_aes_expandkey() 181 if (key_len == AES_KEYSIZE_192) { ce_aes_expandkey() 186 } else if (key_len == AES_KEYSIZE_256) { ce_aes_expandkey() 223 unsigned int key_len) ce_aes_setkey() 228 ret = ce_aes_expandkey(ctx, in_key, key_len); ce_aes_setkey() 149 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 222 ce_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument
|
H A D | aes-glue.c | 83 unsigned int key_len) xts_set_key() 88 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); xts_set_key() 90 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], xts_set_key() 91 key_len / 2); xts_set_key() 82 xts_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument
|
H A D | aes-ce-ccm-glue.c | 48 unsigned int key_len) ccm_setkey() 53 ret = ce_aes_expandkey(ctx, in_key, key_len); ccm_setkey() 47 ccm_setkey(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm_setkey() argument
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 41 unsigned int key_len) ccp_aes_setkey() 47 switch (key_len) { ccp_aes_setkey() 62 ctx->u.aes.key_len = key_len; ccp_aes_setkey() 64 memcpy(ctx->u.aes.key, key, key_len); ccp_aes_setkey() 65 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); ccp_aes_setkey() 78 if (!ctx->u.aes.key_len) ccp_aes_crypt() 105 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; ccp_aes_crypt() 132 ctx->u.aes.key_len = 0; ccp_aes_cra_init() 156 unsigned int key_len) ccp_aes_rfc3686_setkey() 160 if (key_len < CTR_RFC3686_NONCE_SIZE) ccp_aes_rfc3686_setkey() 163 key_len -= CTR_RFC3686_NONCE_SIZE; ccp_aes_rfc3686_setkey() 164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); ccp_aes_rfc3686_setkey() 166 return ccp_aes_setkey(tfm, key, key_len); ccp_aes_rfc3686_setkey() 207 ctx->u.aes.key_len = 0; ccp_aes_rfc3686_cra_init() 40 ccp_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_setkey() argument 155 ccp_aes_rfc3686_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_rfc3686_setkey() argument
|
H A D | ccp-crypto-aes-xts.c | 98 unsigned int key_len) ccp_aes_xts_setkey() 105 switch (key_len) { ccp_aes_xts_setkey() 107 memcpy(ctx->u.aes.key, key, key_len); ccp_aes_xts_setkey() 110 ctx->u.aes.key_len = key_len / 2; ccp_aes_xts_setkey() 111 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); ccp_aes_xts_setkey() 114 key_len); ccp_aes_xts_setkey() 128 if (!ctx->u.aes.key_len) ccp_aes_xts_crypt() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) { ccp_aes_xts_crypt() 170 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; ccp_aes_xts_crypt() 198 ctx->u.aes.key_len = 0; ccp_aes_xts_cra_init() 97 ccp_aes_xts_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_xts_setkey() argument
|
H A D | ccp-crypto-aes-cmac.c | 72 if (!ctx->u.aes.key_len) ccp_do_cmac_update() 153 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; ccp_do_cmac_update() 242 unsigned int key_len) ccp_aes_cmac_setkey() 252 switch (key_len) { ccp_aes_cmac_setkey() 269 ctx->u.aes.key_len = 0; ccp_aes_cmac_setkey() 272 ret = crypto_cipher_setkey(ctx->u.aes.tfm_cipher, key, key_len); ccp_aes_cmac_setkey() 313 memcpy(ctx->u.aes.key, key, key_len); ccp_aes_cmac_setkey() 314 ctx->u.aes.key_len = key_len; ccp_aes_cmac_setkey() 315 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); ccp_aes_cmac_setkey() 327 ctx->u.aes.key_len = 0; ccp_aes_cmac_cra_init() 241 ccp_aes_cmac_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int key_len) ccp_aes_cmac_setkey() argument
|
H A D | ccp-crypto-sha.c | 132 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? ccp_do_sha_update() 134 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? ccp_do_sha_update() 162 if (ctx->u.sha.key_len) { ccp_sha_init() 238 unsigned int key_len) ccp_sha_setkey() 250 ctx->u.sha.key_len = 0; ccp_sha_setkey() 257 if (key_len > block_size) { ccp_sha_setkey() 263 ret = crypto_shash_digest(sdesc, key, key_len, ccp_sha_setkey() 270 key_len = digest_size; ccp_sha_setkey() 272 memcpy(ctx->u.sha.key, key, key_len); ccp_sha_setkey() 283 ctx->u.sha.key_len = key_len; ccp_sha_setkey() 294 ctx->u.sha.key_len = 0; ccp_sha_cra_init() 237 ccp_sha_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int key_len) ccp_sha_setkey() argument
|
H A D | ccp-crypto.h | 82 unsigned int key_len; member in struct:ccp_aes_ctx 149 unsigned int key_len; member in struct:ccp_sha_ctx
|
H A D | ccp-ops.c | 889 if (!((aes->key_len == AES_KEYSIZE_128) || ccp_run_aes_cmac_cmd() 890 (aes->key_len == AES_KEYSIZE_192) || ccp_run_aes_cmac_cmd() 891 (aes->key_len == AES_KEYSIZE_256))) ccp_run_aes_cmac_cmd() 936 dm_offset = CCP_KSB_BYTES - aes->key_len; ccp_run_aes_cmac_cmd() 937 ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); ccp_run_aes_cmac_cmd() 1042 if (!((aes->key_len == AES_KEYSIZE_128) || ccp_run_aes_cmd() 1043 (aes->key_len == AES_KEYSIZE_192) || ccp_run_aes_cmd() 1044 (aes->key_len == AES_KEYSIZE_256))) ccp_run_aes_cmd() 1089 dm_offset = CCP_KSB_BYTES - aes->key_len; ccp_run_aes_cmd() 1090 ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); ccp_run_aes_cmd() 1229 if (xts->key_len != AES_KEYSIZE_128) ccp_run_xts_aes_cmd() 1266 ccp_set_dm_area(&key, dm_offset, xts->key, 0, xts->key_len); ccp_run_xts_aes_cmd() 1267 ccp_set_dm_area(&key, 0, xts->key, dm_offset, xts->key_len); ccp_run_xts_aes_cmd()
|
/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 36 unsigned int key_len) ctr_aes_nx_set_key() 43 switch (key_len) { ctr_aes_nx_set_key() 61 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); ctr_aes_nx_set_key() 68 unsigned int key_len) ctr3686_aes_nx_set_key() 72 if (key_len < CTR_RFC3686_NONCE_SIZE) ctr3686_aes_nx_set_key() 76 in_key + key_len - CTR_RFC3686_NONCE_SIZE, ctr3686_aes_nx_set_key() 79 key_len -= CTR_RFC3686_NONCE_SIZE; ctr3686_aes_nx_set_key() 81 return ctr_aes_nx_set_key(tfm, in_key, key_len); ctr3686_aes_nx_set_key() 34 ctr_aes_nx_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_nx_set_key() argument 66 ctr3686_aes_nx_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ctr3686_aes_nx_set_key() argument
|
H A D | nx-aes-cbc.c | 35 unsigned int key_len) cbc_aes_nx_set_key() 42 switch (key_len) { cbc_aes_nx_set_key() 60 memcpy(csbcpb->cpb.aes_cbc.key, in_key, key_len); cbc_aes_nx_set_key() 33 cbc_aes_nx_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) cbc_aes_nx_set_key() argument
|
H A D | nx-aes-ecb.c | 35 unsigned int key_len) ecb_aes_nx_set_key() 42 switch (key_len) { ecb_aes_nx_set_key() 60 memcpy(csbcpb->cpb.aes_ecb.key, in_key, key_len); ecb_aes_nx_set_key() 33 ecb_aes_nx_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ecb_aes_nx_set_key() argument
|
H A D | nx-aes-ccm.c | 37 unsigned int key_len) ccm_aes_nx_set_key() 45 switch (key_len) { ccm_aes_nx_set_key() 56 memcpy(csbcpb->cpb.aes_ccm.key, in_key, key_len); ccm_aes_nx_set_key() 59 memcpy(csbcpb_aead->cpb.aes_cca.key, in_key, key_len); ccm_aes_nx_set_key() 67 unsigned int key_len) ccm4309_aes_nx_set_key() 71 if (key_len < 3) ccm4309_aes_nx_set_key() 74 key_len -= 3; ccm4309_aes_nx_set_key() 76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); ccm4309_aes_nx_set_key() 78 return ccm_aes_nx_set_key(tfm, in_key, key_len); ccm4309_aes_nx_set_key() 35 ccm_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm_aes_nx_set_key() argument 65 ccm4309_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm4309_aes_nx_set_key() argument
|
H A D | nx-aes-gcm.c | 37 unsigned int key_len) gcm_aes_nx_set_key() 45 switch (key_len) { gcm_aes_nx_set_key() 66 memcpy(csbcpb->cpb.aes_gcm.key, in_key, key_len); gcm_aes_nx_set_key() 69 memcpy(csbcpb_aead->cpb.aes_gca.key, in_key, key_len); gcm_aes_nx_set_key() 76 unsigned int key_len) gcm4106_aes_nx_set_key() 82 if (key_len < 4) gcm4106_aes_nx_set_key() 85 key_len -= 4; gcm4106_aes_nx_set_key() 87 rc = gcm_aes_nx_set_key(tfm, in_key, key_len); gcm4106_aes_nx_set_key() 91 memcpy(nonce, in_key + key_len, 4); gcm4106_aes_nx_set_key() 35 gcm_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) gcm_aes_nx_set_key() argument 74 gcm4106_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) gcm4106_aes_nx_set_key() argument
|
H A D | nx-aes-xcbc.c | 42 unsigned int key_len) nx_xcbc_set_key() 47 switch (key_len) { nx_xcbc_set_key() 55 memcpy(csbcpb->cpb.aes_xcbc.key, in_key, key_len); nx_xcbc_set_key() 40 nx_xcbc_set_key(struct crypto_shash *desc, const u8 *in_key, unsigned int key_len) nx_xcbc_set_key() argument
|
/linux-4.1.27/net/mac80211/ |
H A D | aes_gmac.h | 15 size_t key_len);
|
H A D | aes_ccm.h | 16 size_t key_len,
|
H A D | aes_cmac.h | 15 size_t key_len);
|
H A D | aes_gcm.h | 19 size_t key_len);
|
H A D | aes_gmac.c | 62 size_t key_len) ieee80211_aes_gmac_key_setup() 71 err = crypto_aead_setkey(tfm, key, key_len); ieee80211_aes_gmac_key_setup() 61 ieee80211_aes_gmac_key_setup(const u8 key[], size_t key_len) ieee80211_aes_gmac_key_setup() argument
|
H A D | aes_ccm.c | 77 size_t key_len, ieee80211_aes_key_setup_encrypt() 87 err = crypto_aead_setkey(tfm, key, key_len); ieee80211_aes_key_setup_encrypt() 76 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) ieee80211_aes_key_setup_encrypt() argument
|
H A D | aes_gcm.c | 73 size_t key_len) ieee80211_aes_gcm_key_setup_encrypt() 82 err = crypto_aead_setkey(tfm, key, key_len); ieee80211_aes_gcm_key_setup_encrypt() 72 ieee80211_aes_gcm_key_setup_encrypt(const u8 key[], size_t key_len) ieee80211_aes_gcm_key_setup_encrypt() argument
|
H A D | aes_cmac.c | 132 size_t key_len) ieee80211_aes_cmac_key_setup() 138 crypto_cipher_setkey(tfm, key, key_len); ieee80211_aes_cmac_key_setup() 131 ieee80211_aes_cmac_key_setup(const u8 key[], size_t key_len) ieee80211_aes_cmac_key_setup() argument
|
