/linux-4.1.27/arch/x86/crypto/ |
D | aes_ctrby8_avx-x86_64.S | 158 .macro do_aes b, k, key_len 161 .set klen, \key_len 429 .macro do_aes_load val, key_len 430 do_aes \val, 1, \key_len 433 .macro do_aes_noload val, key_len 434 do_aes \val, 0, \key_len 439 .macro do_aes_ctrmain key_len 441 jb .Ldo_return2\key_len 449 jz .Lmult_of_8_blks\key_len 453 jg .Lgt4\key_len [all …]
|
D | aesni-intel_glue.c | 84 unsigned int key_len); 304 const u8 *in_key, unsigned int key_len) in aes_set_key_common() argument 310 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 311 key_len != AES_KEYSIZE_256) { in aes_set_key_common() 317 err = crypto_aes_expand_key(ctx, in_key, key_len); in aes_set_key_common() 320 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 328 unsigned int key_len) in aes_set_key() argument 330 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); in aes_set_key() 837 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 850 ret = crypto_ablkcipher_setkey(ctr_tfm, key, key_len); in rfc4106_set_hash_subkey() [all …]
|
D | camellia_glue.c | 1250 unsigned int key_len, u32 *flags) in __camellia_setkey() argument 1252 if (key_len != 16 && key_len != 24 && key_len != 32) { in __camellia_setkey() 1257 cctx->key_length = key_len; in __camellia_setkey() 1259 switch (key_len) { in __camellia_setkey() 1276 unsigned int key_len) in camellia_setkey() argument 1278 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, in camellia_setkey()
|
D | camellia_aesni_avx2_glue.c | 199 unsigned int key_len) in camellia_setkey() argument 201 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, in camellia_setkey()
|
D | camellia_aesni_avx_glue.c | 203 unsigned int key_len) in camellia_setkey() argument 205 return __camellia_setkey(crypto_tfm_ctx(tfm), in_key, key_len, in camellia_setkey()
|
/linux-4.1.27/arch/sparc/crypto/ |
D | camellia_glue.c | 29 int key_len; member 33 unsigned int key_len, u64 *decrypt_key); 36 unsigned int key_len) in camellia_set_key() argument 42 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key() 47 ctx->key_len = key_len; in camellia_set_key() 50 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 55 u32 *output, unsigned int key_len); 63 (u32 *) dst, ctx->key_len); in camellia_encrypt() 72 (u32 *) dst, ctx->key_len); in camellia_decrypt() 75 extern void camellia_sparc64_load_keys(const u64 *key, unsigned int key_len); [all …]
|
D | aes_glue.c | 164 unsigned int key_len); 167 unsigned int key_len) in aes_set_key() argument 172 switch (key_len) { in aes_set_key() 193 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); in aes_set_key() 194 ctx->key_length = key_len; in aes_set_key()
|
/linux-4.1.27/arch/s390/crypto/ |
D | aes_s390.c | 43 int key_len; member 63 int key_len; member 72 static int need_fallback(unsigned int key_len) in need_fallback() argument 74 switch (key_len) { in need_fallback() 95 unsigned int key_len) in setkey_fallback_cip() argument 104 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 114 unsigned int key_len) in aes_set_key() argument 120 ret = need_fallback(key_len); in aes_set_key() 126 sctx->key_len = key_len; in aes_set_key() 128 memcpy(sctx->key, in_key, key_len); in aes_set_key() [all …]
|
D | des_s390.c | 36 unsigned int key_len) in des_setkey() argument 48 memcpy(ctx->key, key, key_len); in des_setkey() 240 unsigned int key_len) in des3_setkey() argument 252 memcpy(ctx->key, key, key_len); in des3_setkey()
|
/linux-4.1.27/arch/arm64/crypto/ |
D | aes-ce-cipher.c | 150 unsigned int key_len) in ce_aes_expandkey() argument 159 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 163 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 164 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 165 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 168 memcpy(ctx->key_enc, in_key, key_len); in ce_aes_expandkey() 169 ctx->key_length = key_len; in ce_aes_expandkey() 181 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 186 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 223 unsigned int key_len) in ce_aes_setkey() argument [all …]
|
D | aes-ce-setkey.h | 3 unsigned int key_len); 5 unsigned int key_len);
|
D | aes-glue.c | 83 unsigned int key_len) in xts_set_key() argument 88 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 90 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 91 key_len / 2); in xts_set_key()
|
D | aes-ce-ccm-glue.c | 48 unsigned int key_len) in ccm_setkey() argument 53 ret = ce_aes_expandkey(ctx, in_key, key_len); in ccm_setkey()
|
/linux-4.1.27/crypto/ |
D | aes_generic.c | 1217 unsigned int key_len) in crypto_aes_expand_key() argument 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1223 key_len != AES_KEYSIZE_256) in crypto_aes_expand_key() 1226 ctx->key_length = key_len; in crypto_aes_expand_key() 1228 ctx->key_dec[key_len + 24] = ctx->key_enc[0] = le32_to_cpu(key[0]); in crypto_aes_expand_key() 1229 ctx->key_dec[key_len + 25] = ctx->key_enc[1] = le32_to_cpu(key[1]); in crypto_aes_expand_key() 1230 ctx->key_dec[key_len + 26] = ctx->key_enc[2] = le32_to_cpu(key[2]); in crypto_aes_expand_key() 1231 ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); in crypto_aes_expand_key() 1233 switch (key_len) { in crypto_aes_expand_key() 1258 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in crypto_aes_expand_key() [all …]
|
D | twofish_common.c | 584 unsigned int key_len, u32 *flags) in __twofish_setkey() argument 600 if (key_len % 8) in __twofish_setkey() 627 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 639 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 671 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 703 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 705 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len, in twofish_setkey()
|
D | anubis.c | 46 int key_len; // in bits member 463 unsigned int key_len) in anubis_setkey() argument 472 switch (key_len) { in anubis_setkey() 481 ctx->key_len = key_len * 8; in anubis_setkey() 482 N = ctx->key_len >> 5; in anubis_setkey()
|
D | ablk_helper.c | 38 unsigned int key_len) in ablk_set_key() argument 47 err = crypto_ablkcipher_setkey(child, key, key_len); in ablk_set_key()
|
D | arc4.c | 30 unsigned int key_len) in arc4_set_key() argument 46 if (++k >= key_len) in arc4_set_key()
|
D | cast6_generic.c | 115 unsigned key_len, u32 *flags) in __cast6_setkey() argument 121 if (key_len % 4 != 0) { in __cast6_setkey() 127 memcpy(p_key, in_key, key_len); in __cast6_setkey()
|
D | camellia_generic.c | 982 unsigned int key_len) in camellia_set_key() argument 988 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key() 993 cctx->key_length = key_len; in camellia_set_key() 995 switch (key_len) { in camellia_set_key()
|
D | tea.c | 48 unsigned int key_len) in tea_setkey() argument 121 unsigned int key_len) in xtea_setkey() argument
|
D | cast5_generic.c | 487 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument 496 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() 499 memcpy(p_key, key, key_len); in cast5_setkey()
|
D | khazad.c | 757 unsigned int key_len) in khazad_setkey() argument
|
D | seed.c | 332 unsigned int key_len) in seed_set_key() argument
|
/linux-4.1.27/arch/arm/crypto/ |
D | aes_glue.c | 29 unsigned int key_len) in aes_set_key() argument 33 switch (key_len) { in aes_set_key() 35 key_len = 128; in aes_set_key() 38 key_len = 192; in aes_set_key() 41 key_len = 256; in aes_set_key() 48 if (private_AES_set_encrypt_key(in_key, key_len, &ctx->enc_key) == -1) { in aes_set_key() 54 if (private_AES_set_decrypt_key(in_key, key_len, &ctx->dec_key) == -1) { in aes_set_key()
|
