/linux-4.1.27/fs/hfs/ |
H A D | bfind.c | 45 u16 off, len, keylen; __hfs_brec_find() local 56 keylen = hfs_brec_keylen(bnode, rec); __hfs_brec_find() 57 if (keylen == 0) { __hfs_brec_find() 61 hfs_bnode_read(bnode, fd->key, off, keylen); __hfs_brec_find() 75 keylen = hfs_brec_keylen(bnode, e); __hfs_brec_find() 76 if (keylen == 0) { __hfs_brec_find() 80 hfs_bnode_read(bnode, fd->key, off, keylen); __hfs_brec_find() 85 fd->keylength = keylen; __hfs_brec_find() 86 fd->entryoffset = off + keylen; __hfs_brec_find() 87 fd->entrylength = len - keylen; __hfs_brec_find() 166 u16 off, len, keylen; hfs_brec_goto() local 211 keylen = hfs_brec_keylen(bnode, fd->record); hfs_brec_goto() 212 if (keylen == 0) { hfs_brec_goto() 217 fd->keylength = keylen; hfs_brec_goto() 218 fd->entryoffset = off + keylen; hfs_brec_goto() 219 fd->entrylength = len - keylen; hfs_brec_goto() 220 hfs_bnode_read(bnode, fd->key, off, keylen); hfs_brec_goto()
|
H A D | brec.c | 50 pr_err("keylen %d too large\n", retval); hfs_brec_keylen() 56 pr_err("keylen %d too large\n", retval); hfs_brec_keylen()
|
/linux-4.1.27/fs/cachefiles/ |
H A D | key.c | 37 char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type) cachefiles_cook_key() argument 44 _enter(",%d", keylen); cachefiles_cook_key() 46 BUG_ON(keylen < 2 || keylen > 514); cachefiles_cook_key() 50 for (loop = 2; loop < keylen; loop++) { cachefiles_cook_key() 58 max = keylen - 2; cachefiles_cook_key() 67 keylen = (keylen + 2) / 3; cachefiles_cook_key() 69 max = keylen * 4; cachefiles_cook_key() 102 for (loop = keylen; loop > 0; loop--) { cachefiles_cook_key() 121 for (loop = keylen; loop > 0; loop--) { cachefiles_cook_key()
|
H A D | interface.c | 34 unsigned keylen, auxlen; cachefiles_alloc_object() local 68 keylen = cookie->def->get_key(cookie->netfs_data, buffer + 2, 512); cachefiles_alloc_object() 69 ASSERTCMP(keylen, <, 512); cachefiles_alloc_object() 71 *(uint16_t *)buffer = keylen; cachefiles_alloc_object() 72 ((char *)buffer)[keylen + 2] = 0; cachefiles_alloc_object() 73 ((char *)buffer)[keylen + 3] = 0; cachefiles_alloc_object() 74 ((char *)buffer)[keylen + 4] = 0; cachefiles_alloc_object() 77 key = cachefiles_cook_key(buffer, keylen + 2, object->type); cachefiles_alloc_object()
|
H A D | namei.c | 36 unsigned keylen, loop; __cachefiles_printk_object() local 59 keylen = cookie->def->get_key(cookie->netfs_data, keybuf, __cachefiles_printk_object() 62 keylen = 0; __cachefiles_printk_object() 65 keylen = 0; __cachefiles_printk_object() 69 if (keylen) { __cachefiles_printk_object() 70 pr_err("%skey=[%u] '", prefix, keylen); __cachefiles_printk_object() 71 for (loop = 0; loop < keylen; loop++) __cachefiles_printk_object()
|
H A D | internal.h | 156 extern char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type);
|
/linux-4.1.27/include/crypto/ |
H A D | cast6.h | 18 unsigned int keylen, u32 *flags); 19 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
H A D | serpent.h | 21 unsigned int keylen); 22 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
H A D | cast5.h | 18 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
H A D | des.h | 20 unsigned int keylen);
|
H A D | authenc.h | 35 unsigned int keylen);
|
H A D | if_alg.h | 54 int (*setkey)(void *private, const u8 *key, unsigned int keylen);
|
H A D | hash.h | 132 unsigned int keylen); 178 unsigned int keylen); 199 unsigned int keylen); 350 * @keylen: length of the key in bytes 358 unsigned int keylen); 734 * @keylen: length of the key in bytes 743 unsigned int keylen);
|
/linux-4.1.27/crypto/ |
H A D | cipher.c | 24 unsigned int keylen) setkey_unaligned() 32 absize = keylen + alignmask; setkey_unaligned() 38 memcpy(alignbuffer, key, keylen); setkey_unaligned() 39 ret = cia->cia_setkey(tfm, alignbuffer, keylen); setkey_unaligned() 40 memset(alignbuffer, 0, keylen); setkey_unaligned() 46 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) setkey() argument 52 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { setkey() 58 return setkey_unaligned(tfm, key, keylen); setkey() 60 return cia->cia_setkey(tfm, key, keylen); setkey() 23 setkey_unaligned(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) setkey_unaligned() argument
|
H A D | hmac.c | 45 const u8 *inkey, unsigned int keylen) hmac_setkey() 62 if (keylen > bs) { hmac_setkey() 65 err = crypto_shash_digest(shash, inkey, keylen, ipad); hmac_setkey() 69 keylen = ds; hmac_setkey() 71 memcpy(ipad, inkey, keylen); hmac_setkey() 73 memset(ipad + keylen, 0, bs - keylen); hmac_setkey() 44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) hmac_setkey() argument
|
H A D | ablkcipher.c | 308 unsigned int keylen) setkey_unaligned() 316 absize = keylen + alignmask; setkey_unaligned() 322 memcpy(alignbuffer, key, keylen); setkey_unaligned() 323 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned() 324 memset(alignbuffer, 0, keylen); setkey_unaligned() 330 unsigned int keylen) setkey() 335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey() 341 return setkey_unaligned(tfm, key, keylen); setkey() 343 return cipher->setkey(tfm, key, keylen); setkey() 307 setkey_unaligned(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) setkey_unaligned() argument 329 setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) setkey() argument