H A D | key.c | 374 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, ieee80211_key_alloc() argument 385 key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL); ieee80211_key_alloc() 398 key->conf.keylen = key_len; ieee80211_key_alloc() 432 key_data, key_len, IEEE80211_CCMP_MIC_LEN); ieee80211_key_alloc() 450 key_data, key_len, IEEE80211_CCMP_256_MIC_LEN); ieee80211_key_alloc() 473 ieee80211_aes_cmac_key_setup(key_data, key_len); ieee80211_key_alloc() 492 ieee80211_aes_gmac_key_setup(key_data, key_len); ieee80211_key_alloc() 511 key_len); ieee80211_key_alloc() 532 memcpy(key->conf.key, key_data, key_len); ieee80211_key_alloc()
|
H A D | key.h | 142 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
H A D | mlme.c | 2519 auth_data->key, auth_data->key_len, ieee80211_auth_challenge() 4517 if (req->key && req->key_len) { ieee80211_mgd_auth() 4518 auth_data->key_len = req->key_len; ieee80211_mgd_auth() 4520 memcpy(auth_data->key, req->key, req->key_len); ieee80211_mgd_auth()
|
H A D | ieee80211_i.h | 377 u8 key_len, key_idx; member in struct:ieee80211_mgd_auth_data 1930 const u8 *da, const u8 *key, u8 key_len, u8 key_idx,
|
/linux-4.1.27/net/wireless/ |
H A D | lib80211_crypt_wep.c | 36 u8 key_len; member in struct:lib80211_wep_data 105 klen = 3 + wep->key_len; lib80211_wep_build_iv() 154 memcpy(key + 3, wep->key, wep->key_len); lib80211_wep_encrypt() 158 klen = 3 + wep->key_len; lib80211_wep_encrypt() 200 klen = 3 + wep->key_len; lib80211_wep_decrypt() 203 memcpy(key + 3, wep->key, wep->key_len); lib80211_wep_decrypt() 239 wep->key_len = len; lib80211_wep_set_key() 248 if (len < wep->key_len) lib80211_wep_get_key() 251 memcpy(key, wep->key, wep->key_len); lib80211_wep_get_key() 253 return wep->key_len; lib80211_wep_get_key() 259 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); lib80211_wep_print_stats()
|
H A D | util.c | 259 if (params->key_len != WLAN_KEY_LEN_WEP40) cfg80211_validate_key_settings() 263 if (params->key_len != WLAN_KEY_LEN_TKIP) cfg80211_validate_key_settings() 267 if (params->key_len != WLAN_KEY_LEN_CCMP) cfg80211_validate_key_settings() 271 if (params->key_len != WLAN_KEY_LEN_CCMP_256) cfg80211_validate_key_settings() 275 if (params->key_len != WLAN_KEY_LEN_GCMP) cfg80211_validate_key_settings() 279 if (params->key_len != WLAN_KEY_LEN_GCMP_256) cfg80211_validate_key_settings() 283 if (params->key_len != WLAN_KEY_LEN_WEP104) cfg80211_validate_key_settings() 287 if (params->key_len != WLAN_KEY_LEN_AES_CMAC) cfg80211_validate_key_settings() 291 if (params->key_len != WLAN_KEY_LEN_BIP_CMAC_256) cfg80211_validate_key_settings() 295 if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_128) cfg80211_validate_key_settings() 299 if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_256) cfg80211_validate_key_settings()
|
H A D | wext-compat.c | 501 wdev->wext.keys->params[idx].key_len = 0; __cfg80211_set_encryption() 531 params->key, params->key_len); __cfg80211_set_encryption() 634 params.key_len = erq->length; cfg80211_wext_siwencode() 676 if (ext->key_len == 5) cfg80211_wext_siwencodeext() 678 else if (ext->key_len == 13) cfg80211_wext_siwencodeext() 722 params.key_len = ext->key_len; cfg80211_wext_siwencodeext() 768 wdev->wext.keys->params[idx].key_len); cfg80211_wext_giwencode()
|
H A D | mlme.c | 205 const u8 *key, int key_len, int key_idx, cfg80211_mlme_auth() 216 .key_len = key_len, cfg80211_mlme_auth() 224 if (!key || !key_len || key_idx < 0 || key_idx > 4) cfg80211_mlme_auth() 198 cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, struct net_device *dev, struct ieee80211_channel *chan, enum nl80211_auth_type auth_type, const u8 *bssid, const u8 *ssid, int ssid_len, const u8 *ie, int ie_len, const u8 *key, int key_len, int key_idx, const u8 *sae_data, int sae_data_len) cfg80211_mlme_auth() argument
|
H A D | sme.c | 169 params->key, params->key_len, cfg80211_conn_do_work() 998 connect->key_len = connkeys->params[idx].key_len; cfg80211_connect()
|
H A D | core.h | 329 const u8 *key, int key_len, int key_idx,
|
H A D | nl80211.c | 696 k->p.key_len = nla_len(tb[NL80211_KEY_DATA]); nl80211_parse_key_new() 732 k->p.key_len = nla_len(info->attrs[NL80211_ATTR_KEY_DATA]); nl80211_parse_key_old() 860 result->params[parse.idx].key_len = parse.p.key_len; nla_for_each_nested() 862 memcpy(result->data[parse.idx], parse.p.key, parse.p.key_len); nla_for_each_nested() 2805 params->key_len, params->key)) || get_key_callback() 2820 params->key_len, params->key)) || get_key_callback() 6837 if (!key.p.key || !key.p.key_len) nl80211_authenticate() 6840 key.p.key_len != WLAN_KEY_LEN_WEP40) && nl80211_authenticate() 6842 key.p.key_len != WLAN_KEY_LEN_WEP104)) nl80211_authenticate() 6847 key.p.key_len = 0; nl80211_authenticate() 6915 key.p.key, key.p.key_len, key.idx, nl80211_authenticate()
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 29 u8 key_len; member in struct:prism2_wep_data 118 klen = 3 + wep->key_len; prism2_wep_encrypt() 140 memcpy(key + 3, wep->key, wep->key_len); prism2_wep_encrypt() 192 klen = 3 + wep->key_len; prism2_wep_decrypt() 195 memcpy(key + 3, wep->key, wep->key_len); prism2_wep_decrypt() 232 wep->key_len = len; prism2_wep_set_key() 242 if (len < wep->key_len) prism2_wep_get_key() 245 memcpy(key, wep->key, wep->key_len); prism2_wep_get_key() 247 return wep->key_len; prism2_wep_get_key() 255 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); prism2_wep_print_stats()
|
H A D | rtllib_wx.c | 640 if (ext->key_len > 0 && (*crypt)->ops->set_key && rtllib_wx_set_encode_ext() 641 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, rtllib_wx_set_encode_ext() 653 sec.key_sizes[idx] = ext->key_len; rtllib_wx_set_encode_ext() 716 ext->key_len = 0; rtllib_wx_get_encode_ext() 727 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, rtllib_wx_get_encode_ext() 730 if (ext->key_len && rtllib_wx_get_encode_ext()
|
H A D | rtllib_softmac.c | 3371 param->u.crypt.key_len) { rtllib_wpa_set_encryption() 3373 param->u.crypt.key_len); rtllib_wpa_set_encryption() 3444 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key && rtllib_wpa_set_encryption() 3446 param->u.crypt.key_len, param->u.crypt.seq, rtllib_wpa_set_encryption() 3465 param->u.crypt.key_len); rtllib_wpa_set_encryption() 3466 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len; rtllib_wpa_set_encryption()
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 33 u8 key_len; member in struct:prism2_wep_data 122 klen = 3 + wep->key_len; prism2_wep_encrypt() 143 memcpy(key + 3, wep->key, wep->key_len); prism2_wep_encrypt() 196 klen = 3 + wep->key_len; prism2_wep_decrypt() 199 memcpy(key + 3, wep->key, wep->key_len); prism2_wep_decrypt() 239 wep->key_len = len; prism2_wep_set_key() 249 if (len < wep->key_len) prism2_wep_get_key() 252 memcpy(key, wep->key, wep->key_len); prism2_wep_get_key() 254 return wep->key_len; prism2_wep_get_key() 263 wep->key_idx, wep->key_len); prism2_wep_print_stats()
|
H A D | ieee80211_wx.c | 632 if (ext->key_len > 0 && (*crypt)->ops->set_key && ieee80211_wx_set_encode_ext() 633 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, ieee80211_wx_set_encode_ext() 649 //memcpy(sec.keys[idx], ext->key, ext->key_len); ieee80211_wx_set_encode_ext() 650 sec.key_sizes[idx] = ext->key_len; ieee80211_wx_set_encode_ext() 715 ext->key_len = 0; ieee80211_wx_get_encode_ext() 726 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, NULL, crypt->priv); ieee80211_wx_get_encode_ext() 728 if (ext->key_len && ieee80211_wx_get_encode_ext()
|
H A D | ieee80211_softmac.c | 2974 param->u.crypt.key_len) { ieee80211_wpa_set_encryption() 2976 param->u.crypt.key_len); ieee80211_wpa_set_encryption() 3052 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key && ieee80211_wpa_set_encryption() 3054 param->u.crypt.key_len, param->u.crypt.seq, ieee80211_wpa_set_encryption() 3073 param->u.crypt.key_len); ieee80211_wpa_set_encryption() 3074 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len; ieee80211_wpa_set_encryption()
|
/linux-4.1.27/include/keys/ |
H A D | trusted-type.h | 22 unsigned int key_len; member in struct:trusted_key_payload
|
/linux-4.1.27/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 77 unsigned int key_len); 93 unsigned int key_len) ppc_aes_setkey() 97 if (key_len != AES_KEYSIZE_128 && ppc_aes_setkey() 98 key_len != AES_KEYSIZE_192 && ppc_aes_setkey() 99 key_len != AES_KEYSIZE_256) { ppc_aes_setkey() 104 switch (key_len) { ppc_aes_setkey() 119 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); ppc_aes_setkey() 125 unsigned int key_len) ppc_xts_setkey() 129 key_len >>= 1; ppc_xts_setkey() 131 if (key_len != AES_KEYSIZE_128 && ppc_xts_setkey() 132 key_len != AES_KEYSIZE_192 && ppc_xts_setkey() 133 key_len != AES_KEYSIZE_256) { ppc_xts_setkey() 138 switch (key_len) { ppc_xts_setkey() 156 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); ppc_xts_setkey() 92 ppc_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ppc_aes_setkey() argument 124 ppc_xts_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ppc_xts_setkey() argument
|
/linux-4.1.27/net/ceph/ |
H A D | crypto.c | 163 static int ceph_aes_encrypt(const void *key, int key_len, ceph_aes_encrypt() argument 191 crypto_blkcipher_setkey((void *)tfm, key, key_len); ceph_aes_encrypt() 198 key, key_len, 1); ceph_aes_encrypt() 222 static int ceph_aes_encrypt2(const void *key, int key_len, void *dst, ceph_aes_encrypt2() argument 252 crypto_blkcipher_setkey((void *)tfm, key, key_len); ceph_aes_encrypt2() 259 key, key_len, 1); ceph_aes_encrypt2() 285 static int ceph_aes_decrypt(const void *key, int key_len, ceph_aes_decrypt() argument 309 crypto_blkcipher_setkey((void *)tfm, key, key_len); ceph_aes_decrypt() 316 key, key_len, 1); ceph_aes_decrypt() 349 static int ceph_aes_decrypt2(const void *key, int key_len, ceph_aes_decrypt2() argument 375 crypto_blkcipher_setkey((void *)tfm, key, key_len); ceph_aes_decrypt2() 382 key, key_len, 1); ceph_aes_decrypt2()
|
/linux-4.1.27/security/keys/ |
H A D | trusted.h | 64 pr_info("trusted_key: key_len %d\n", p->key_len); dump_payload() 66 16, 1, p->key, p->key_len, 0); dump_payload()