D | aes-ce-glue.c | 64 unsigned int key_len) in ce_aes_expandkey() argument 73 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 77 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 78 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 79 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 82 memcpy(ctx->key_enc, in_key, key_len); in ce_aes_expandkey() 83 ctx->key_length = key_len; in ce_aes_expandkey() 96 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 101 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 131 unsigned int key_len) in ce_aes_setkey() argument [all …]
|
D | aesbs-glue.c | 58 unsigned int key_len) in aesbs_cbc_set_key() argument 61 int bits = key_len * 8; in aesbs_cbc_set_key() 74 unsigned int key_len) in aesbs_ctr_set_key() argument 77 int bits = key_len * 8; in aesbs_ctr_set_key() 88 unsigned int key_len) in aesbs_xts_set_key() argument 91 int bits = key_len * 4; in aesbs_xts_set_key() 99 private_AES_set_encrypt_key(in_key + key_len / 2, bits, &ctx->twkey); in aesbs_xts_set_key()
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 41 unsigned int key_len) in ccp_aes_setkey() argument 47 switch (key_len) { in ccp_aes_setkey() 62 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 64 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 65 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 78 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 105 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 132 ctx->u.aes.key_len = 0; in ccp_aes_cra_init() 156 unsigned int key_len) in ccp_aes_rfc3686_setkey() argument 160 if (key_len < CTR_RFC3686_NONCE_SIZE) in ccp_aes_rfc3686_setkey() [all …]
|
D | ccp-crypto-aes-xts.c | 98 unsigned int key_len) in ccp_aes_xts_setkey() argument 105 switch (key_len) { in ccp_aes_xts_setkey() 107 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 110 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 111 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 114 key_len); in ccp_aes_xts_setkey() 128 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) { in ccp_aes_xts_crypt() 170 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 198 ctx->u.aes.key_len = 0; in ccp_aes_xts_cra_init()
|
D | ccp-crypto-aes-cmac.c | 72 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 153 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 242 unsigned int key_len) in ccp_aes_cmac_setkey() argument 252 switch (key_len) { in ccp_aes_cmac_setkey() 269 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey() 272 ret = crypto_cipher_setkey(ctx->u.aes.tfm_cipher, key, key_len); in ccp_aes_cmac_setkey() 313 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() 314 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey() 315 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_cmac_setkey() 327 ctx->u.aes.key_len = 0; in ccp_aes_cmac_cra_init()
|
D | ccp-crypto-sha.c | 132 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 134 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update() 162 if (ctx->u.sha.key_len) { in ccp_sha_init() 238 unsigned int key_len) in ccp_sha_setkey() argument 250 ctx->u.sha.key_len = 0; in ccp_sha_setkey() 257 if (key_len > block_size) { in ccp_sha_setkey() 263 ret = crypto_shash_digest(sdesc, key, key_len, in ccp_sha_setkey() 270 key_len = digest_size; in ccp_sha_setkey() 272 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey() 283 ctx->u.sha.key_len = key_len; in ccp_sha_setkey() [all …]
|
D | ccp-crypto.h | 82 unsigned int key_len; member 149 unsigned int key_len; member
|
D | ccp-ops.c | 889 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 890 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 891 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 936 dm_offset = CCP_KSB_BYTES - aes->key_len; in ccp_run_aes_cmac_cmd() 937 ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_cmac_cmd() 1042 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmd() 1043 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmd() 1044 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmd() 1089 dm_offset = CCP_KSB_BYTES - aes->key_len; in ccp_run_aes_cmd() 1090 ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_cmd() [all …]
|
/linux-4.1.27/net/wireless/ |
D | lib80211_crypt_wep.c | 36 u8 key_len; member 105 klen = 3 + wep->key_len; in lib80211_wep_build_iv() 154 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 158 klen = 3 + wep->key_len; in lib80211_wep_encrypt() 200 klen = 3 + wep->key_len; in lib80211_wep_decrypt() 203 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_decrypt() 239 wep->key_len = len; in lib80211_wep_set_key() 248 if (len < wep->key_len) in lib80211_wep_get_key() 251 memcpy(key, wep->key, wep->key_len); in lib80211_wep_get_key() 253 return wep->key_len; in lib80211_wep_get_key() [all …]
|
D | util.c | 259 if (params->key_len != WLAN_KEY_LEN_WEP40) in cfg80211_validate_key_settings() 263 if (params->key_len != WLAN_KEY_LEN_TKIP) in cfg80211_validate_key_settings() 267 if (params->key_len != WLAN_KEY_LEN_CCMP) in cfg80211_validate_key_settings() 271 if (params->key_len != WLAN_KEY_LEN_CCMP_256) in cfg80211_validate_key_settings() 275 if (params->key_len != WLAN_KEY_LEN_GCMP) in cfg80211_validate_key_settings() 279 if (params->key_len != WLAN_KEY_LEN_GCMP_256) in cfg80211_validate_key_settings() 283 if (params->key_len != WLAN_KEY_LEN_WEP104) in cfg80211_validate_key_settings() 287 if (params->key_len != WLAN_KEY_LEN_AES_CMAC) in cfg80211_validate_key_settings() 291 if (params->key_len != WLAN_KEY_LEN_BIP_CMAC_256) in cfg80211_validate_key_settings() 295 if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_128) in cfg80211_validate_key_settings() [all …]
|
D | wext-compat.c | 501 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 531 params->key, params->key_len); in __cfg80211_set_encryption() 634 params.key_len = erq->length; in cfg80211_wext_siwencode() 676 if (ext->key_len == 5) in cfg80211_wext_siwencodeext() 678 else if (ext->key_len == 13) in cfg80211_wext_siwencodeext() 722 params.key_len = ext->key_len; in cfg80211_wext_siwencodeext() 768 wdev->wext.keys->params[idx].key_len); in cfg80211_wext_giwencode()
|
D | mlme.c | 205 const u8 *key, int key_len, int key_idx, in cfg80211_mlme_auth() argument 216 .key_len = key_len, in cfg80211_mlme_auth() 224 if (!key || !key_len || key_idx < 0 || key_idx > 4) in cfg80211_mlme_auth()
|
D | sme.c | 169 params->key, params->key_len, in cfg80211_conn_do_work() 998 connect->key_len = connkeys->params[idx].key_len; in cfg80211_connect()
|
D | core.h | 329 const u8 *key, int key_len, int key_idx,
|
D | wext-core.c | 814 if (iwp->length < sizeof(*ee) + ee->key_len) { in ioctl_standard_iw_point()
|
D | nl80211.c | 696 k->p.key_len = nla_len(tb[NL80211_KEY_DATA]); in nl80211_parse_key_new() 732 k->p.key_len = nla_len(info->attrs[NL80211_ATTR_KEY_DATA]); in nl80211_parse_key_old() 860 result->params[parse.idx].key_len = parse.p.key_len; in nl80211_parse_connkeys() 862 memcpy(result->data[parse.idx], parse.p.key, parse.p.key_len); in nl80211_parse_connkeys() 2805 params->key_len, params->key)) || in get_key_callback() 2820 params->key_len, params->key)) || in get_key_callback() 6837 if (!key.p.key || !key.p.key_len) in nl80211_authenticate() 6840 key.p.key_len != WLAN_KEY_LEN_WEP40) && in nl80211_authenticate() 6842 key.p.key_len != WLAN_KEY_LEN_WEP104)) in nl80211_authenticate() 6847 key.p.key_len = 0; in nl80211_authenticate() [all …]
|
/linux-4.1.27/drivers/crypto/nx/ |
D | nx-aes-ctr.c | 36 unsigned int key_len) in ctr_aes_nx_set_key() argument 43 switch (key_len) { in ctr_aes_nx_set_key() 61 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 68 unsigned int key_len) in ctr3686_aes_nx_set_key() argument 72 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 76 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 79 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 81 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key()
|
D | nx-aes-gcm.c | 37 unsigned int key_len) in gcm_aes_nx_set_key() argument 45 switch (key_len) { in gcm_aes_nx_set_key() 66 memcpy(csbcpb->cpb.aes_gcm.key, in_key, key_len); in gcm_aes_nx_set_key() 69 memcpy(csbcpb_aead->cpb.aes_gca.key, in_key, key_len); in gcm_aes_nx_set_key() 76 unsigned int key_len) in gcm4106_aes_nx_set_key() argument 82 if (key_len < 4) in gcm4106_aes_nx_set_key() 85 key_len -= 4; in gcm4106_aes_nx_set_key() 87 rc = gcm_aes_nx_set_key(tfm, in_key, key_len); in gcm4106_aes_nx_set_key() 91 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
|
D | nx-aes-ccm.c | 37 unsigned int key_len) in ccm_aes_nx_set_key() argument 45 switch (key_len) { in ccm_aes_nx_set_key() 56 memcpy(csbcpb->cpb.aes_ccm.key, in_key, key_len); in ccm_aes_nx_set_key() 59 memcpy(csbcpb_aead->cpb.aes_cca.key, in_key, key_len); in ccm_aes_nx_set_key() 67 unsigned int key_len) in ccm4309_aes_nx_set_key() argument 71 if (key_len < 3) in ccm4309_aes_nx_set_key() 74 key_len -= 3; in ccm4309_aes_nx_set_key() 76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key() 78 return ccm_aes_nx_set_key(tfm, in_key, key_len); in ccm4309_aes_nx_set_key()
|
D | nx-aes-cbc.c | 35 unsigned int key_len) in cbc_aes_nx_set_key() argument 42 switch (key_len) { in cbc_aes_nx_set_key() 60 memcpy(csbcpb->cpb.aes_cbc.key, in_key, key_len); in cbc_aes_nx_set_key()
|
D | nx-aes-ecb.c | 35 unsigned int key_len) in ecb_aes_nx_set_key() argument 42 switch (key_len) { in ecb_aes_nx_set_key() 60 memcpy(csbcpb->cpb.aes_ecb.key, in_key, key_len); in ecb_aes_nx_set_key()
|
D | nx-aes-xcbc.c | 42 unsigned int key_len) in nx_xcbc_set_key() argument 47 switch (key_len) { in nx_xcbc_set_key() 55 memcpy(csbcpb->cpb.aes_xcbc.key, in_key, key_len); in nx_xcbc_set_key()
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
D | rtllib_crypt_wep.c | 29 u8 key_len; member 118 klen = 3 + wep->key_len; in prism2_wep_encrypt() 140 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 192 klen = 3 + wep->key_len; in prism2_wep_decrypt() 195 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 232 wep->key_len = len; in prism2_wep_set_key() 242 if (len < wep->key_len) in prism2_wep_get_key() 245 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 247 return wep->key_len; in prism2_wep_get_key() 255 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); in prism2_wep_print_stats()
|
D | rtllib_wx.c | 640 if (ext->key_len > 0 && (*crypt)->ops->set_key && in rtllib_wx_set_encode_ext() 641 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in rtllib_wx_set_encode_ext() 653 sec.key_sizes[idx] = ext->key_len; in rtllib_wx_set_encode_ext() 716 ext->key_len = 0; in rtllib_wx_get_encode_ext() 727 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, in rtllib_wx_get_encode_ext() 730 if (ext->key_len && in rtllib_wx_get_encode_ext()
|
D | rtllib_softmac.c | 3371 param->u.crypt.key_len) { in rtllib_wpa_set_encryption() 3373 param->u.crypt.key_len); in rtllib_wpa_set_encryption() 3444 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key && in rtllib_wpa_set_encryption() 3446 param->u.crypt.key_len, param->u.crypt.seq, in rtllib_wpa_set_encryption() 3465 param->u.crypt.key_len); in rtllib_wpa_set_encryption() 3466 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len; in rtllib_wpa_set_encryption()
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_wep.c | 33 u8 key_len; member 122 klen = 3 + wep->key_len; in prism2_wep_encrypt() 143 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 196 klen = 3 + wep->key_len; in prism2_wep_decrypt() 199 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 239 wep->key_len = len; in prism2_wep_set_key() 249 if (len < wep->key_len) in prism2_wep_get_key() 252 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 254 return wep->key_len; in prism2_wep_get_key() 263 wep->key_idx, wep->key_len); in prism2_wep_print_stats()
|
D | ieee80211_wx.c | 632 if (ext->key_len > 0 && (*crypt)->ops->set_key && in ieee80211_wx_set_encode_ext() 633 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in ieee80211_wx_set_encode_ext() 650 sec.key_sizes[idx] = ext->key_len; in ieee80211_wx_set_encode_ext() 715 ext->key_len = 0; in ieee80211_wx_get_encode_ext() 726 ext->key_len = crypt->ops->get_key(ext->key, SCM_KEY_LEN, NULL, crypt->priv); in ieee80211_wx_get_encode_ext() 728 if (ext->key_len && in ieee80211_wx_get_encode_ext()
|
D | ieee80211_softmac.c | 2974 param->u.crypt.key_len) { in ieee80211_wpa_set_encryption() 2976 param->u.crypt.key_len); in ieee80211_wpa_set_encryption() 3052 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key && in ieee80211_wpa_set_encryption() 3054 param->u.crypt.key_len, param->u.crypt.seq, in ieee80211_wpa_set_encryption() 3073 param->u.crypt.key_len); in ieee80211_wpa_set_encryption() 3074 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len; in ieee80211_wpa_set_encryption()
|
/linux-4.1.27/include/linux/ |
D | rhashtable.h | 117 size_t key_len; member 146 unsigned int key_len; member 217 if (!__builtin_constant_p(params.key_len)) in rht_key_hashfn() 218 hash = ht->p.hashfn(key, ht->key_len, tbl->hash_rnd); in rht_key_hashfn() 219 else if (params.key_len) { in rht_key_hashfn() 220 unsigned int key_len = params.key_len; in rht_key_hashfn() local 223 hash = params.hashfn(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 224 else if (key_len & (sizeof(u32) - 1)) in rht_key_hashfn() 225 hash = jhash(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 227 hash = jhash2(key, key_len / sizeof(u32), in rht_key_hashfn() [all …]
|
D | ccp.h | 154 u32 key_len; /* In bytes */ member 211 u32 key_len; /* In bytes */ member
|
/linux-4.1.27/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 77 unsigned int key_len); 93 unsigned int key_len) in ppc_aes_setkey() argument 97 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 98 key_len != AES_KEYSIZE_192 && in ppc_aes_setkey() 99 key_len != AES_KEYSIZE_256) { in ppc_aes_setkey() 104 switch (key_len) { in ppc_aes_setkey() 119 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 125 unsigned int key_len) in ppc_xts_setkey() argument 129 key_len >>= 1; in ppc_xts_setkey() 131 if (key_len != AES_KEYSIZE_128 && in ppc_xts_setkey() [all …]
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/ |
D | linux-crypto.c | 44 unsigned int key_len) in cfs_crypto_hash_alloc() argument 75 err = crypto_hash_setkey(desc->tfm, key, key_len); in cfs_crypto_hash_alloc() 97 unsigned char *key, unsigned int key_len, in cfs_crypto_hash_digest() argument 108 err = cfs_crypto_hash_alloc(alg_id, &type, &hdesc, key, key_len); in cfs_crypto_hash_digest() 129 unsigned char *key, unsigned int key_len) in cfs_crypto_hash_init() argument 140 err = cfs_crypto_hash_alloc(alg_id, &type, hdesc, key, key_len); in cfs_crypto_hash_init()
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key() argument 37 if (key_len) { in orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key() 51 priv->keys[index].key_len = key_len; in orinoco_set_key() 54 if (key_len) in orinoco_set_key() 55 memcpy((void *)priv->keys[index].key, key, key_len); in orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key() 82 priv->keys[index].key_len = 0; in orinoco_set_key() 287 if (priv->keys[index].key_len == 0) { in orinoco_ioctl_setiwencode() 354 erq->length = priv->keys[index].key_len; in orinoco_ioctl_getiwencode() [all …]
|
D | hw.c | 832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys() 862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys() 880 priv->keys[i].key_len); in __orinoco_hw_setup_wepkeys()
|
/linux-4.1.27/fs/ntfs/ |
D | index.c | 119 int ntfs_index_lookup(const void *key, const int key_len, in ntfs_index_lookup() argument 143 BUG_ON(key_len <= 0); in ntfs_index_lookup() 206 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 207 &ie->key, key_len)) { in ntfs_index_lookup() 228 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 376 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 377 &ie->key, key_len)) { in ntfs_index_lookup() 391 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
D | index.h | 91 extern int ntfs_index_lookup(const void *key, const int key_len,