|
H A D | trusted.c | 672 p->key[p->key_len] = p->migratable; key_seal() 675 p->key, p->key_len + 1, p->blob, &p->blob_len, key_seal() 698 o->blobauth, p->key, &p->key_len); key_unseal() 703 p->migratable = p->key[--p->key_len]; key_unseal() 826 p->key_len = keylen; datablob_parse() 907 size_t key_len; trusted_instantiate() local 947 key_len = payload->key_len; trusted_instantiate() 948 ret = tpm_get_random(TPM_ANY_NUM, payload->key, key_len); trusted_instantiate() 949 if (ret != key_len) { trusted_instantiate() 978 memset(p->key, 0, p->key_len); trusted_rcu_free() 1026 new_p->key_len = p->key_len; trusted_update() 1027 memcpy(new_p->key, p->key, p->key_len); trusted_update() 1094 memset(p->key, 0, p->key_len); trusted_destroy()
|
/linux-4.1.27/drivers/net/wireless/ti/wl18xx/ |
H A D | cmd.c | 141 u8 key_len, u8 *key) wl18xx_cmd_smart_config_set_group_key() 149 if (key_len != sizeof(cmd->key)) { wl18xx_cmd_smart_config_set_group_key() 150 wl1271_error("invalid group key size: %d", key_len); wl18xx_cmd_smart_config_set_group_key() 161 memcpy(cmd->key, key, key_len); wl18xx_cmd_smart_config_set_group_key() 140 wl18xx_cmd_smart_config_set_group_key(struct wl1271 *wl, u16 group_id, u8 key_len, u8 *key) wl18xx_cmd_smart_config_set_group_key() argument
|
H A D | cmd.h | 92 u8 key_len, u8 *key);
|
/linux-4.1.27/crypto/ |
H A D | arc4.c | 30 unsigned int key_len) arc4_set_key() 46 if (++k >= key_len) arc4_set_key() 29 arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) arc4_set_key() argument
|
H A D | ablk_helper.c | 38 unsigned int key_len) ablk_set_key() 47 err = crypto_ablkcipher_setkey(child, key, key_len); ablk_set_key() 37 ablk_set_key(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ablk_set_key() argument
|
H A D | aes_generic.c | 1206 * @key_len: The length of the supplied key. 1217 unsigned int key_len) crypto_aes_expand_key() 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && crypto_aes_expand_key() 1223 key_len != AES_KEYSIZE_256) crypto_aes_expand_key() 1226 ctx->key_length = key_len; crypto_aes_expand_key() 1228 ctx->key_dec[key_len + 24] = ctx->key_enc[0] = le32_to_cpu(key[0]); crypto_aes_expand_key() 1229 ctx->key_dec[key_len + 25] = ctx->key_enc[1] = le32_to_cpu(key[1]); crypto_aes_expand_key() 1230 ctx->key_dec[key_len + 26] = ctx->key_enc[2] = le32_to_cpu(key[2]); crypto_aes_expand_key() 1231 ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); crypto_aes_expand_key() 1233 switch (key_len) { crypto_aes_expand_key() 1258 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; crypto_aes_expand_key() 1259 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; crypto_aes_expand_key() 1260 ctx->key_dec[2] = ctx->key_enc[key_len + 26]; crypto_aes_expand_key() 1261 ctx->key_dec[3] = ctx->key_enc[key_len + 27]; crypto_aes_expand_key() 1263 for (i = 4; i < key_len + 24; ++i) { crypto_aes_expand_key() 1264 j = key_len + 24 - (i & ~3) + (i & 3); crypto_aes_expand_key() 1275 * @key_len: The size of the key. 1283 unsigned int key_len) crypto_aes_set_key() 1289 ret = crypto_aes_expand_key(ctx, in_key, key_len); crypto_aes_set_key() 1336 const int key_len = ctx->key_length; aes_encrypt() local 1343 if (key_len > 24) { aes_encrypt() 1348 if (key_len > 16) { aes_encrypt() 1407 const int key_len = ctx->key_length; aes_decrypt() local 1415 if (key_len > 24) { aes_decrypt() 1420 if (key_len > 16) { aes_decrypt() 1216 crypto_aes_expand_key(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) crypto_aes_expand_key() argument 1282 crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) crypto_aes_set_key() argument
|
H A D | cast6_generic.c | 115 unsigned key_len, u32 *flags) __cast6_setkey() 121 if (key_len % 4 != 0) { __cast6_setkey() 127 memcpy(p_key, in_key, key_len); __cast6_setkey() 114 __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, unsigned key_len, u32 *flags) __cast6_setkey() argument
|
H A D | anubis.c | 46 int key_len; // in bits member in struct:anubis_ctx 463 unsigned int key_len) anubis_setkey() 472 switch (key_len) { anubis_setkey() 481 ctx->key_len = key_len * 8; anubis_setkey() 482 N = ctx->key_len >> 5; anubis_setkey() 462 anubis_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) anubis_setkey() argument
|
H A D | tea.c | 48 unsigned int key_len) tea_setkey() 121 unsigned int key_len) xtea_setkey() 47 tea_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) tea_setkey() argument 120 xtea_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) xtea_setkey() argument
|
H A D | twofish_common.c | 584 unsigned int key_len, u32 *flags) __twofish_setkey() 600 if (key_len % 8) __twofish_setkey() 627 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ __twofish_setkey() 639 if (key_len == 32) { /* 256-bit key */ __twofish_setkey() 671 } else if (key_len == 24) { /* 192-bit key */ __twofish_setkey() 703 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) twofish_setkey() argument 705 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len, twofish_setkey() 583 __twofish_setkey(struct twofish_ctx *ctx, const u8 *key, unsigned int key_len, u32 *flags) __twofish_setkey() argument
|
H A D | camellia_generic.c | 982 unsigned int key_len) camellia_set_key() 988 if (key_len != 16 && key_len != 24 && key_len != 32) { camellia_set_key() 993 cctx->key_length = key_len; camellia_set_key() 995 switch (key_len) { camellia_set_key() 981 camellia_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) camellia_set_key() argument
|
H A D | cast5_generic.c | 487 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) cast5_setkey() argument 496 c->rr = key_len <= 10 ? 1 : 0; cast5_setkey() 499 memcpy(p_key, key, key_len); cast5_setkey()
|
H A D | seed.c | 332 unsigned int key_len) seed_set_key() 331 seed_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) seed_set_key() argument
|
H A D | khazad.c | 757 unsigned int key_len) khazad_setkey() 756 khazad_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) khazad_setkey() argument
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/ |
H A D | linux-crypto.c | 44 unsigned int key_len) cfs_crypto_hash_alloc() 75 err = crypto_hash_setkey(desc->tfm, key, key_len); cfs_crypto_hash_alloc() 97 unsigned char *key, unsigned int key_len, cfs_crypto_hash_digest() 108 err = cfs_crypto_hash_alloc(alg_id, &type, &hdesc, key, key_len); cfs_crypto_hash_digest() 129 unsigned char *key, unsigned int key_len) cfs_crypto_hash_init() 140 err = cfs_crypto_hash_alloc(alg_id, &type, hdesc, key, key_len); cfs_crypto_hash_init() 41 cfs_crypto_hash_alloc(unsigned char alg_id, const struct cfs_crypto_hash_type **type, struct hash_desc *desc, unsigned char *key, unsigned int key_len) cfs_crypto_hash_alloc() argument 95 cfs_crypto_hash_digest(unsigned char alg_id, const void *buf, unsigned int buf_len, unsigned char *key, unsigned int key_len, unsigned char *hash, unsigned int *hash_len) cfs_crypto_hash_digest() argument 128 cfs_crypto_hash_init(unsigned char alg_id, unsigned char *key, unsigned int key_len) cfs_crypto_hash_init() argument
|
/linux-4.1.27/fs/cifs/ |
H A D | cache.c | 71 uint16_t key_len = sizeof(struct cifs_server_key); cifs_server_get_key() local 73 memset(key, 0, key_len); cifs_server_get_key() 84 key_len += sizeof(key->addr[0].ipv4_addr); cifs_server_get_key() 91 key_len += sizeof(key->addr[0].ipv6_addr); cifs_server_get_key() 96 key_len = 0; cifs_server_get_key() 100 return key_len; cifs_server_get_key()
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
H A D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, orinoco_set_key() 37 if (key_len) { orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); orinoco_set_key() 51 priv->keys[index].key_len = key_len; orinoco_set_key() 54 if (key_len) orinoco_set_key() 55 memcpy((void *)priv->keys[index].key, key, key_len); orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? orinoco_set_key() 82 priv->keys[index].key_len = 0; orinoco_set_key() 287 if (priv->keys[index].key_len == 0) { orinoco_ioctl_setiwencode() 354 erq->length = priv->keys[index].key_len; orinoco_ioctl_getiwencode() 754 (ext->key_len > 0)) ? 1 : 0; orinoco_ioctl_set_encodeext() 767 if (ext->key_len <= 0) orinoco_ioctl_set_encodeext() 772 ext->key, ext->key_len, NULL, 0); orinoco_ioctl_set_encodeext() 780 (ext->key_len > sizeof(struct orinoco_tkip_key))) orinoco_ioctl_set_encodeext() 789 ext->key, ext->key_len, tkip_iv, orinoco_ioctl_set_encodeext() 847 ext->key_len = 0; orinoco_ioctl_get_encodeext() 852 ext->key_len = min(priv->keys[idx].key_len, max_key_len); orinoco_ioctl_get_encodeext() 853 memcpy(ext->key, priv->keys[idx].key, ext->key_len); orinoco_ioctl_get_encodeext() 858 ext->key_len = min(priv->keys[idx].key_len, max_key_len); orinoco_ioctl_get_encodeext() 859 memcpy(ext->key, priv->keys[idx].key, ext->key_len); orinoco_ioctl_get_encodeext() 30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument
|
H A D | hw.c | 832 int len = min(priv->keys[i].key_len, __orinoco_hw_setup_wepkeys() 862 keylen = priv->keys[priv->tx_key].key_len; __orinoco_hw_setup_wepkeys() 880 priv->keys[i].key_len); __orinoco_hw_setup_wepkeys()