|
/linux-4.1.27/fs/cifs/ |
D | cache.c | 71 uint16_t key_len = sizeof(struct cifs_server_key); in cifs_server_get_key() local 73 memset(key, 0, key_len); in cifs_server_get_key() 84 key_len += sizeof(key->addr[0].ipv4_addr); in cifs_server_get_key() 91 key_len += sizeof(key->addr[0].ipv6_addr); in cifs_server_get_key() 96 key_len = 0; in cifs_server_get_key() 100 return key_len; in cifs_server_get_key()
|
/linux-4.1.27/include/crypto/ |
D | twofish.h | 21 unsigned int key_len, u32 *flags); 22 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
D | aes.h | 36 unsigned int key_len); 38 unsigned int key_len);
|
D | blowfish.h | 21 unsigned int key_len);
|
D | ablk_helper.h | 17 unsigned int key_len);
|
/linux-4.1.27/drivers/crypto/ |
D | ixp4xx_crypto.c | 590 int init_len, u32 ctx_addr, const u8 *key, int key_len) in register_chain_var() argument 615 memcpy(pad, key, key_len); in register_chain_var() 616 memset(pad + key_len, 0, HMAC_PAD_BLOCKLEN - key_len); in register_chain_var() 646 const u8 *key, int key_len, unsigned digest_len) in setup_auth() argument 685 init_len, npe_ctx_addr, key, key_len); in setup_auth() 689 init_len, npe_ctx_addr, key, key_len); in setup_auth() 721 const u8 *key, int key_len) in setup_cipher() argument 740 switch (key_len) { in setup_cipher() 768 memcpy(cinfo, key, key_len); in setup_cipher() 770 if (key_len < DES3_EDE_KEY_SIZE && !(cipher_cfg & MOD_AES)) { in setup_cipher() [all …]
|
D | padlock-aes.c | 74 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument 79 if (key_len == 16) in aes_hw_extkey_available() 105 unsigned int key_len) in aes_set_key() argument 113 if (key_len % 8) { in aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 140 if (aes_hw_extkey_available(key_len)) in aes_set_key() 147 if (crypto_aes_expand_key(&gen_aes, in_key, key_len)) { in aes_set_key()
|
D | mv_cesa.c | 108 int key_len; member 177 crypto_aes_expand_key(&gen_aes_key, ctx->aes_enc_key, ctx->key_len); in compute_aes_dec_key() 179 key_pos = ctx->key_len + 24; in compute_aes_dec_key() 181 switch (ctx->key_len) { in compute_aes_dec_key() 209 ctx->key_len = len; in mv_setkey_aes() 283 switch (ctx->key_len) { in mv_process_current_q()
|
D | picoxcell_crypto.c | 160 u8 key_len; member 222 size_t key_len, const u8 *iv, size_t iv_len) in spacc_cipher_write_ctx() argument 227 memcpy_toio32(key_ptr, key, key_len / 4); in spacc_cipher_write_ctx() 834 ctx->key_len = len; in spacc_des_setkey() 878 ctx->key_len = len; in spacc_aes_setkey() 904 ctx->key_len = len; in spacc_kasumi_f8_setkey() 921 ctx->key_len != AES_KEYSIZE_128 && in spacc_ablk_need_fallback() 922 ctx->key_len != AES_KEYSIZE_256; in spacc_ablk_need_fallback() 953 ctx->key_len, ablk_req->info, alg->cra_ablkcipher.ivsize, in spacc_ablk_submit()
|
D | mxs-dcp.c | 88 unsigned int key_len; member 278 memcpy(key, actx->key, actx->key_len); in mxs_dcp_aes_block_crypt() 403 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 450 actx->key_len = len; in mxs_dcp_aes_setkey()
|
D | n2_core.c | 647 int key_len; member 738 ctx->key_len = keylen; in n2_aes_setkey() 765 ctx->key_len = keylen; in n2_des_setkey() 783 ctx->key_len = keylen; in n2_3des_setkey()
|
/linux-4.1.27/fs/hfs/ |
D | brec.c | 68 int size, key_len, rec; in hfs_brec_insert() local 83 key_len = (fd->search_key->key_len | 1) + 1; in hfs_brec_insert() 87 size = key_len + entry_len; in hfs_brec_insert() 130 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 131 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 164 key_len = fd->search_key->key_len + 1; in hfs_brec_insert() 166 fd->search_key->key_len = tree->max_key_len; in hfs_brec_insert() 167 key_len = tree->max_key_len + 1; in hfs_brec_insert()
|
D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member 158 u8 key_len; /* number of bytes in the key */ member 165 u8 key_len; /* number of bytes in the key */ member
|
D | bnode.c | 48 int key_len; in hfs_bnode_read_key() local 53 key_len = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_read_key() 55 key_len = tree->max_key_len + 1; in hfs_bnode_read_key() 57 hfs_bnode_read(node, key, off, key_len); in hfs_bnode_read_key()
|
D | catalog.c | 29 key->key_len = 6 + key->cat.CName.len; in hfs_cat_build_key() 32 key->key_len = 6; in hfs_cat_build_key()
|
D | extent.c | 23 key->key_len = 7; in hfs_ext_build_key()
|
/linux-4.1.27/fs/hfsplus/ |
D | brec.c | 66 int size, key_len, rec; in hfs_brec_insert() local 81 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 85 size = key_len + entry_len; in hfs_brec_insert() 130 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 131 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 165 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 167 fd->search_key->key_len = in hfs_brec_insert() 169 key_len = tree->max_key_len + 2; in hfs_brec_insert()
|
D | hfsplus_raw.h | 213 __be16 key_len; member 339 __be16 key_len; member 357 __be16 key_len; member 401 __be16 key_len; member
|
D | xattr.c | 693 u16 key_len = 0; in hfsplus_listxattr() local 735 key_len = hfs_bnode_read_u16(fd.bnode, fd.keyoffset); in hfsplus_listxattr() 736 if (key_len == 0 || key_len > fd.tree->max_key_len) { in hfsplus_listxattr() 737 pr_err("invalid xattr key length: %d\n", key_len); in hfsplus_listxattr() 743 fd.keyoffset, key_len + sizeof(key_len)); in hfsplus_listxattr()
|
D | catalog.c | 54 key->key_len = cpu_to_be16(6 + 2 * len); in hfsplus_cat_build_key() 64 key->key_len = cpu_to_be16(6); in hfsplus_cat_build_key_with_cnid() 77 key->key_len = cpu_to_be16(6 + ustrlen); in hfsplus_cat_build_key_uni() 352 fd.search_key->key_len = cpu_to_be16(6 + len); in hfsplus_delete_cat()
|
D | bnode.c | 61 int key_len; in hfs_bnode_read_key() local 67 key_len = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_read_key() 69 key_len = tree->max_key_len + 2; in hfs_bnode_read_key() 71 hfs_bnode_read(node, key, off, key_len); in hfs_bnode_read_key()
|
D | attributes.c | 75 key->key_len = in hfsplus_attr_build_key()
|
D | extents.c | 43 key->key_len = cpu_to_be16(HFSPLUS_EXT_KEYLEN - 2); in hfsplus_ext_build_key()
|
/linux-4.1.27/drivers/net/wireless/mwifiex/ |
D | sta_cmd.c | 517 key_param_set->key_len = in mwifiex_set_keyparamset_wep() 572 km->key_param_set.key_params.cmac_aes.key_len = in mwifiex_set_aes_key_v2() 573 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 575 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 583 km->key_param_set.key_params.aes.key_len = in mwifiex_set_aes_key_v2() 584 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 586 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 669 if (enc_key->key_len <= WLAN_KEY_LEN_WEP104) { in mwifiex_cmd_802_11_key_material_v2() 697 km->key_param_set.key_params.wep.key_len = in mwifiex_cmd_802_11_key_material_v2() 698 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() [all …]
|
D | sta_ioctl.c | 874 } else if (!encrypt_key->key_len) { in mwifiex_sec_ioctl_set_wep_key() 886 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 897 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wep_key() 899 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 955 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { in mwifiex_sec_ioctl_set_wpa_key() 978 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wpa_key() 979 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, in mwifiex_sec_ioctl_set_wpa_key() 980 sizeof(ibss_key->key_param_set.key_len)); in mwifiex_sec_ioctl_set_wpa_key() 1018 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP104) in mwifiex_sec_ioctl_encrypt_key() 1055 const u8 *key, int key_len, u8 key_index, in mwifiex_set_encode() argument [all …]
|
D | sta_cmdresp.c | 598 priv->aes_key.key_param_set.key_len = key->key_param_set.key_len; in mwifiex_ret_802_11_key_material_v1() 600 le16_to_cpu(priv->aes_key.key_param_set.key_len)); in mwifiex_ret_802_11_key_material_v1() 631 priv->aes_key_v2.key_param_set.key_params.aes.key_len = in mwifiex_ret_802_11_key_material_v2() 632 key_v2->key_param_set.key_params.aes.key_len; in mwifiex_ret_802_11_key_material_v2() 633 len = priv->aes_key_v2.key_param_set.key_params.aes.key_len; in mwifiex_ret_802_11_key_material_v2()
|
D | fw.h | 775 __le16 key_len; member 787 __le16 key_len; member 793 __le16 key_len; member 799 __le16 key_len; member 805 __le16 key_len; member 811 __le16 key_len; member
|
D | ioctl.h | 244 u32 key_len; member
|
D | cfg80211.c | 396 if (params->key && params->key_len) { in mwifiex_cfg80211_add_key() 400 params->key_len); in mwifiex_cfg80211_add_key() 402 wep_key->key_length = params->key_len; in mwifiex_cfg80211_add_key() 408 if (mwifiex_set_encode(priv, params, params->key, params->key_len, in mwifiex_cfg80211_add_key() 1964 " with key len %d\n", sme->key_len); in mwifiex_cfg80211_assoc() 1967 sme->key_len, sme->key_idx, in mwifiex_cfg80211_assoc()
|
/linux-4.1.27/drivers/staging/skein/ |
D | skein_api.c | 84 int skein_mac_init(struct skein_ctx *ctx, const u8 *key, size_t key_len, in skein_mac_init() argument 103 (const u8 *)key, key_len); in skein_mac_init() 109 (const u8 *)key, key_len); in skein_mac_init() 114 (const u8 *)key, key_len); in skein_mac_init()
|
D | skein_api.h | 176 int skein_mac_init(struct skein_ctx *ctx, const u8 *key, size_t key_len,
|
/linux-4.1.27/drivers/net/wireless/ti/wl18xx/ |
D | cmd.c | 141 u8 key_len, u8 *key) in wl18xx_cmd_smart_config_set_group_key() argument 149 if (key_len != sizeof(cmd->key)) { in wl18xx_cmd_smart_config_set_group_key() 150 wl1271_error("invalid group key size: %d", key_len); in wl18xx_cmd_smart_config_set_group_key() 161 memcpy(cmd->key, key, key_len); in wl18xx_cmd_smart_config_set_group_key()
|
D | cmd.h | 92 u8 key_len, u8 *key);
|
/linux-4.1.27/drivers/s390/crypto/ |
D | zcrypt_cca_key.h | 290 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local 297 key_len = 3*long_len + 2*short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key() 298 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key() 315 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key() 336 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
|
/linux-4.1.27/security/keys/ |
D | trusted.c | 672 p->key[p->key_len] = p->migratable; in key_seal() 675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 698 o->blobauth, p->key, &p->key_len); in key_unseal() 703 p->migratable = p->key[--p->key_len]; in key_unseal() 826 p->key_len = keylen; in datablob_parse() 907 size_t key_len; in trusted_instantiate() local 947 key_len = payload->key_len; in trusted_instantiate() 948 ret = tpm_get_random(TPM_ANY_NUM, payload->key, key_len); in trusted_instantiate() 949 if (ret != key_len) { in trusted_instantiate() 978 memset(p->key, 0, p->key_len); in trusted_rcu_free() [all …]
|
D | trusted.h | 64 pr_info("trusted_key: key_len %d\n", p->key_len); in dump_payload() 66 16, 1, p->key, p->key_len, 0); in dump_payload()
|
/linux-4.1.27/net/ceph/ |
D | crypto.c | 163 static int ceph_aes_encrypt(const void *key, int key_len, in ceph_aes_encrypt() argument 191 crypto_blkcipher_setkey((void *)tfm, key, key_len); in ceph_aes_encrypt() 222 static int ceph_aes_encrypt2(const void *key, int key_len, void *dst, in ceph_aes_encrypt2() argument 252 crypto_blkcipher_setkey((void *)tfm, key, key_len); in ceph_aes_encrypt2() 285 static int ceph_aes_decrypt(const void *key, int key_len, in ceph_aes_decrypt() argument 309 crypto_blkcipher_setkey((void *)tfm, key, key_len); in ceph_aes_decrypt() 349 static int ceph_aes_decrypt2(const void *key, int key_len, in ceph_aes_decrypt2() argument 375 crypto_blkcipher_setkey((void *)tfm, key, key_len); in ceph_aes_decrypt2()
|
/linux-4.1.27/drivers/staging/lustre/include/linux/libcfs/ |
D | libcfs_crypto.h | 131 unsigned char *key, unsigned int key_len, 147 unsigned char *key, unsigned int key_len);
|
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/ |
D | ioctl_cfg80211.c | 457 memcpy(&psetkeyparm->key, parms->key, parms->key_len); in set_group_key() 475 int key_len; in rtw_cfg80211_ap_set_encryption() local 493 key_len = keyparms->key_len; in rtw_cfg80211_ap_set_encryption() 500 key_index, key_len); in rtw_cfg80211_ap_set_encryption() 515 keyparms->key, key_len); in rtw_cfg80211_ap_set_encryption() 517 psecuritypriv->wep_key[key_index].keylen = key_len; in rtw_cfg80211_ap_set_encryption() 532 keyparms->key, key_len); in rtw_cfg80211_ap_set_encryption() 546 (key_len > 16 ? 16 : key_len)); in rtw_cfg80211_ap_set_encryption() 568 (key_len > 16 ? 16 : key_len)); in rtw_cfg80211_ap_set_encryption() 606 keyparms->key, (key_len > 16 ? 16 : key_len)); in rtw_cfg80211_ap_set_encryption() [all …]
|
/linux-4.1.27/net/mac80211/ |
D | aes_gmac.c | 62 size_t key_len) in ieee80211_aes_gmac_key_setup() argument 71 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup()
|
D | aes_gcm.c | 73 size_t key_len) in ieee80211_aes_gcm_key_setup_encrypt() argument 82 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gcm_key_setup_encrypt()
|
D | aes_ccm.c | 77 size_t key_len, in ieee80211_aes_key_setup_encrypt() argument 87 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_key_setup_encrypt()
|
D | aes_gmac.h | 15 size_t key_len);
|
D | aes_cmac.h | 15 size_t key_len);
|
D | aes_gcm.h | 19 size_t key_len);
|
D | aes_cmac.c | 132 size_t key_len) in ieee80211_aes_cmac_key_setup() argument 138 crypto_cipher_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup()
|
D | aes_ccm.h | 16 size_t key_len,
|
D | key.c | 374 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 385 key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL); in ieee80211_key_alloc() 398 key->conf.keylen = key_len; in ieee80211_key_alloc() 432 key_data, key_len, IEEE80211_CCMP_MIC_LEN); in ieee80211_key_alloc() 450 key_data, key_len, IEEE80211_CCMP_256_MIC_LEN); in ieee80211_key_alloc() 473 ieee80211_aes_cmac_key_setup(key_data, key_len); in ieee80211_key_alloc() 492 ieee80211_aes_gmac_key_setup(key_data, key_len); in ieee80211_key_alloc() 511 key_len); in ieee80211_key_alloc() 532 memcpy(key->conf.key, key_data, key_len); in ieee80211_key_alloc()
|
D | key.h | 142 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
D | ieee80211_i.h | 377 u8 key_len, key_idx; member 1930 const u8 *da, const u8 *key, u8 key_len, u8 key_idx,
|
D | mlme.c | 2519 auth_data->key, auth_data->key_len, in ieee80211_auth_challenge() 4517 if (req->key && req->key_len) { in ieee80211_mgd_auth() 4518 auth_data->key_len = req->key_len; in ieee80211_mgd_auth() 4520 memcpy(auth_data->key, req->key, req->key_len); in ieee80211_mgd_auth()
|
/linux-4.1.27/net/core/ |
D | neighbour.c | 420 int key_len = tbl->key_len; in neigh_lookup_nodev() local 433 if (!memcmp(n->primary_key, pkey, key_len) && in neigh_lookup_nodev() 451 int key_len = tbl->key_len; in __neigh_create() local 461 memcpy(n->primary_key, pkey, key_len); in __neigh_create() 507 if (dev == n1->dev && !memcmp(n1->primary_key, pkey, key_len)) { in __neigh_create() 535 static u32 pneigh_hash(const void *pkey, int key_len) in pneigh_hash() argument 537 u32 hash_val = *(u32 *)(pkey + key_len - 4); in pneigh_hash() 548 int key_len, in __pneigh_lookup_1() argument 552 if (!memcmp(n->key, pkey, key_len) && in __pneigh_lookup_1() 564 int key_len = tbl->key_len; in __pneigh_lookup() local [all …]
|
/linux-4.1.27/drivers/staging/rtl8188eu/os_dep/ |
D | ioctl_linux.c | 366 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { in wpa_set_encryption() 392 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption() 458 …1x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)… in wpa_set_encryption() 470 ….crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)… in wpa_set_encryption() 1900 param_len = sizeof(struct ieee_param) + pext->key_len; in rtw_wx_set_enc_ext() 1947 if (pext->key_len) { in rtw_wx_set_enc_ext() 1948 param->u.crypt.key_len = pext->key_len; in rtw_wx_set_enc_ext() 1949 memcpy(param->u.crypt.key, pext + 1, pext->key_len); in rtw_wx_set_enc_ext() 2241 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { in rtw_set_encryption() 2269 wep_key_len = param->u.crypt.key_len; in rtw_set_encryption() [all …]