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 590 int init_len, u32 ctx_addr, const u8 *key, int key_len) register_chain_var() 615 memcpy(pad, key, key_len); register_chain_var() 616 memset(pad + key_len, 0, HMAC_PAD_BLOCKLEN - key_len); register_chain_var() 646 const u8 *key, int key_len, unsigned digest_len) setup_auth() 685 init_len, npe_ctx_addr, key, key_len); setup_auth() 689 init_len, npe_ctx_addr, key, key_len); setup_auth() 721 const u8 *key, int key_len) setup_cipher() 740 switch (key_len) { setup_cipher() 768 memcpy(cinfo, key, key_len); setup_cipher() 770 if (key_len < DES3_EDE_KEY_SIZE && !(cipher_cfg & MOD_AES)) { setup_cipher() 771 memset(cinfo + key_len, 0, DES3_EDE_KEY_SIZE -key_len); setup_cipher() 772 key_len = DES3_EDE_KEY_SIZE; setup_cipher() 774 dir->npe_ctx_idx = sizeof(cipher_cfg) + key_len; setup_cipher() 815 unsigned int key_len) ablk_setkey() 830 ret = setup_cipher(&tfm->base, 0, key, key_len); ablk_setkey() 833 ret = setup_cipher(&tfm->base, 1, key, key_len); ablk_setkey() 851 unsigned int key_len) ablk_rfc3686_setkey() 856 if (key_len < CTR_RFC3686_NONCE_SIZE) ablk_rfc3686_setkey() 859 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), ablk_rfc3686_setkey() 862 key_len -= CTR_RFC3686_NONCE_SIZE; ablk_rfc3686_setkey() 863 return ablk_setkey(tfm, key, key_len); ablk_rfc3686_setkey() 589 register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, int init_len, u32 ctx_addr, const u8 *key, int key_len) register_chain_var() argument 645 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, const u8 *key, int key_len, unsigned digest_len) setup_auth() argument 720 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) setup_cipher() argument 814 ablk_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ablk_setkey() argument 850 ablk_rfc3686_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) ablk_rfc3686_setkey() argument
|
H A D | padlock-aes.c | 72 the extended key for a given key_len. */ 74 aes_hw_extkey_available(uint8_t key_len) aes_hw_extkey_available() argument 79 if (key_len == 16) aes_hw_extkey_available() 105 unsigned int key_len) aes_set_key() 113 if (key_len % 8) { aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; aes_set_key() 140 if (aes_hw_extkey_available(key_len)) aes_set_key() 147 if (crypto_aes_expand_key(&gen_aes, in_key, key_len)) { aes_set_key() 104 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument
|
H A D | picoxcell_crypto.c | 160 u8 key_len; member in struct:spacc_ablk_ctx 222 size_t key_len, const u8 *iv, size_t iv_len) spacc_cipher_write_ctx() 227 memcpy_toio32(key_ptr, key, key_len / 4); spacc_cipher_write_ctx() 834 ctx->key_len = len; spacc_des_setkey() 878 ctx->key_len = len; spacc_aes_setkey() 904 ctx->key_len = len; spacc_kasumi_f8_setkey() 921 ctx->key_len != AES_KEYSIZE_128 && spacc_ablk_need_fallback() 922 ctx->key_len != AES_KEYSIZE_256; spacc_ablk_need_fallback() 953 ctx->key_len, ablk_req->info, alg->cra_ablkcipher.ivsize, spacc_ablk_submit() 220 spacc_cipher_write_ctx(struct spacc_generic_ctx *ctx, void __iomem *page_addr, const u8 *key, size_t key_len, const u8 *iv, size_t iv_len) spacc_cipher_write_ctx() argument
|
H A D | mxs-dcp.c | 88 unsigned int key_len; member in struct:dcp_async_ctx 278 memcpy(key, actx->key, actx->key_len); mxs_dcp_aes_block_crypt() 403 if (unlikely(actx->key_len != AES_KEYSIZE_128)) mxs_dcp_aes_enqueue() 450 actx->key_len = len; mxs_dcp_aes_setkey()
|
H A D | mv_cesa.c | 108 int key_len; member in struct:mv_ctx 177 crypto_aes_expand_key(&gen_aes_key, ctx->aes_enc_key, ctx->key_len); compute_aes_dec_key() 179 key_pos = ctx->key_len + 24; compute_aes_dec_key() 181 switch (ctx->key_len) { compute_aes_dec_key() 209 ctx->key_len = len; mv_setkey_aes() 283 switch (ctx->key_len) { mv_process_current_q()
|
H A D | n2_core.c | 647 int key_len; member in struct:n2_cipher_context 738 ctx->key_len = keylen; n2_aes_setkey() 765 ctx->key_len = keylen; n2_des_setkey() 783 ctx->key_len = keylen; n2_3des_setkey()
|
/linux-4.1.27/fs/hfs/ |
H A D | brec.c | 68 int size, key_len, rec; hfs_brec_insert() local 83 key_len = (fd->search_key->key_len | 1) + 1; hfs_brec_insert() 87 size = key_len + entry_len; hfs_brec_insert() 130 hfs_bnode_write(node, fd->search_key, data_off, key_len); hfs_brec_insert() 131 hfs_bnode_write(node, entry, data_off + key_len, entry_len); hfs_brec_insert() 164 key_len = fd->search_key->key_len + 1; hfs_brec_insert() 166 fd->search_key->key_len = tree->max_key_len; hfs_brec_insert() 167 key_len = tree->max_key_len + 1; hfs_brec_insert()
|
H A D | bnode.c | 48 int key_len; hfs_bnode_read_key() local 53 key_len = hfs_bnode_read_u8(node, off) + 1; hfs_bnode_read_key() 55 key_len = tree->max_key_len + 1; hfs_bnode_read_key() 57 hfs_bnode_read(node, key, off, key_len); hfs_bnode_read_key()
|
H A D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member in struct:hfs_cat_key 158 u8 key_len; /* number of bytes in the key */ member in struct:hfs_ext_key 165 u8 key_len; /* number of bytes in the key */ member in union:hfs_btree_key
|
H A D | catalog.c | 29 key->key_len = 6 + key->cat.CName.len; hfs_cat_build_key() 32 key->key_len = 6; hfs_cat_build_key()
|
H A D | extent.c | 23 key->key_len = 7; hfs_ext_build_key()
|
/linux-4.1.27/fs/hfsplus/ |
H A D | brec.c | 66 int size, key_len, rec; hfs_brec_insert() local 81 key_len = be16_to_cpu(fd->search_key->key_len) + 2; hfs_brec_insert() 85 size = key_len + entry_len; hfs_brec_insert() 130 hfs_bnode_write(node, fd->search_key, data_off, key_len); hfs_brec_insert() 131 hfs_bnode_write(node, entry, data_off + key_len, entry_len); hfs_brec_insert() 165 key_len = be16_to_cpu(fd->search_key->key_len) + 2; hfs_brec_insert() 167 fd->search_key->key_len = hfs_brec_insert() 169 key_len = tree->max_key_len + 2; hfs_brec_insert()
|
H A D | attributes.c | 68 /* The length of the key, as stored in key_len field, does not include hfsplus_attr_build_key() 69 * the size of the key_len field itself. hfsplus_attr_build_key() 71 * it takes into consideration key_len field (__be16) of hfsplus_attr_build_key() 75 key->key_len = hfsplus_attr_build_key()
|
H A D | hfsplus_raw.h | 213 __be16 key_len; member in struct:hfsplus_cat_key 339 __be16 key_len; member in struct:hfsplus_ext_key 357 __be16 key_len; member in struct:hfsplus_attr_key 401 __be16 key_len; member in union:__anon10971
|
H A D | xattr.c | 693 u16 key_len = 0; hfsplus_listxattr() local 735 key_len = hfs_bnode_read_u16(fd.bnode, fd.keyoffset); hfsplus_listxattr() 736 if (key_len == 0 || key_len > fd.tree->max_key_len) { hfsplus_listxattr() 737 pr_err("invalid xattr key length: %d\n", key_len); hfsplus_listxattr() 743 fd.keyoffset, key_len + sizeof(key_len)); hfsplus_listxattr()
|
H A D | bnode.c | 61 int key_len; hfs_bnode_read_key() local 67 key_len = hfs_bnode_read_u16(node, off) + 2; hfs_bnode_read_key() 69 key_len = tree->max_key_len + 2; hfs_bnode_read_key() 71 hfs_bnode_read(node, key, off, key_len); hfs_bnode_read_key()
|
H A D | catalog.c | 54 key->key_len = cpu_to_be16(6 + 2 * len); hfsplus_cat_build_key() 64 key->key_len = cpu_to_be16(6); hfsplus_cat_build_key_with_cnid() 77 key->key_len = cpu_to_be16(6 + ustrlen); hfsplus_cat_build_key_uni() 352 fd.search_key->key_len = cpu_to_be16(6 + len); hfsplus_delete_cat()
|
H A D | extents.c | 43 key->key_len = cpu_to_be16(HFSPLUS_EXT_KEYLEN - 2); hfsplus_ext_build_key()
|
/linux-4.1.27/include/linux/ |
H A D | rhashtable.h | 101 * @key_len: Length of key 111 * @hashfn: Hash function (default: jhash2 if !(key_len % 4), or jhash) 117 size_t key_len; member in struct:rhashtable_params 136 * @key_len: Key length for hashfn 146 unsigned int key_len; member in struct:rhashtable 217 if (!__builtin_constant_p(params.key_len)) rht_key_hashfn() 218 hash = ht->p.hashfn(key, ht->key_len, tbl->hash_rnd); rht_key_hashfn() 219 else if (params.key_len) { rht_key_hashfn() 220 unsigned int key_len = params.key_len; rht_key_hashfn() local 223 hash = params.hashfn(key, key_len, tbl->hash_rnd); rht_key_hashfn() 224 else if (key_len & (sizeof(u32) - 1)) rht_key_hashfn() 225 hash = jhash(key, key_len, tbl->hash_rnd); rht_key_hashfn() 227 hash = jhash2(key, key_len / sizeof(u32), rht_key_hashfn() 230 unsigned int key_len = ht->p.key_len; rht_key_hashfn() local 233 hash = params.hashfn(key, key_len, tbl->hash_rnd); rht_key_hashfn() 235 hash = jhash(key, key_len, tbl->hash_rnd); rht_key_hashfn() 248 rht_bucket_index(tbl, params.obj_hashfn(ptr, params.key_len ?: rht_head_hashfn() 249 ht->p.key_len, rht_head_hashfn() 512 return memcmp(ptr + ht->p.key_offset, arg->key, ht->p.key_len); rhashtable_compare() 688 * This lookup function may only be used for fixed key hash table (key_len
|
H A D | ccp.h | 129 * @key_len: length in bytes of key 140 * - type, mode, action, key, key_len, src, dst, src_len 154 u32 key_len; /* In bytes */ member in struct:ccp_aes_engine 192 * @key_len: length in bytes of key 201 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 211 u32 key_len; /* In bytes */ member in struct:ccp_xts_aes_engine
|
/linux-4.1.27/drivers/staging/skein/ |
H A D | skein_api.c | 84 int skein_mac_init(struct skein_ctx *ctx, const u8 *key, size_t key_len, skein_mac_init() argument 103 (const u8 *)key, key_len); skein_mac_init() 109 (const u8 *)key, key_len); skein_mac_init() 114 (const u8 *)key, key_len); skein_mac_init() 121 * key_len, hash_bit_len skein_mac_init()
|
H A D | skein_api.h | 169 * @param key_len 176 int skein_mac_init(struct skein_ctx *ctx, const u8 *key, size_t key_len,
|
/linux-4.1.27/drivers/net/wireless/mwifiex/ |