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
D | cfg.c | 1008 const u8 *key, u16 key_len) in lbs_set_key_material() argument 1037 cmd.param.keylen = cpu_to_le16(key_len); in lbs_set_key_material() 1038 if (key && key_len) in lbs_set_key_material() 1039 memcpy(cmd.param.key, key, key_len); in lbs_set_key_material() 1370 sme->key_idx, sme->key_len); in lbs_cfg_connect() 1383 priv->wep_key_len[sme->key_idx] = sme->key_len; in lbs_cfg_connect() 1384 memcpy(priv->wep_key[sme->key_idx], sme->key, sme->key_len); in lbs_cfg_connect() 1523 idx, params->key_len); in lbs_cfg_add_key() 1524 if (params->key_len) in lbs_cfg_add_key() 1526 params->key, params->key_len); in lbs_cfg_add_key() [all …]
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
D | libipw_wx.c | 636 if (ext->key_len > 0 && (*crypt)->ops->set_key && in libipw_wx_set_encodeext() 637 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in libipw_wx_set_encodeext() 652 memcpy(sec.keys[idx], ext->key, ext->key_len); in libipw_wx_set_encodeext() 653 sec.key_sizes[idx] = ext->key_len; in libipw_wx_set_encodeext() 710 ext->key_len = 0; in libipw_wx_get_encodeext() 722 ext->key_len = sec->key_sizes[idx]; in libipw_wx_get_encodeext() 723 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext() 725 if (ext->key_len && in libipw_wx_get_encodeext()
|
/linux-4.1.27/fs/ubifs/ |
D | misc.h | 203 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len) * child_cnt; in ubifs_idx_node_sz() 218 (UBIFS_BRANCH_SZ + c->key_len) * bnum); in ubifs_idx_branch()
|
D | sb.c | 89 c->key_len = UBIFS_SK_LEN; in create_default_filesystem() 595 c->key_len = UBIFS_SK_LEN; in ubifs_read_superblock()
|
D | ubifs.h | 1321 int key_len; member
|
/linux-4.1.27/include/keys/ |
D | trusted-type.h | 22 unsigned int key_len; member
|
/linux-4.1.27/drivers/net/ethernet/toshiba/ |
D | ps3_gelic_wireless.c | 1077 wl->key_len[key_index] = enc->length; in gelic_wl_set_encode() 1129 if (enc->length < wl->key_len[key_index]) { in gelic_wl_get_encode() 1133 enc->length = wl->key_len[key_index]; in gelic_wl_get_encode() 1134 memcpy(extra, wl->key[key_index], wl->key_len[key_index]); in gelic_wl_get_encode() 1223 pr_debug("%s: ext_key_len=%x\n", __func__, ext->key_len); in gelic_wl_set_encodeext() 1258 if (IW_ENCODING_TOKEN_MAX < ext->key_len) { in gelic_wl_set_encodeext() 1260 ext->key_len); in gelic_wl_set_encodeext() 1265 wl->key_len[key_index] = ext->key_len; in gelic_wl_set_encodeext() 1267 memcpy(wl->key[key_index], ext->key, ext->key_len); in gelic_wl_set_encodeext() 1272 if (ext->key_len != WPA_PSK_LEN) { in gelic_wl_set_encodeext() [all …]
|
D | ps3_gelic_wireless.h | 279 unsigned int key_len[GELIC_WEP_KEYS]; member
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | masterkey_trusted.c | 44 *master_keylen = tpayload->key_len; in request_trusted_key()
|
D | encrypted.c | 405 unsigned int key_len, const u8 *iv, in init_blkcipher_desc() argument 418 ret = crypto_blkcipher_setkey(desc->tfm, key, key_len); in init_blkcipher_desc()
|
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/ |
D | cfg80211.c | 565 if ((sme->key_len) && in ath6kl_cfg80211_connect() 578 key->key_len = sme->key_len; in ath6kl_cfg80211_connect() 579 memcpy(key->key, sme->key, key->key_len); in ath6kl_cfg80211_connect() 586 key->key_len, in ath6kl_cfg80211_connect() 1131 if (params->key_len != WMI_KRK_LEN) in ath6kl_cfg80211_add_key() 1158 if (params->key_len > WLAN_MAX_KEY_LEN || in ath6kl_cfg80211_add_key() 1162 key->key_len = params->key_len; in ath6kl_cfg80211_add_key() 1163 memcpy(key->key, params->key, key->key_len); in ath6kl_cfg80211_add_key() 1196 __func__, key_index, key->key_len, key_type, in ath6kl_cfg80211_add_key() 1205 ar->ap_mode_bkey.key_len = key->key_len; in ath6kl_cfg80211_add_key() [all …]
|
D | core.h | 375 u8 key_len; member 383 u8 key_len; member 550 u8 key_len; member
|
D | main.c | 357 if (vif->wep_key_list[index].key_len) { in ath6kl_install_static_wep_keys() 366 vif->wep_key_list[index].key_len, in ath6kl_install_static_wep_keys() 404 GROUP_USAGE, ik->key_len, key_rsc, ATH6KL_KEY_SEQ_LEN, in ath6kl_connect_ap_mode_bss()
|
D | wmi.c | 2300 u8 key_usage, u8 key_len, in ath6kl_wmi_addkey_cmd() argument 2312 key_index, key_type, key_usage, key_len, key_op_ctrl); in ath6kl_wmi_addkey_cmd() 2314 if ((key_index > WMI_MAX_KEY_INDEX) || (key_len > WMI_MAX_KEY_LEN) || in ath6kl_wmi_addkey_cmd() 2329 cmd->key_len = key_len; in ath6kl_wmi_addkey_cmd() 2330 memcpy(cmd->key, key_material, key_len); in ath6kl_wmi_addkey_cmd()
|
D | wmi.h | 787 u8 key_len; member 2614 u8 key_usage, u8 key_len,
|
/linux-4.1.27/lib/ |
D | rhashtable.c | 725 if ((!params->key_len && !params->obj_hashfn) || in rhashtable_init() 774 ht->key_len = ht->p.key_len; in rhashtable_init() 778 if (!(ht->key_len & (sizeof(u32) - 1))) { in rhashtable_init() 779 ht->key_len /= sizeof(u32); in rhashtable_init()
|
D | test_rhashtable.c | 45 .key_len = sizeof(int),
|
/linux-4.1.27/drivers/net/wireless/ |
D | rndis_wlan.c | 1345 static int add_wep_key(struct usbnet *usbdev, const u8 *key, int key_len, in add_wep_key() argument 1354 __func__, index, key_len); in add_wep_key() 1359 if (key_len == 5) in add_wep_key() 1361 else if (key_len == 13) in add_wep_key() 1369 ndis_key.length = cpu_to_le32(key_len); in add_wep_key() 1371 memcpy(&ndis_key.material, key, key_len); in add_wep_key() 1391 priv->encr_keys[index].len = key_len; in add_wep_key() 1393 memcpy(&priv->encr_keys[index].material, key, key_len); in add_wep_key() 1399 static int add_wpa_key(struct usbnet *usbdev, const u8 *key, int key_len, in add_wpa_key() argument 1413 if (key_len > sizeof(ndis_key.material) || key_len < 0) { in add_wpa_key() [all …]
|
D | atmel.c | 1854 int idx, key_len, alg = ext->alg, set_key = 1; in atmel_set_encodeext() local 1870 set_key = ext->key_len > 0 ? 1 : 0; in atmel_set_encodeext() 1882 if (ext->key_len > 5) { in atmel_set_encodeext() 1886 } else if (ext->key_len > 0) { in atmel_set_encodeext() 1895 key_len = min ((int)ext->key_len, priv->wep_key_len[idx]); in atmel_set_encodeext() 1896 memcpy(priv->wep_keys[idx], ext->key, key_len); in atmel_set_encodeext() 1933 ext->key_len = 0; in atmel_get_encodeext() 1941 ext->key_len = priv->wep_key_len[idx]; in atmel_get_encodeext() 1942 memcpy(ext->key, priv->wep_keys[idx], ext->key_len); in atmel_get_encodeext()
|
D | airo.c | 1299 static void age_mic_context(miccntx *cur, miccntx *old, u8 *key, int key_len, in age_mic_context() argument 1305 if (cur->valid && (memcmp(cur->key, key, key_len) == 0)) in age_mic_context() 1312 memcpy(cur->key, key, key_len); in age_mic_context() 1319 emmh32_setseed(&cur->seed, key, key_len, tfm); in age_mic_context() 6474 int idx, key_len, alg = ext->alg, set_key = 1, rc; in airo_set_encodeext() local 6508 set_key = ext->key_len > 0 ? 1 : 0; in airo_set_encodeext() 6519 if (ext->key_len > MIN_KEY_SIZE) { in airo_set_encodeext() 6521 } else if (ext->key_len > 0) { in airo_set_encodeext() 6526 key_len = min (ext->key_len, key.len); in airo_set_encodeext() 6527 memcpy(key.key, ext->key, key_len); in airo_set_encodeext() [all …]
|
D | at76c50x-usb.c | 968 int key_len; in at76_dump_mib_mac_wep() local 991 key_len = (m->encryption_level == 1) ? in at76_dump_mib_mac_wep() 997 key_len, m->wep_default_keyvalue[i]); in at76_dump_mib_mac_wep()
|
/linux-4.1.27/fs/nfsd/ |
D | nfsfh.h | 138 static inline int key_len(int type) in key_len() function 203 if (memcmp(fh1->fh_fsid, fh2->fh_fsid, key_len(fh1->fh_fsid_type)) != 0) in fh_fsid_match()
|
D | export.c | 62 qword_addhex(bpp, blen, (char*)ek->ek_fsid, key_len(ek->ek_fsidtype)); in expkey_request() 108 if (key_len(fsidtype)==0) /* invalid type */ in expkey_parse() 113 if (len != key_len(fsidtype)) in expkey_parse() 179 for (i=0; i < key_len(ek->ek_fsidtype)/4; i++) in expkey_show() 197 memcmp(orig->ek_fsid, new->ek_fsid, key_len(orig->ek_fsidtype)) != 0) in expkey_match() 253 int len = key_len(item->ek_fsidtype); in svc_expkey_hash() 814 memcpy(key.ek_fsid, fsidv, key_len(fsid_type)); in exp_find_key()
|
D | nfsfh.c | 158 len = key_len(fh->fh_fsid_type) / 4; in nfsd_set_fh_dentry() 163 len = key_len(FSID_ENCODE_DEV)/4; in nfsd_set_fh_dentry() 567 key_len(fhp->fh_handle.fh_fsid_type) + 4; in fh_compose()
|
D | nfs4layouts.c | 49 size_t fsid_len = key_len(fh->fh_fsid_type); in nfsd4_alloc_devid_map() 69 key_len(old->fsid_type))) in nfsd4_alloc_devid_map()
|
/linux-4.1.27/net/ipv4/ |
D | cipso_ipv4.c | 79 size_t key_len; member 233 static u32 cipso_v4_map_cache_hash(const unsigned char *key, u32 key_len) in cipso_v4_map_cache_hash() argument 235 return jhash(key, key_len, 0); in cipso_v4_map_cache_hash() 319 u32 key_len, in cipso_v4_cache_check() argument 330 hash = cipso_v4_map_cache_hash(key, key_len); in cipso_v4_cache_check() 335 entry->key_len == key_len && in cipso_v4_cache_check() 336 memcmp(entry->key, key, key_len) == 0) { in cipso_v4_cache_check() 403 entry->key_len = cipso_ptr_len; in cipso_v4_cache_add()
|
D | arp.c | 155 .key_len = 4,
|
/linux-4.1.27/net/sctp/ |
D | auth.c | 73 static struct sctp_auth_bytes *sctp_auth_create_key(__u32 key_len, gfp_t gfp) in sctp_auth_create_key() argument 78 if (key_len > (INT_MAX - sizeof(struct sctp_auth_bytes))) in sctp_auth_create_key() 82 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp); in sctp_auth_create_key() 86 key->len = key_len; in sctp_auth_create_key()
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
D | rt2x00mac.c | 436 static void memcpy_tkip(struct rt2x00lib_crypto *crypto, u8 *key, u8 key_len) in memcpy_tkip() argument 438 if (key_len > NL80211_TKIP_DATA_OFFSET_ENCR_KEY) in memcpy_tkip() 443 if (key_len > NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY) in memcpy_tkip() 448 if (key_len > NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY) in memcpy_tkip()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
D | hw_ops.h | 307 u8 key_len, u8 *key) in wlcore_smart_config_set_group_key() argument 312 return wl->ops->smart_config_set_group_key(wl, group_id, key_len, key); in wlcore_smart_config_set_group_key()
|
D | wlcore.h | 125 u8 key_len, u8 *key);
|
/linux-4.1.27/net/openvswitch/ |
D | flow_netlink.c | 1821 size_t key_len; in validate_set() local 1827 key_len = nla_len(ovs_key); in validate_set() 1829 key_len /= 2; in validate_set() 1832 (ovs_key_lens[key_type].len != key_len && in validate_set() 1836 if (masked && !validate_masked(nla_data(ovs_key), key_len)) in validate_set() 1946 int start, len = key_len * 2; in validate_set() 1961 memcpy(nla_data(at), nla_data(ovs_key), key_len); /* Key. */ in validate_set() 1962 memset(nla_data(at) + key_len, 0xff, key_len); /* Mask. */ in validate_set() 1965 struct ovs_key_ipv6 *mask = nla_data(at) + key_len; in validate_set() 2259 size_t key_len = nla_len(ovs_key) / 2; in masked_set_action_to_set_action_attr() local [all …]
|
/linux-4.1.27/kernel/bpf/ |
D | hashtab.c | 98 static inline u32 htab_map_hash(const void *key, u32 key_len) in htab_map_hash() argument 100 return jhash(key, key_len, 0); in htab_map_hash()
|
/linux-4.1.27/drivers/staging/rtl8712/ |
D | rtl871x_ioctl_linux.c | 127 (param->u.crypt. key_len > 16 ? 16 : param->u.crypt.key_len)); in handle_pairwise_key() 147 idx-1].skey, param->u.crypt.key, (param->u.crypt.key_len in handle_group_key() 148 > 16 ? 16 : param->u.crypt.key_len)); in handle_group_key() 405 param->u.crypt.key_len) in wpa_set_encryption() 421 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption() 1812 param_len = sizeof(struct ieee_param) + pext->key_len; in r871x_wx_set_enc_ext() 1827 if (pext->key_len) { in r871x_wx_set_enc_ext() 1828 param->u.crypt.key_len = pext->key_len; in r871x_wx_set_enc_ext() 1829 memcpy(param + 1, pext + 1, pext->key_len); in r871x_wx_set_enc_ext()
|
D | ieee80211.h | 115 u16 key_len; member
|
D | rtl871x_security.c | 60 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) in arcfour_init() argument 81 if (++keyindex >= key_len) in arcfour_init()
|
/linux-4.1.27/fs/xfs/libxfs/ |
D | xfs_ialloc_btree.c | 326 .key_len = sizeof(xfs_inobt_key_t), 348 .key_len = sizeof(xfs_inobt_key_t),
|
D | xfs_btree.h | 119 size_t key_len; member
|
D | xfs_alloc_btree.c | 428 .key_len = sizeof(xfs_alloc_key_t),
|
D | xfs_btree.c | 448 (n - 1) * cur->bc_ops->key_len; in xfs_btree_key_offset() 461 cur->bc_ops->get_maxrecs(cur, level) * cur->bc_ops->key_len + in xfs_btree_ptr_offset() 1190 memcpy(dst_key, src_key, numkeys * cur->bc_ops->key_len); in xfs_btree_copy_keys() 1236 dst_key = (char *)key + (dir * cur->bc_ops->key_len); in xfs_btree_shift_keys() 1237 memmove(dst_key, key, numkeys * cur->bc_ops->key_len); in xfs_btree_shift_keys()
|
D | xfs_bmap_btree.c | 752 .key_len = sizeof(xfs_bmbt_key_t),
|
/linux-4.1.27/drivers/net/wireless/p54/ |
D | fwio.c | 679 rxkey->key_len = min_t(u8, 16, len); in p54_upload_key() 680 memcpy(rxkey->key, key, rxkey->key_len); in p54_upload_key() 684 rxkey->key_len = 24; in p54_upload_key() 691 rxkey->key_len = 0; in p54_upload_key()
|
D | lmac.h | 255 u8 key_len; member 445 u8 key_len; member
|
D | txrx.c | 903 txhdr->key_len = min((u8)16, info->control.hw_key->keylen); in p54_tx_80211() 904 memcpy(txhdr->key, info->control.hw_key->key, txhdr->key_len); in p54_tx_80211() 917 txhdr->key_len = 0; in p54_tx_80211()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192cu/ |
D | mac.c | 263 rtlpriv->sec.key_len[idx] = 0; in rtl92c_set_key() 312 if (rtlpriv->sec.key_len[key_index] == 0) { in rtl92c_set_key() 322 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); in rtl92c_set_key() 334 key_len[PAIRWISE_KEYIDX]); in rtl92c_set_key()
|
/linux-4.1.27/include/net/irda/ |
D | irlan_common.h | 126 __u8 key_len; member
|
/linux-4.1.27/arch/x86/include/asm/crypto/ |
D | camellia.h | 30 unsigned int key_len, u32 *flags);
|
/linux-4.1.27/drivers/net/wireless/rsi/ |
D | rsi_91x_mgmt.c | 696 u16 key_len, in rsi_hal_load_key() argument 719 key_len += 1; in rsi_hal_load_key() 721 if (key_len >= 13) in rsi_hal_load_key() 742 key_len * 2); in rsi_hal_load_key() 744 memcpy(&set_key->key[0][0], data, key_len); in rsi_hal_load_key()
|
D | rsi_mgmt.h | 293 int rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len,
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
D | cfg80211.c | 190 params->key_len, params->key); in prism2_add_key() 228 params.key_len = len; in prism2_get_key() 563 did, sme->key_len, in prism2_connect()
|
/linux-4.1.27/drivers/crypto/amcc/ |
D | crypto4xx_sa.h | 152 u32 key_len:5; member
|
D | crypto4xx_alg.c | 156 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes()
|
/linux-4.1.27/net/bluetooth/ |
D | amp.c | 357 if (phylink_gen_key(mgr->l2cap_conn->hcon, cp.key, &cp.key_len, in amp_create_phylink() 376 if (phylink_gen_key(mgr->l2cap_conn->hcon, cp.key, &cp.key_len, in amp_accept_phylink()
|
/linux-4.1.27/drivers/net/wireless/ath/wil6210/ |
D | wmi.c | 1001 const void *mac_addr, int key_len, const void *key) in wmi_add_cipher_key() argument 1006 .key_len = key_len, in wmi_add_cipher_key() 1009 if (!key || (key_len > sizeof(cmd.key))) in wmi_add_cipher_key() 1012 memcpy(cmd.key, key, key_len); in wmi_add_cipher_key()
|
D | wil6210.h | 706 const void *mac_addr, int key_len, const void *key);
|
D | wmi.h | 264 u8 key_len; member
|
D | cfg80211.c | 577 params->key_len, params->key); in wil_cfg80211_add_key()
|
/linux-4.1.27/drivers/net/wireless/hostap/ |