H A D | sta_cmd.c | 517 key_param_set->key_len = mwifiex_set_keyparamset_wep() 572 km->key_param_set.key_params.cmac_aes.key_len = mwifiex_set_aes_key_v2() 573 cpu_to_le16(enc_key->key_len); mwifiex_set_aes_key_v2() 575 enc_key->key_material, enc_key->key_len); mwifiex_set_aes_key_v2() 583 km->key_param_set.key_params.aes.key_len = mwifiex_set_aes_key_v2() 584 cpu_to_le16(enc_key->key_len); mwifiex_set_aes_key_v2() 586 enc_key->key_material, enc_key->key_len); mwifiex_set_aes_key_v2() 669 if (enc_key->key_len <= WLAN_KEY_LEN_WEP104) { mwifiex_cmd_802_11_key_material_v2() 697 km->key_param_set.key_params.wep.key_len = mwifiex_cmd_802_11_key_material_v2() 698 cpu_to_le16(enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 700 enc_key->key_material, enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 717 km->key_param_set.key_params.wapi.key_len = mwifiex_cmd_802_11_key_material_v2() 718 cpu_to_le16(enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 720 enc_key->key_material, enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 749 if (enc_key->key_len == WLAN_KEY_LEN_CCMP) mwifiex_cmd_802_11_key_material_v2() 752 if (enc_key->key_len == WLAN_KEY_LEN_TKIP) { mwifiex_cmd_802_11_key_material_v2() 758 km->key_param_set.key_params.tkip.key_len = mwifiex_cmd_802_11_key_material_v2() 759 cpu_to_le16(enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 761 enc_key->key_material, enc_key->key_len); mwifiex_cmd_802_11_key_material_v2() 846 key_material->key_param_set.key_len = mwifiex_cmd_802_11_key_material_v1() 849 enc_key->key_material, enc_key->key_len); mwifiex_cmd_802_11_key_material_v1() 850 memcpy(&key_material->key_param_set.key[2 + enc_key->key_len], mwifiex_cmd_802_11_key_material_v1() 861 if (enc_key->key_len == WLAN_KEY_LEN_CCMP) { mwifiex_cmd_802_11_key_material_v1() 894 } else if (enc_key->key_len == WLAN_KEY_LEN_TKIP) { mwifiex_cmd_802_11_key_material_v1() 913 key_material->key_param_set.key_len = mwifiex_cmd_802_11_key_material_v1() 914 cpu_to_le16((u16) enc_key->key_len); mwifiex_cmd_802_11_key_material_v1() 916 enc_key->key_len); mwifiex_cmd_802_11_key_material_v1() 918 cpu_to_le16((u16) enc_key->key_len + mwifiex_cmd_802_11_key_material_v1() 921 key_param_len = (u16)(enc_key->key_len + KEYPARAMSET_FIXED_LEN) mwifiex_cmd_802_11_key_material_v1() 934 key_material->key_param_set.key_len = mwifiex_cmd_802_11_key_material_v1()
|
H A D | sta_ioctl.c | 874 } else if (!encrypt_key->key_len) { mwifiex_sec_ioctl_set_wep_key() 886 encrypt_key->key_len = wep_key->key_length; mwifiex_sec_ioctl_set_wep_key() 897 encrypt_key->key_len); mwifiex_sec_ioctl_set_wep_key() 899 wep_key->key_length = encrypt_key->key_len; mwifiex_sec_ioctl_set_wep_key() 955 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { mwifiex_sec_ioctl_set_wpa_key() 978 encrypt_key->key_len); mwifiex_sec_ioctl_set_wpa_key() 979 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, mwifiex_sec_ioctl_set_wpa_key() 980 sizeof(ibss_key->key_param_set.key_len)); mwifiex_sec_ioctl_set_wpa_key() 1018 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP104) mwifiex_sec_ioctl_encrypt_key() 1055 const u8 *key, int key_len, u8 key_index, mwifiex_set_encode() 1061 encrypt_key.key_len = key_len; mwifiex_set_encode() 1068 if (key_len) mwifiex_set_encode() 1069 memcpy(encrypt_key.key_material, key, key_len); mwifiex_set_encode() 1054 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) mwifiex_set_encode() argument
|
H A D | fw.h | 775 __le16 key_len; member in struct:mwifiex_ie_type_key_param_set 787 __le16 key_len; member in struct:mwifiex_wep_param 793 __le16 key_len; member in struct:mwifiex_tkip_param 799 __le16 key_len; member in struct:mwifiex_aes_param 805 __le16 key_len; member in struct:mwifiex_wapi_param 811 __le16 key_len; member in struct:mwifiex_cmac_aes_param
|
H A D | sta_cmdresp.c | 598 priv->aes_key.key_param_set.key_len = key->key_param_set.key_len; mwifiex_ret_802_11_key_material_v1() 600 le16_to_cpu(priv->aes_key.key_param_set.key_len)); mwifiex_ret_802_11_key_material_v1() 631 priv->aes_key_v2.key_param_set.key_params.aes.key_len = mwifiex_ret_802_11_key_material_v2() 632 key_v2->key_param_set.key_params.aes.key_len; mwifiex_ret_802_11_key_material_v2() 633 len = priv->aes_key_v2.key_param_set.key_params.aes.key_len; mwifiex_ret_802_11_key_material_v2()
|
H A D | ioctl.h | 244 u32 key_len; member in struct:mwifiex_ds_encrypt_key
|
H A D | cfg80211.c | 396 if (params->key && params->key_len) { mwifiex_cfg80211_add_key() 400 params->key_len); mwifiex_cfg80211_add_key() 402 wep_key->key_length = params->key_len; mwifiex_cfg80211_add_key() 408 if (mwifiex_set_encode(priv, params, params->key, params->key_len, mwifiex_cfg80211_add_key() 1964 " with key len %d\n", sme->key_len); mwifiex_cfg80211_assoc() 1967 sme->key_len, sme->key_idx, mwifiex_cfg80211_assoc()
|
/linux-4.1.27/drivers/staging/lustre/include/linux/libcfs/ |
H A D | libcfs_crypto.h | 117 * @param key_len len of initial value 131 unsigned char *key, unsigned int key_len, 141 * @param key_len len of initial value 147 unsigned char *key, unsigned int key_len);
|
/linux-4.1.27/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 44 *master_keylen = tpayload->key_len; request_trusted_key()
|
H A D | encrypted.c | 405 unsigned int key_len, const u8 *iv, init_blkcipher_desc() 418 ret = crypto_blkcipher_setkey(desc->tfm, key, key_len); init_blkcipher_desc() 404 init_blkcipher_desc(struct blkcipher_desc *desc, const u8 *key, unsigned int key_len, const u8 *iv, unsigned int ivsize) init_blkcipher_desc() argument
|
/linux-4.1.27/drivers/s390/crypto/ |
H A D | zcrypt_cca_key.h | 290 int short_len, long_len, pad_len, key_len, size; zcrypt_type6_crt_key() local 297 key_len = 3*long_len + 2*short_len + pad_len + crt->inputdatalength; zcrypt_type6_crt_key() 298 size = sizeof(*key) + key_len + sizeof(*pub) + 3; zcrypt_type6_crt_key() 315 key->pvt.section_length = sizeof(key->pvt) + key_len; zcrypt_type6_crt_key() 336 pub = (struct cca_public_sec *)(key->key_parts + key_len); zcrypt_type6_crt_key()
|
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/ |
H A D | ioctl_cfg80211.c | 457 memcpy(&psetkeyparm->key, parms->key, parms->key_len); set_group_key() 475 int key_len; rtw_cfg80211_ap_set_encryption() local 493 key_len = keyparms->key_len; rtw_cfg80211_ap_set_encryption() 500 key_index, key_len); rtw_cfg80211_ap_set_encryption() 515 keyparms->key, key_len); rtw_cfg80211_ap_set_encryption() 517 psecuritypriv->wep_key[key_index].keylen = key_len; rtw_cfg80211_ap_set_encryption() 532 keyparms->key, key_len); rtw_cfg80211_ap_set_encryption() 546 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_ap_set_encryption() 568 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_ap_set_encryption() 606 keyparms->key, (key_len > 16 ? 16 : key_len)); rtw_cfg80211_ap_set_encryption() 653 keyparms->key, key_len); rtw_cfg80211_ap_set_encryption() 664 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_ap_set_encryption() 682 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_ap_set_encryption() 720 int key_len; rtw_cfg80211_set_encryption() local 727 key_len = keyparms->key_len; rtw_cfg80211_set_encryption() 748 keyparms->key, key_len); rtw_cfg80211_set_encryption() 750 psecuritypriv->wep_key[key_index].keylen = key_len; rtw_cfg80211_set_encryption() 792 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_set_encryption() 815 (key_len > 16 ? 16 : key_len)); rtw_cfg80211_set_encryption() 878 DBG_8723A("key_len = 0x%x\n", params->key_len); cfg80211_rtw_add_key() 886 if (params->key_len != WLAN_KEY_LEN_WEP40) { cfg80211_rtw_add_key() 891 if (params->key_len != WLAN_KEY_LEN_WEP104) { cfg80211_rtw_add_key() 903 if (key_index >= WEP_KEYS || params->key_len < 0) { cfg80211_rtw_add_key() 1964 DBG_8723A("privacy =%d, key =%p, key_len =%d, key_idx =%d\n", cfg80211_rtw_connect() 1965 sme->privacy, sme->key, sme->key_len, sme->key_idx); cfg80211_rtw_connect() 2091 wep_key_len = sme->key_len;
|
/linux-4.1.27/fs/ntfs/ |
H A D | index.c | 81 * @key_len: [IN] length of @key in bytes 119 int ntfs_index_lookup(const void *key, const int key_len, ntfs_index_lookup() argument 143 BUG_ON(key_len <= 0); ntfs_index_lookup() 206 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, ntfs_index_lookup() 207 &ie->key, key_len)) { ntfs_index_lookup() 228 key_len, &ie->key, le16_to_cpu(ie->key_length)); ntfs_index_lookup() 376 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, ntfs_index_lookup() 377 &ie->key, key_len)) { ntfs_index_lookup() 391 key_len, &ie->key, le16_to_cpu(ie->key_length)); ntfs_index_lookup()
|
H A D | index.h | 91 extern int ntfs_index_lookup(const void *key, const int key_len,
|
/linux-4.1.27/drivers/net/ethernet/toshiba/ |
H A D | ps3_gelic_wireless.c | 1032 pr_debug("%s: key_len = %d\n", __func__, enc->length); gelic_wl_set_encode() 1077 wl->key_len[key_index] = enc->length; gelic_wl_set_encode() 1129 if (enc->length < wl->key_len[key_index]) { gelic_wl_get_encode() 1133 enc->length = wl->key_len[key_index]; gelic_wl_get_encode() 1134 memcpy(extra, wl->key[key_index], wl->key_len[key_index]); gelic_wl_get_encode() 1220 pr_debug("%s: key_len = %d\n", __func__, enc->length); gelic_wl_set_encodeext() 1223 pr_debug("%s: ext_key_len=%x\n", __func__, ext->key_len); gelic_wl_set_encodeext() 1258 if (IW_ENCODING_TOKEN_MAX < ext->key_len) { gelic_wl_set_encodeext() 1260 ext->key_len); gelic_wl_set_encodeext() 1265 wl->key_len[key_index] = ext->key_len; gelic_wl_set_encodeext() 1267 memcpy(wl->key[key_index], ext->key, ext->key_len); gelic_wl_set_encodeext() 1272 if (ext->key_len != WPA_PSK_LEN) { gelic_wl_set_encodeext() 1274 ext->key_len); gelic_wl_set_encodeext() 1279 memcpy(wl->psk, ext->key, ext->key_len); gelic_wl_set_encodeext() 1280 wl->psk_len = ext->key_len; gelic_wl_set_encodeext() 1311 pr_debug("%s: key_len = %d\n", __func__, enc->length); gelic_wl_get_encodeext() 1345 if (max_key_len < wl->key_len[key_index]) { gelic_wl_get_encodeext() 1351 wl->key_len[key_index]); gelic_wl_get_encodeext() 1781 if (wl->key_len[i] == 13) gelic_wl_do_wep_setup() 1783 else if (wl->key_len[i] != 5) { gelic_wl_do_wep_setup() 1785 __func__, i, wl->key_len[i]); gelic_wl_do_wep_setup() 1789 memcpy(wep->key[i], wl->key[i], wl->key_len[i]); gelic_wl_do_wep_setup()
|
H A D | ps3_gelic_wireless.h | 279 unsigned int key_len[GELIC_WEP_KEYS]; member in struct:gelic_wl_info
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
H A D | libipw_wx.c | 636 if (ext->key_len > 0 && (*crypt)->ops->set_key && libipw_wx_set_encodeext() 637 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, libipw_wx_set_encodeext() 652 memcpy(sec.keys[idx], ext->key, ext->key_len); libipw_wx_set_encodeext() 653 sec.key_sizes[idx] = ext->key_len; libipw_wx_set_encodeext() 710 ext->key_len = 0; libipw_wx_get_encodeext() 722 ext->key_len = sec->key_sizes[idx]; libipw_wx_get_encodeext() 723 memcpy(ext->key, sec->keys[idx], ext->key_len); libipw_wx_get_encodeext() 725 if (ext->key_len && libipw_wx_get_encodeext()
|
/linux-4.1.27/drivers/staging/rtl8188eu/os_dep/ |
H A D | ioctl_linux.c | 366 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { wpa_set_encryption() 392 wep_key_len = param->u.crypt.key_len; wpa_set_encryption() 458 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); wpa_set_encryption() 470 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); wpa_set_encryption() 1686 DBG_88E("(keyindex_provided == 1), keyid =%d, key_len =%d\n", key, padapter->securitypriv.dot11DefKeylen[key]); rtw_wx_set_enc() 1900 param_len = sizeof(struct ieee_param) + pext->key_len; rtw_wx_set_enc_ext() 1947 if (pext->key_len) { rtw_wx_set_enc_ext() 1948 param->u.crypt.key_len = pext->key_len; rtw_wx_set_enc_ext() 1949 memcpy(param->u.crypt.key, pext + 1, pext->key_len); rtw_wx_set_enc_ext() 2241 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { rtw_set_encryption() 2269 wep_key_len = param->u.crypt.key_len; rtw_set_encryption() 2336 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2339 if (param->u.crypt.key_len == 13) rtw_set_encryption() 2345 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2355 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2376 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2382 if (param->u.crypt.key_len == 13) rtw_set_encryption() 2410 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2412 if (param->u.crypt.key_len == 13) rtw_set_encryption() 2418 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption() 2429 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); rtw_set_encryption()
|
/linux-4.1.27/net/core/ |
H A D | neighbour.c | 420 int key_len = tbl->key_len; neigh_lookup_nodev() local 433 if (!memcmp(n->primary_key, pkey, key_len) && neigh_lookup_nodev() 451 int key_len = tbl->key_len; __neigh_create() local 461 memcpy(n->primary_key, pkey, key_len); __neigh_create() 507 if (dev == n1->dev && !memcmp(n1->primary_key, pkey, key_len)) { __neigh_create() 535 static u32 pneigh_hash(const void *pkey, int key_len) pneigh_hash() argument 537 u32 hash_val = *(u32 *)(pkey + key_len - 4); pneigh_hash() 548 int key_len, __pneigh_lookup_1() 552 if (!memcmp(n->key, pkey, key_len) && __pneigh_lookup_1() 564 int key_len = tbl->key_len; __pneigh_lookup() local 565 u32 hash_val = pneigh_hash(pkey, key_len); __pneigh_lookup() 568 net, pkey, key_len, dev); __pneigh_lookup() 577 int key_len = tbl->key_len; pneigh_lookup() local 578 u32 hash_val = pneigh_hash(pkey, key_len); pneigh_lookup() 582 net, pkey, key_len, dev); pneigh_lookup() 590 n = kmalloc(sizeof(*n) + key_len, GFP_KERNEL); pneigh_lookup() 595 memcpy(n->key, pkey, key_len); pneigh_lookup() 622 int key_len = tbl->key_len; pneigh_delete() local 623 u32 hash_val = pneigh_hash(pkey, key_len); pneigh_delete() 628 if (!memcmp(n->key, pkey, key_len) && n->dev == dev && pneigh_delete() 1522 tbl->key_len, NEIGH_PRIV_ALIGN); neigh_table_init() 1618 if (nla_len(dst_attr) < tbl->key_len) neigh_delete() 1681 if (nla_len(tb[NDA_DST]) < tbl->key_len) neigh_add() 1811 .ndtc_key_len = tbl->key_len, neightbl_fill_info() 2160 if (nla_put(skb, NDA_DST, neigh->tbl->key_len, neigh->primary_key)) neigh_fill_info() 2213 if (nla_put(skb, NDA_DST, tbl->key_len, pn->key)) pneigh_fill_info() 545 __pneigh_lookup_1(struct pneigh_entry *n, struct net *net, const void *pkey, int key_len, struct net_device *dev) __pneigh_lookup_1() argument
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
H A D | cfg.c | 1008 const u8 *key, u16 key_len) lbs_set_key_material() 1037 cmd.param.keylen = cpu_to_le16(key_len); lbs_set_key_material() 1038 if (key && key_len) lbs_set_key_material() 1039 memcpy(cmd.param.key, key, key_len); lbs_set_key_material() 1370 sme->key_idx, sme->key_len); lbs_cfg_connect() 1383 priv->wep_key_len[sme->key_idx] = sme->key_len; lbs_cfg_connect() 1384 memcpy(priv->wep_key[sme->key_idx], sme->key, sme->key_len); lbs_cfg_connect() 1523 idx, params->key_len); lbs_cfg_add_key() 1524 if (params->key_len) lbs_cfg_add_key() 1526 params->key, params->key_len); lbs_cfg_add_key() 1537 if ((priv->wep_key_len[idx] != params->key_len) || lbs_cfg_add_key() 1539 params->key, params->key_len) != 0) { lbs_cfg_add_key() 1540 priv->wep_key_len[idx] = params->key_len; lbs_cfg_add_key() 1542 params->key, params->key_len); lbs_cfg_add_key() 1557 params->key, params->key_len); lbs_cfg_add_key() 1006 lbs_set_key_material(struct lbs_private *priv, int key_type, int key_info, const u8 *key, u16 key_len) lbs_set_key_material() argument
|
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 565 if ((sme->key_len) && ath6kl_cfg80211_connect() 578 key->key_len = sme->key_len; ath6kl_cfg80211_connect() 579 memcpy(key->key, sme->key, key->key_len); ath6kl_cfg80211_connect() 586 key->key_len, ath6kl_cfg80211_connect() 1131 if (params->key_len != WMI_KRK_LEN) ath6kl_cfg80211_add_key() 1158 if (params->key_len > WLAN_MAX_KEY_LEN || ath6kl_cfg80211_add_key() 1162 key->key_len = params->key_len; ath6kl_cfg80211_add_key() 1163 memcpy(key->key, params->key, key->key_len); ath6kl_cfg80211_add_key() 1195 "%s: index %d, key_len %d, key_type 0x%x, key_usage 0x%x, seq_len %d\n", ath6kl_cfg80211_add_key() 1196 __func__, key_index, key->key_len, key_type, ath6kl_cfg80211_add_key() 1205 ar->ap_mode_bkey.key_len = key->key_len; ath6kl_cfg80211_add_key() 1206 memcpy(ar->ap_mode_bkey.key, key->key, key->key_len); ath6kl_cfg80211_add_key() 1227 vif->wep_key_list[key_index].key_len = key->key_len; ath6kl_cfg80211_add_key() 1229 key->key_len); ath6kl_cfg80211_add_key() 1234 key_type, key_usage, key->key_len, ath6kl_cfg80211_add_key() 1259 if (!vif->keys[key_index].key_len) { ath6kl_cfg80211_del_key() 1265 vif->keys[key_index].key_len = 0; ath6kl_cfg80211_del_key() 1295 params.key_len = key->key_len; ath6kl_cfg80211_get_key() 1302 return key->key_len ? 0 : -ENOENT; ath6kl_cfg80211_get_key() 1328 if (!vif->keys[key_index].key_len) { ath6kl_cfg80211_set_default_key() 1350 key->key_len, key->seq, key->seq_len, ath6kl_cfg80211_set_default_key()
|
H A D | core.h | 375 u8 key_len; member in struct:ath6kl_wep_key 383 u8 key_len; member in struct:ath6kl_key 550 u8 key_len; member in struct:ath6kl_req_key
|
H A D | main.c | 357 if (vif->wep_key_list[index].key_len) { ath6kl_install_static_wep_keys() 366 vif->wep_key_list[index].key_len, ath6kl_install_static_wep_keys() 404 GROUP_USAGE, ik->key_len, key_rsc, ATH6KL_KEY_SEQ_LEN, ath6kl_connect_ap_mode_bss()
|
H A D | wmi.c | 2300 u8 key_usage, u8 key_len, ath6kl_wmi_addkey_cmd() 2311 "addkey cmd: key_index=%u key_type=%d key_usage=%d key_len=%d key_op_ctrl=%d\n", ath6kl_wmi_addkey_cmd() 2312 key_index, key_type, key_usage, key_len, key_op_ctrl); ath6kl_wmi_addkey_cmd() 2314 if ((key_index > WMI_MAX_KEY_INDEX) || (key_len > WMI_MAX_KEY_LEN) || ath6kl_wmi_addkey_cmd() 2329 cmd->key_len = key_len; ath6kl_wmi_addkey_cmd() 2330 memcpy(cmd->key, key_material, key_len); ath6kl_wmi_addkey_cmd() 2298 ath6kl_wmi_addkey_cmd(struct wmi *wmi, u8 if_idx, u8 key_index, enum crypto_type key_type, u8 key_usage, u8 key_len, u8 *key_rsc, unsigned int key_rsc_len, u8 *key_material, u8 key_op_ctrl, u8 *mac_addr, enum wmi_sync_flag sync_flag) ath6kl_wmi_addkey_cmd() argument
|
H A D | wmi.h | 787 u8 key_len; member in struct:wmi_add_cipher_key_cmd 2614 u8 key_usage, u8 key_len,
|
/linux-4.1.27/lib/ |
H A D | rhashtable.c | 693 * .key_len = sizeof(int), 725 if ((!params->key_len && !params->obj_hashfn) || rhashtable_init() 774 ht->key_len = ht->p.key_len; rhashtable_init() 778 if (!(ht->key_len & (sizeof(u32) - 1))) { rhashtable_init() 779 ht->key_len /= sizeof(u32); rhashtable_init()
|
H A D | test_rhashtable.c | 45 .key_len = sizeof(int),
|
/linux-4.1.27/arch/x86/include/asm/crypto/ |
H A D | camellia.h | 30 unsigned int key_len, u32 *flags);
|
/linux-4.1.27/drivers/net/wireless/ |
H A D | rndis_wlan.c | 1345 static int add_wep_key(struct usbnet *usbdev, const u8 *key, int key_len, add_wep_key() argument 1354 __func__, index, key_len); add_wep_key() 1359 if (key_len == 5) add_wep_key() 1361 else if (key_len == 13) add_wep_key() 1369 ndis_key.length = cpu_to_le32(key_len); add_wep_key() 1371 memcpy(&ndis_key.material, key, key_len); add_wep_key() 1391 priv->encr_keys[index].len = key_len; add_wep_key() 1393 memcpy(&priv->encr_keys[index].material, key, key_len); add_wep_key() 1399 static int add_wpa_key(struct usbnet *usbdev, const u8 *key, int key_len, add_wpa_key() argument 1413 if (key_len > sizeof(ndis_key.material) || key_len < 0) { add_wpa_key() 1415 __func__, key_len); add_wpa_key() 1447 sizeof(ndis_key.material) + key_len); add_wpa_key() 1448 ndis_key.length = cpu_to_le32(key_len); add_wpa_key() 1451 if (cipher == WLAN_CIPHER_SUITE_TKIP && key_len == 32) { add_wpa_key() 1458 memcpy(ndis_key.material, key, key_len); add_wpa_key() 1483 priv->encr_keys[index].len = key_len; add_wpa_key() 1485 memcpy(&priv->encr_keys[index].material, key, key_len); add_wpa_key() 2230 ret = add_wep_key(usbdev, sme->key, sme->key_len, sme->key_idx); rndis_connect() 2233 ret, sme->key_len, sme->key_idx); rndis_connect() 2414 return add_wep_key(usbdev, params->key, params->key_len, rndis_add_key() 2426 return add_wpa_key(usbdev, params->key, params->key_len, rndis_add_key()
|
H A D | atmel.c | 1854 int idx, key_len, alg = ext->alg, set_key = 1; atmel_set_encodeext() local 1870 set_key = ext->key_len > 0 ? 1 : 0; atmel_set_encodeext() 1882 if (ext->key_len > 5) { atmel_set_encodeext() 1886 } else if (ext->key_len > 0) { atmel_set_encodeext() 1895 key_len = min ((int)ext->key_len, priv->wep_key_len[idx]); atmel_set_encodeext() 1896 memcpy(priv->wep_keys[idx], ext->key, key_len); atmel_set_encodeext() 1933 ext->key_len = 0; atmel_get_encodeext() 1941 ext->key_len = priv->wep_key_len[idx]; atmel_get_encodeext() 1942 memcpy(ext->key, priv->wep_keys[idx], ext->key_len); atmel_get_encodeext()