D | hostap_ioctl.c | 3323 if ((!(ext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY) || ext->key_len > 0) in prism2_ioctl_siwencodeext() 3325 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in prism2_ioctl_siwencodeext() 3339 if (sta_ptr == NULL && ext->key_len > 0) { in prism2_ioctl_siwencodeext() 3411 ext->key_len = 0; in prism2_ioctl_giwencodeext() 3424 ext->key_len = in prism2_ioctl_giwencodeext() 3429 if (ext->key_len && in prism2_ioctl_giwencodeext() 3457 param->u.crypt.key_len) in prism2_ioctl_set_encryption() 3533 param->u.crypt.key_len > 0) && (*crypt)->ops->set_key && in prism2_ioctl_set_encryption() 3535 param->u.crypt.key_len, param->u.crypt.seq, in prism2_ioctl_set_encryption() 3611 param->u.crypt.key_len = 0; in prism2_ioctl_get_encryption() [all …]
|
D | hostap_common.h | 379 u16 key_len; member
|
/linux-4.1.27/drivers/net/ethernet/rocker/ |
D | rocker.c | 121 size_t key_len; member 2299 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); in rocker_flow_tbl_find() local 2303 if (memcmp(&found->key, &match->key, key_len) == 0) in rocker_flow_tbl_find() 2316 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); in rocker_flow_tbl_add() local 2319 match->key_crc32 = crc32(~0, &match->key, key_len); in rocker_flow_tbl_add() 2352 size_t key_len = match->key_len ? match->key_len : sizeof(found->key); in rocker_flow_tbl_del() local 2356 match->key_crc32 = crc32(~0, &match->key, key_len); in rocker_flow_tbl_del() 2550 entry->key_len = offsetof(struct rocker_flow_tbl_key, in rocker_flow_tbl_ucast4_routing()
|
/linux-4.1.27/drivers/net/ethernet/chelsio/cxgb4/ |
D | l2t.c | 368 int addr_len = neigh->tbl->key_len; in cxgb4_l2t_get() 481 int addr_len = neigh->tbl->key_len; in t4_l2t_update()
|
/linux-4.1.27/drivers/net/wireless/prism54/ |
D | isl_ioctl.c | 1573 set_key = ext->key_len > 0 ? 1 : 0; in prism54_set_encodeext() 1582 if (ext->key_len > KEY_SIZE_WEP104) { in prism54_set_encodeext() 1586 if (ext->key_len > KEY_SIZE_WEP40) in prism54_set_encodeext() 1592 if (ext->key_len > KEY_SIZE_TKIP) { in prism54_set_encodeext() 1605 memcpy(key.key, ext->key, ext->key_len); in prism54_set_encodeext() 1707 ext->key_len = 0; in prism54_get_encodeext() 1721 ext->key_len = key->length; in prism54_get_encodeext()
|
/linux-4.1.27/net/netfilter/ |
D | nft_hash.c | 310 params.key_len = set->klen; in nft_hash_init()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/ |
D | cam.c | 37 memset(rtlpriv->sec.key_len, 0, KEY_BUF_SIZE); in rtl_cam_reset_sec_info()
|
D | core.c | 1604 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key() 1614 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key() 1631 rtlpriv->sec.key_len[PAIRWISE_KEYIDX] = key->keylen; in rtl_op_set_key() 1659 rtlpriv->sec.key_len[key_idx] = 0; in rtl_op_set_key()
|
/linux-4.1.27/net/irda/irlan/ |
D | irlan_client.c | 503 self->client.key_len = val_len; in irlan_check_response_param()
|
/linux-4.1.27/include/uapi/linux/ |
D | wireless.h | 839 __u16 key_len; member
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
D | wmi-tlv.c | 1584 sizeof(*tlv) + roundup(arg->key_len, sizeof(__le32)); in ath10k_wmi_tlv_op_gen_vdev_install_key() 1598 cmd->key_len = __cpu_to_le32(arg->key_len); in ath10k_wmi_tlv_op_gen_vdev_install_key() 1610 tlv->len = __cpu_to_le16(roundup(arg->key_len, sizeof(__le32))); in ath10k_wmi_tlv_op_gen_vdev_install_key() 1612 memcpy(tlv->value, arg->key_data, arg->key_len); in ath10k_wmi_tlv_op_gen_vdev_install_key() 1615 ptr += roundup(arg->key_len, sizeof(__le32)); in ath10k_wmi_tlv_op_gen_vdev_install_key()
|
D | wmi.c | 4463 skb = ath10k_wmi_alloc_skb(ar, sizeof(*cmd) + arg->key_len); in ath10k_wmi_op_gen_vdev_install_key() 4472 cmd->key_len = __cpu_to_le32(arg->key_len); in ath10k_wmi_op_gen_vdev_install_key() 4479 memcpy(cmd->key_data, arg->key_data, arg->key_len); in ath10k_wmi_op_gen_vdev_install_key() 4483 arg->key_idx, arg->key_cipher, arg->key_len); in ath10k_wmi_op_gen_vdev_install_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192de/ |
D | hw.c | 2195 rtlpriv->sec.key_len[idx] = 0; in rtl92de_set_key() 2242 if (rtlpriv->sec.key_len[key_index] == 0) { in rtl92de_set_key() 2252 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); in rtl92de_set_key() 2264 sec.key_len[PAIRWISE_KEYIDX]); in rtl92de_set_key()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
D | main.c | 969 const u8 *key, size_t key_len, const u8 *mac_addr) in do_key_write() argument 978 B43_WARN_ON(key_len > B43_SEC_KEYSIZE); in do_key_write() 996 memcpy(buf, key, key_len); in do_key_write() 1006 const u8 *key, size_t key_len, in b43_key_write() argument 1020 if (algorithm == B43_SEC_ALGO_TKIP && key_len == 32) in b43_key_write() 1021 key_len = 16; in b43_key_write() 1022 if (key_len > B43_SEC_KEYSIZE) in b43_key_write() 1051 do_key_write(dev, index, algorithm, key, key_len, mac_addr); in b43_key_write() 1055 do_key_write(dev, index + 4, algorithm, key, key_len, NULL); in b43_key_write()
|
/linux-4.1.27/include/net/ |
D | neighbour.h | 192 int key_len; member
|
D | cfg80211.h | 383 int key_len; member 1674 u8 key_len, key_idx; member 1865 u8 key_len, key_idx; member
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/ |
D | hw.c | 2189 rtlpriv->sec.key_len[idx] = 0; in rtl92ce_set_key() 2241 if (rtlpriv->sec.key_len[key_index] == 0) { in rtl92ce_set_key() 2252 rtlpriv->sec.key_len[PAIRWISE_KEYIDX]); in rtl92ce_set_key() 2265 key_len[PAIRWISE_KEYIDX]); in rtl92ce_set_key()
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
D | rtl_wx.c | 1015 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext() 1023 if (ext->key_len == 13) in r8192_wx_set_enc_ext()
|
D | rtl_core.c | 2602 if (ipw->u.crypt.key_len == 13) in rtl8192_ioctl() 2605 else if (ipw->u.crypt.key_len == 5) in rtl8192_ioctl() 2650 if (ipw->u.crypt.key_len == 13) in rtl8192_ioctl() 2653 else if (ipw->u.crypt.key_len == 5) in rtl8192_ioctl()
|
/linux-4.1.27/include/net/bluetooth/ |
D | hci.h | 703 __u8 key_len; member 711 __u8 key_len; member
|
/linux-4.1.27/net/decnet/ |
D | dn_neigh.c | 80 .key_len = sizeof(__le16),
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
D | rtw_security.c | 32 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) in arcfour_init() argument 53 if (++keyindex >= key_len) in arcfour_init()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 500 static int qat_alg_validate_key(int key_len, int *alg) in qat_alg_validate_key() argument 502 switch (key_len) { in qat_alg_validate_key()
|
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/ |
D | cfg80211.c | 1651 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); in brcmf_set_sharedkey() 1653 if (sme->key_len == 0) in brcmf_set_sharedkey() 1668 key.len = (u32) sme->key_len; in brcmf_set_sharedkey() 2070 key.len = (u32) params->key_len; in brcmf_add_keyext() 2170 if (params->key_len > sizeof(key->data)) { in brcmf_cfg80211_add_key() 2171 brcmf_err("Too long key length (%u)\n", params->key_len); in brcmf_cfg80211_add_key() 2175 key->len = params->key_len; in brcmf_cfg80211_add_key()
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 37 static void arcfour_init(struct arc4context *parc4ctx, u8 *key, u32 key_len) in arcfour_init() argument 57 if (++keyindex >= key_len) in arcfour_init()
|
/linux-4.1.27/drivers/staging/rtl8192u/ |
D | r8192U_wx.c | 770 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext()
|
D | r8192U_core.c | 3484 if (ipw->u.crypt.key_len == 13) in rtl8192_ioctl() 3486 else if (ipw->u.crypt.key_len == 5) in rtl8192_ioctl() 3508 if (ipw->u.crypt.key_len == 13) in rtl8192_ioctl() 3510 else if (ipw->u.crypt.key_len == 5) in rtl8192_ioctl()
|
/linux-4.1.27/drivers/staging/rtl8188eu/include/ |
D | ieee80211.h | 238 u16 key_len; member
|
/linux-4.1.27/fs/ceph/ |
D | mds_client.c | 890 size_t const key_len = strlen(metadata[i][0]); in create_session_open_msg() local 893 ceph_encode_32(&p, key_len); in create_session_open_msg() 894 memcpy(p, metadata[i][0], key_len); in create_session_open_msg() 895 p += key_len; in create_session_open_msg()
|