|
H A D | at76c50x-usb.c | 968 int key_len; at76_dump_mib_mac_wep() local 983 "key_len %u excl_unencr %u wep_icv_err %u wep_excluded %u " at76_dump_mib_mac_wep() 991 key_len = (m->encryption_level == 1) ? at76_dump_mib_mac_wep() 997 key_len, m->wep_default_keyvalue[i]); at76_dump_mib_mac_wep()
|
H A D | airo.c | 1299 static void age_mic_context(miccntx *cur, miccntx *old, u8 *key, int key_len, age_mic_context() argument 1305 if (cur->valid && (memcmp(cur->key, key, key_len) == 0)) age_mic_context() 1312 memcpy(cur->key, key, key_len); age_mic_context() 1319 emmh32_setseed(&cur->seed, key, key_len, tfm); age_mic_context() 6474 int idx, key_len, alg = ext->alg, set_key = 1, rc; airo_set_encodeext() local 6508 set_key = ext->key_len > 0 ? 1 : 0; airo_set_encodeext() 6519 if (ext->key_len > MIN_KEY_SIZE) { airo_set_encodeext() 6521 } else if (ext->key_len > 0) { airo_set_encodeext() 6526 key_len = min (ext->key_len, key.len); airo_set_encodeext() 6527 memcpy(key.key, ext->key, key_len); airo_set_encodeext() 6624 ext->key_len = 0; airo_get_encodeext() 6626 ext->key_len = wep_key_len; airo_get_encodeext() 6627 memcpy(extra, buf, ext->key_len); airo_get_encodeext()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
H A D | hw_ops.h | 307 u8 key_len, u8 *key) wlcore_smart_config_set_group_key() 312 return wl->ops->smart_config_set_group_key(wl, group_id, key_len, key); wlcore_smart_config_set_group_key() 306 wlcore_smart_config_set_group_key(struct wl1271 *wl, u16 group_id, u8 key_len, u8 *key) wlcore_smart_config_set_group_key() argument
|
H A D | wlcore.h | 125 u8 key_len, u8 *key);
|
/linux-4.1.27/fs/ubifs/ |
H A D | misc.h | 203 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len) * child_cnt; ubifs_idx_node_sz() 218 (UBIFS_BRANCH_SZ + c->key_len) * bnum); ubifs_idx_branch()
|
H A D | sb.c | 88 /* Some functions called from here depend on the @c->key_len filed */ create_default_filesystem() 89 c->key_len = UBIFS_SK_LEN; create_default_filesystem() 595 c->key_len = UBIFS_SK_LEN; ubifs_read_superblock()
|
/linux-4.1.27/fs/nfsd/ |
H A D | nfsfh.h | 138 static inline int key_len(int type) key_len() function 203 if (memcmp(fh1->fh_fsid, fh2->fh_fsid, key_len(fh1->fh_fsid_type)) != 0) fh_fsid_match()
|
H A D | export.c | 62 qword_addhex(bpp, blen, (char*)ek->ek_fsid, key_len(ek->ek_fsidtype)); expkey_request() 108 if (key_len(fsidtype)==0) /* invalid type */ expkey_parse() 113 if (len != key_len(fsidtype)) expkey_parse() 179 for (i=0; i < key_len(ek->ek_fsidtype)/4; i++) expkey_show() 197 memcmp(orig->ek_fsid, new->ek_fsid, key_len(orig->ek_fsidtype)) != 0) expkey_match() 253 int len = key_len(item->ek_fsidtype); svc_expkey_hash() 814 memcpy(key.ek_fsid, fsidv, key_len(fsid_type)); exp_find_key()
|
H A D | nfsfh.c | 158 len = key_len(fh->fh_fsid_type) / 4; nfsd_set_fh_dentry() 163 len = key_len(FSID_ENCODE_DEV)/4; nfsd_set_fh_dentry() 567 key_len(fhp->fh_handle.fh_fsid_type) + 4; fh_compose()
|
H A D | nfs4layouts.c | 49 size_t fsid_len = key_len(fh->fh_fsid_type); nfsd4_alloc_devid_map() 69 key_len(old->fsid_type))) nfsd4_alloc_devid_map()
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 190 params->key_len, params->key); prism2_add_key() 228 params.key_len = len; prism2_get_key() 563 did, sme->key_len, prism2_connect()
|
/linux-4.1.27/net/openvswitch/ |
H A D | flow_netlink.c | 1821 size_t key_len; validate_set() local 1827 key_len = nla_len(ovs_key); validate_set() 1829 key_len /= 2; validate_set() 1832 (ovs_key_lens[key_type].len != key_len && validate_set() 1836 if (masked && !validate_masked(nla_data(ovs_key), key_len)) validate_set() 1946 int start, len = key_len * 2; validate_set() 1961 memcpy(nla_data(at), nla_data(ovs_key), key_len); /* Key. */ validate_set() 1962 memset(nla_data(at) + key_len, 0xff, key_len); /* Mask. */ validate_set() 1965 struct ovs_key_ipv6 *mask = nla_data(at) + key_len; validate_set() 2259 size_t key_len = nla_len(ovs_key) / 2; masked_set_action_to_set_action_attr() local 2268 if (nla_put(skb, nla_type(ovs_key), key_len, nla_data(ovs_key))) masked_set_action_to_set_action_attr()
|
/linux-4.1.27/drivers/net/wireless/p54/ |
H A D | fwio.c | 679 rxkey->key_len = min_t(u8, 16, len); p54_upload_key() 680 memcpy(rxkey->key, key, rxkey->key_len); p54_upload_key() 684 rxkey->key_len = 24; p54_upload_key() 691 rxkey->key_len = 0; p54_upload_key()
|
H A D | lmac.h | 255 u8 key_len; member in struct:p54_tx_data 445 u8 key_len; member in struct:p54_keycache
|
H A D | txrx.c | 903 txhdr->key_len = min((u8)16, info->control.hw_key->keylen); p54_tx_80211() 904 memcpy(txhdr->key, info->control.hw_key->key, txhdr->key_len); p54_tx_80211() 917 txhdr->key_len = 0; p54_tx_80211()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192cu/ |
H A D | mac.c | 263 rtlpriv->sec.key_len[idx] = 0; rtl92c_set_key() 312 if (rtlpriv->sec.key_len[key_index] == 0) { rtl92c_set_key() 322 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); rtl92c_set_key() 334 key_len[PAIRWISE_KEYIDX]); rtl92c_set_key()
|
/linux-4.1.27/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 152 u32 key_len:5; member in struct:sa_command_1::__anon3795
|
H A D | crypto4xx_alg.c | 156 sa->sa_command_1.bf.key_len = keylen >> 3; crypto4xx_setkey_aes()
|
/linux-4.1.27/include/net/irda/ |
H A D | irlan_common.h | 126 __u8 key_len; member in struct:irlan_client_cb
|
/linux-4.1.27/drivers/staging/rtl8712/ |
H A D | rtl871x_ioctl_linux.c | 127 (param->u.crypt. key_len > 16 ? 16 : param->u.crypt.key_len)); handle_pairwise_key() 147 idx-1].skey, param->u.crypt.key, (param->u.crypt.key_len handle_group_key() 148 > 16 ? 16 : param->u.crypt.key_len)); handle_group_key() 405 param->u.crypt.key_len) wpa_set_encryption() 421 wep_key_len = param->u.crypt.key_len; wpa_set_encryption() 1812 param_len = sizeof(struct ieee_param) + pext->key_len; r871x_wx_set_enc_ext() 1827 if (pext->key_len) { r871x_wx_set_enc_ext() 1828 param->u.crypt.key_len = pext->key_len; r871x_wx_set_enc_ext() 1829 memcpy(param + 1, pext + 1, pext->key_len); r871x_wx_set_enc_ext()
|
H A D | ieee80211.h | 115 u16 key_len; member in struct:ieee_param::__anon10218::__anon10222
|
H A D | rtl871x_security.c | 60 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) arcfour_init() argument 81 if (++keyindex >= key_len) arcfour_init()
|
/linux-4.1.27/net/ipv4/ |
H A D | cipso_ipv4.c | 79 size_t key_len; member in struct:cipso_v4_map_cache_entry 227 * @key_len: the length of the key in bytes 233 static u32 cipso_v4_map_cache_hash(const unsigned char *key, u32 key_len) cipso_v4_map_cache_hash() argument 235 return jhash(key, key_len, 0); cipso_v4_map_cache_hash() 299 * @key_len: buffer length in bytes 319 u32 key_len, cipso_v4_cache_check() 330 hash = cipso_v4_map_cache_hash(key, key_len); cipso_v4_cache_check() 335 entry->key_len == key_len && cipso_v4_cache_check() 336 memcmp(entry->key, key, key_len) == 0) { cipso_v4_cache_check() 403 entry->key_len = cipso_ptr_len; cipso_v4_cache_add() 318 cipso_v4_cache_check(const unsigned char *key, u32 key_len, struct netlbl_lsm_secattr *secattr) cipso_v4_cache_check() argument
|
/linux-4.1.27/fs/xfs/libxfs/ |
H A D | xfs_ialloc_btree.c | 326 .key_len = sizeof(xfs_inobt_key_t), 348 .key_len = sizeof(xfs_inobt_key_t),
|
H A D | xfs_alloc_btree.c | 428 .key_len = sizeof(xfs_alloc_key_t),
|
H A D | xfs_btree.h | 119 size_t key_len; member in struct:xfs_btree_ops
|
H A D | xfs_bmap_btree.c | 752 .key_len = sizeof(xfs_bmbt_key_t),
|
H A D | xfs_btree.c | 448 (n - 1) * cur->bc_ops->key_len; xfs_btree_key_offset() 461 cur->bc_ops->get_maxrecs(cur, level) * cur->bc_ops->key_len + xfs_btree_ptr_offset() 1190 memcpy(dst_key, src_key, numkeys * cur->bc_ops->key_len); xfs_btree_copy_keys() 1236 dst_key = (char *)key + (dir * cur->bc_ops->key_len); xfs_btree_shift_keys() 1237 memmove(dst_key, key, numkeys * cur->bc_ops->key_len); xfs_btree_shift_keys()
|
/linux-4.1.27/kernel/bpf/ |
H A D | hashtab.c | 98 static inline u32 htab_map_hash(const void *key, u32 key_len) htab_map_hash() argument 100 return jhash(key, key_len, 0); htab_map_hash()
|
/linux-4.1.27/net/bluetooth/ |
H A D | amp.c | 357 if (phylink_gen_key(mgr->l2cap_conn->hcon, cp.key, &cp.key_len, amp_create_phylink() 376 if (phylink_gen_key(mgr->l2cap_conn->hcon, cp.key, &cp.key_len, amp_accept_phylink()
|
/linux-4.1.27/drivers/net/wireless/rsi/ |
H A D | rsi_91x_mgmt.c | 687 * @key_len: Key length to be loaded. 696 u16 key_len, rsi_hal_load_key() 719 key_len += 1; rsi_hal_load_key() 721 if (key_len >= 13) rsi_hal_load_key() 742 key_len * 2); rsi_hal_load_key() 744 memcpy(&set_key->key[0][0], data, key_len); rsi_hal_load_key() 694 rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len, u8 key_type, u8 key_id, u32 cipher) rsi_hal_load_key() argument
|
H A D | rsi_mgmt.h | 293 int rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len,
|
/linux-4.1.27/drivers/net/wireless/ath/wil6210/ |
H A D | wmi.c | 1001 const void *mac_addr, int key_len, const void *key) wmi_add_cipher_key() 1006 .key_len = key_len, wmi_add_cipher_key() 1009 if (!key || (key_len > sizeof(cmd.key))) wmi_add_cipher_key() 1012 memcpy(cmd.key, key, key_len); wmi_add_cipher_key() 1000 wmi_add_cipher_key(struct wil6210_priv *wil, u8 key_index, const void *mac_addr, int key_len, const void *key) wmi_add_cipher_key() argument
|
H A D | cfg80211.c | 577 params->key_len, params->key); wil_cfg80211_add_key()
|
H A D | wmi.h | 264 u8 key_len; member in struct:wmi_add_cipher_key_cmd
|
/linux-4.1.27/drivers/net/wireless/hostap/ |
H A D | hostap_ioctl.c | 3323 if ((!(ext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY) || ext->key_len > 0) prism2_ioctl_siwencodeext() 3325 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, prism2_ioctl_siwencodeext() 3339 if (sta_ptr == NULL && ext->key_len > 0) { prism2_ioctl_siwencodeext() 3411 ext->key_len = 0; prism2_ioctl_giwencodeext() 3424 ext->key_len = prism2_ioctl_giwencodeext() 3429 if (ext->key_len && prism2_ioctl_giwencodeext() 3457 param->u.crypt.key_len) prism2_ioctl_set_encryption() 3533 param->u.crypt.key_len > 0) && (*crypt)->ops->set_key && prism2_ioctl_set_encryption() 3535 param->u.crypt.key_len, param->u.crypt.seq, prism2_ioctl_set_encryption() 3611 param->u.crypt.key_len = 0; prism2_ioctl_get_encryption() 3616 param->u.crypt.key_len = 0; prism2_ioctl_get_encryption() 3620 param->u.crypt.key_len = prism2_ioctl_get_encryption()
|
H A D | hostap_common.h | 379 u16 key_len; member in struct:prism2_hostapd_param::__anon7854::__anon7857
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
H A D | rt2x00mac.c | 436 static void memcpy_tkip(struct rt2x00lib_crypto *crypto, u8 *key, u8 key_len) memcpy_tkip() argument 438 if (key_len > NL80211_TKIP_DATA_OFFSET_ENCR_KEY) memcpy_tkip() 443 if (key_len > NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY) memcpy_tkip() 448 if (key_len > NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY) memcpy_tkip()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/ |
H A D | cam.c | 37 memset(rtlpriv->sec.key_len, 0, KEY_BUF_SIZE); rtl_cam_reset_sec_info()
|
H A D | core.c | 1604 rtlpriv->sec.key_len[key_idx] = key->keylen; rtl_op_set_key() 1614 rtlpriv->sec.key_len[key_idx] = key->keylen; rtl_op_set_key() 1631 rtlpriv->sec.key_len[PAIRWISE_KEYIDX] = key->keylen; rtl_op_set_key() 1659 rtlpriv->sec.key_len[key_idx] = 0; rtl_op_set_key()
|
/linux-4.1.27/fs/nfs/objlayout/ |
H A D | pnfs_osd_xdr_cli.c | 196 "key_len=%u cap_len=%u\n", pnfs_osd_xdr_decode_layout_comp()
|
/linux-4.1.27/net/netfilter/ |
H A D | nft_hash.c | 310 params.key_len = set->klen; nft_hash_init()
|
/linux-4.1.27/net/sctp/ |
H A D | auth.c | 73 static struct sctp_auth_bytes *sctp_auth_create_key(__u32 key_len, gfp_t gfp) sctp_auth_create_key() argument 78 if (key_len > (INT_MAX - sizeof(struct sctp_auth_bytes))) sctp_auth_create_key() 82 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp); sctp_auth_create_key() 86 key->len = key_len; sctp_auth_create_key()
|
/linux-4.1.27/drivers/net/ethernet/rocker/ |
H A D | rocker.c | 121 size_t key_len; member in struct:rocker_flow_tbl_entry 2299 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); rocker_flow_tbl_find() local 2303 if (memcmp(&found->key, &match->key, key_len) == 0) rocker_flow_tbl_find() 2316 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); rocker_flow_tbl_add() local 2319 match->key_crc32 = crc32(~0, &match->key, key_len); rocker_flow_tbl_add() 2352 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); rocker_flow_tbl_del() local 2356 match->key_crc32 = crc32(~0, &match->key, key_len); rocker_flow_tbl_del() 2550 entry->key_len = offsetof(struct rocker_flow_tbl_key, rocker_flow_tbl_ucast4_routing()
|
/linux-4.1.27/drivers/net/ethernet/chelsio/cxgb4/ |
H A D | l2t.c | 368 int addr_len = neigh->tbl->key_len; cxgb4_l2t_get() 481 int addr_len = neigh->tbl->key_len; t4_l2t_update()
|
/linux-4.1.27/drivers/net/wireless/prism54/ |
H A D | isl_ioctl.c | 1573 set_key = ext->key_len > 0 ? 1 : 0; prism54_set_encodeext() 1582 if (ext->key_len > KEY_SIZE_WEP104) { prism54_set_encodeext() 1586 if (ext->key_len > KEY_SIZE_WEP40) prism54_set_encodeext() 1592 if (ext->key_len > KEY_SIZE_TKIP) { prism54_set_encodeext() 1605 memcpy(key.key, ext->key, ext->key_len); prism54_set_encodeext() 1707 ext->key_len = 0; prism54_get_encodeext() 1721 ext->key_len = key->length; prism54_get_encodeext()
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
H A D | wmi-tlv.c | 1584 sizeof(*tlv) + roundup(arg->key_len, sizeof(__le32)); ath10k_wmi_tlv_op_gen_vdev_install_key() 1598 cmd->key_len = __cpu_to_le32(arg->key_len); ath10k_wmi_tlv_op_gen_vdev_install_key() 1610 tlv->len = __cpu_to_le16(roundup(arg->key_len, sizeof(__le32))); ath10k_wmi_tlv_op_gen_vdev_install_key() 1612 memcpy(tlv->value, arg->key_data, arg->key_len); ath10k_wmi_tlv_op_gen_vdev_install_key() 1615 ptr += roundup(arg->key_len, sizeof(__le32)); ath10k_wmi_tlv_op_gen_vdev_install_key()
|
H A D | wmi.c | 4463 skb = ath10k_wmi_alloc_skb(ar, sizeof(*cmd) + arg->key_len); ath10k_wmi_op_gen_vdev_install_key() 4472 cmd->key_len = __cpu_to_le32(arg->key_len); ath10k_wmi_op_gen_vdev_install_key() 4479 memcpy(cmd->key_data, arg->key_data, arg->key_len); ath10k_wmi_op_gen_vdev_install_key() 4483 arg->key_idx, arg->key_cipher, arg->key_len); ath10k_wmi_op_gen_vdev_install_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/ |
H A D | hw.c | 2189 rtlpriv->sec.key_len[idx] = 0; rtl92ce_set_key() 2241 if (rtlpriv->sec.key_len[key_index] == 0) { rtl92ce_set_key() 2252 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); rtl92ce_set_key() 2265 key_len[PAIRWISE_KEYIDX]); rtl92ce_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192de/ |
H A D | hw.c | 2195 rtlpriv->sec.key_len[idx] = 0; rtl92de_set_key() 2242 if (rtlpriv->sec.key_len[key_index] == 0) { rtl92de_set_key() 2252 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); rtl92de_set_key() 2264 sec.key_len[PAIRWISE_KEYIDX]); rtl92de_set_key()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
H A D | main.c | 969 const u8 *key, size_t key_len, const u8 *mac_addr) do_key_write() 978 B43_WARN_ON(key_len > B43_SEC_KEYSIZE); do_key_write() 996 memcpy(buf, key, key_len); do_key_write() 1006 const u8 *key, size_t key_len, b43_key_write() 1020 if (algorithm == B43_SEC_ALGO_TKIP && key_len == 32) b43_key_write() 1021 key_len = 16; b43_key_write() 1022 if (key_len > B43_SEC_KEYSIZE) b43_key_write() 1051 do_key_write(dev, index, algorithm, key, key_len, mac_addr); b43_key_write() 1055 do_key_write(dev, index + 4, algorithm, key, key_len, NULL); b43_key_write() 967 do_key_write(struct b43_wldev *dev, u8 index, u8 algorithm, const u8 *key, size_t key_len, const u8 *mac_addr) do_key_write() argument 1004 b43_key_write(struct b43_wldev *dev, int index, u8 algorithm, const u8 *key, size_t key_len, const u8 *mac_addr, struct ieee80211_key_conf *keyconf) b43_key_write() argument
|
/linux-4.1.27/include/net/ |
H A D | neighbour.h | 192 int key_len; member in struct:neigh_table
|
/linux-4.1.27/net/decnet/ |
H A D | dn_neigh.c | 80 .key_len = sizeof(__le16),
|
/linux-4.1.27/net/irda/irlan/ |
H A D | irlan_client.c | 503 self->client.key_len = val_len; irlan_check_response_param()
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_wx.c | 1015 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) r8192_wx_set_enc_ext() 1023 if (ext->key_len == 13) r8192_wx_set_enc_ext()
|
H A D | rtl_core.c | 2602 if (ipw->u.crypt.key_len == 13) rtl8192_ioctl() 2605 else if (ipw->u.crypt.key_len == 5) rtl8192_ioctl() 2650 if (ipw->u.crypt.key_len == 13) rtl8192_ioctl() 2653 else if (ipw->u.crypt.key_len == 5) rtl8192_ioctl()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 500 static int qat_alg_validate_key(int key_len, int *alg) qat_alg_validate_key() argument 502 switch (key_len) { qat_alg_validate_key()
|
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/ |
H A D | cfg80211.c | 1651 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); brcmf_set_sharedkey() 1653 if (sme->key_len == 0) brcmf_set_sharedkey() 1668 key.len = (u32) sme->key_len; brcmf_set_sharedkey() 2070 key.len = (u32) params->key_len; brcmf_add_keyext() 2170 if (params->key_len > sizeof(key->data)) { brcmf_cfg80211_add_key() 2171 brcmf_err("Too long key length (%u)\n", params->key_len); brcmf_cfg80211_add_key() 2175 key->len = params->key_len; brcmf_cfg80211_add_key()
|
/linux-4.1.27/drivers/staging/rtl8192u/ |
H A D | r8192U_wx.c | 770 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) r8192_wx_set_enc_ext()
|
/linux-4.1.27/fs/ceph/ |
H A D | mds_client.c | 890 size_t const key_len = strlen(metadata[i][0]); create_session_open_msg() local 893 ceph_encode_32(&p, key_len); create_session_open_msg() 894 memcpy(p, metadata[i][0], key_len); create_session_open_msg() 895 p += key_len; create_session_open_msg()
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
H A D | rtw_security.c | 32 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) arcfour_init() argument 53 if (++keyindex >= key_len) arcfour_init()
|
/linux-4.1.27/include/net/bluetooth/ |
H A D | hci.h | 703 __u8 key_len; member in struct:hci_cp_create_phy_link 711 __u8 key_len; member in struct:hci_cp_accept_phy_link
|
/linux-4.1.27/include/uapi/linux/ |
H A D | wireless.h | 819 * key_len = 0 and ext_flags |= IW_ENCODE_EXT_SET_TX_KEY. 839 __u16 key_len; member in struct:iw_encode_ext
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/ |
H A D | hw.c | 2383 rtlpriv->sec.key_len[idx] = 0; rtl88ee_set_key() 2434 if (rtlpriv->sec.key_len[key_index] == 0) { rtl88ee_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ee/ |
H A D | hw.c | 2505 rtlpriv->sec.key_len[idx] = 0; rtl92ee_set_key() 2557 if (rtlpriv->sec.key_len[key_index] == 0) { rtl92ee_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/ |
H A D | hw.c | 2440 rtlpriv->sec.key_len[idx] = 0; rtl92se_set_key() 2491 if (rtlpriv->sec.key_len[key_index] == 0) { rtl92se_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/ |
H A D | hw.c | 2254 rtlpriv->sec.key_len[idx] = 0; rtl8723e_set_key() 2305 if (rtlpriv->sec.key_len[key_index] == 0) { rtl8723e_set_key()
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
H A D | rtw_security.c | 37 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) arcfour_init() argument 57 if (++keyindex >= key_len) arcfour_init()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723be/ |
H A D | hw.c | 2590 rtlpriv->sec.key_len[idx] = 0; rtl8723be_set_key() 2641 if (rtlpriv->sec.key_len[key_index] == 0) { rtl8723be_set_key()
|