|
H A D | ctr.c | 39 unsigned int keylen) crypto_ctr_setkey() 48 err = crypto_cipher_setkey(child, key, keylen); crypto_ctr_setkey() 253 const u8 *key, unsigned int keylen) crypto_rfc3686_setkey() 260 if (keylen < CTR_RFC3686_NONCE_SIZE) crypto_rfc3686_setkey() 263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), crypto_rfc3686_setkey() 266 keylen -= CTR_RFC3686_NONCE_SIZE; crypto_rfc3686_setkey() 271 err = crypto_ablkcipher_setkey(child, key, keylen); crypto_rfc3686_setkey() 38 crypto_ctr_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_ctr_setkey() argument 252 crypto_rfc3686_setkey(struct crypto_ablkcipher *parent, const u8 *key, unsigned int keylen) crypto_rfc3686_setkey() argument
|
H A D | blkcipher.c | 375 unsigned int keylen) setkey_unaligned() 383 absize = keylen + alignmask; setkey_unaligned() 389 memcpy(alignbuffer, key, keylen); setkey_unaligned() 390 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned() 391 memset(alignbuffer, 0, keylen); setkey_unaligned() 396 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) setkey() argument 401 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey() 407 return setkey_unaligned(tfm, key, keylen); setkey() 409 return cipher->setkey(tfm, key, keylen); setkey() 413 unsigned int keylen) async_setkey() 415 return setkey(crypto_ablkcipher_tfm(tfm), key, keylen); async_setkey() 586 unsigned int keylen); skcipher_geniv_alloc() 374 setkey_unaligned(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) setkey_unaligned() argument 412 async_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) async_setkey() argument
|
H A D | xts.c | 34 unsigned int keylen) setkey() 43 if (keylen % 2) { setkey() 57 err = crypto_cipher_setkey(child, key + keylen/2, keylen/2); setkey() 70 err = crypto_cipher_setkey(child, key, keylen/2); setkey() 33 setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) setkey() argument
|
H A D | shash.c | 28 unsigned int keylen) shash_no_setkey() 34 unsigned int keylen) shash_setkey_unaligned() 42 absize = keylen + (alignmask & ~(crypto_tfm_ctx_alignment() - 1)); shash_setkey_unaligned() 48 memcpy(alignbuffer, key, keylen); shash_setkey_unaligned() 49 err = shash->setkey(tfm, alignbuffer, keylen); shash_setkey_unaligned() 55 unsigned int keylen) crypto_shash_setkey() 61 return shash_setkey_unaligned(tfm, key, keylen); crypto_shash_setkey() 63 return shash->setkey(tfm, key, keylen); crypto_shash_setkey() 202 unsigned int keylen) shash_async_setkey() 206 return crypto_shash_setkey(*ctx, key, keylen); shash_async_setkey() 372 unsigned int keylen) shash_compat_setkey() 377 return crypto_shash_setkey(desc->tfm, key, keylen); shash_compat_setkey() 27 shash_no_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) shash_no_setkey() argument 33 shash_setkey_unaligned(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) shash_setkey_unaligned() argument 54 crypto_shash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) crypto_shash_setkey() argument 201 shash_async_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) shash_async_setkey() argument 371 shash_compat_setkey(struct crypto_hash *tfm, const u8 *key, unsigned int keylen) shash_compat_setkey() argument
|
H A D | aead.c | 30 unsigned int keylen) setkey_unaligned() 38 absize = keylen + alignmask; setkey_unaligned() 44 memcpy(alignbuffer, key, keylen); setkey_unaligned() 45 ret = aead->setkey(tfm, alignbuffer, keylen); setkey_unaligned() 46 memset(alignbuffer, 0, keylen); setkey_unaligned() 51 static int setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) setkey() argument 57 return setkey_unaligned(tfm, key, keylen); setkey() 59 return aead->setkey(tfm, key, keylen); setkey() 29 setkey_unaligned(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) setkey_unaligned() argument
|
H A D | ahash.c | 189 unsigned int keylen) ahash_setkey_unaligned() 196 absize = keylen + alignmask; ahash_setkey_unaligned() 202 memcpy(alignbuffer, key, keylen); ahash_setkey_unaligned() 203 ret = tfm->setkey(tfm, alignbuffer, keylen); ahash_setkey_unaligned() 209 unsigned int keylen) crypto_ahash_setkey() 214 return ahash_setkey_unaligned(tfm, key, keylen); crypto_ahash_setkey() 216 return tfm->setkey(tfm, key, keylen); crypto_ahash_setkey() 221 unsigned int keylen) ahash_nosetkey() 188 ahash_setkey_unaligned(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) ahash_setkey_unaligned() argument 208 crypto_ahash_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) crypto_ahash_setkey() argument 220 ahash_nosetkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) ahash_nosetkey() argument
|
H A D | crc32.c | 64 unsigned int keylen) crc32_setkey() 68 if (keylen != sizeof(u32)) { crc32_setkey() 63 crc32_setkey(struct crypto_shash *hash, const u8 *key, unsigned int keylen) crc32_setkey() argument
|
H A D | crypto_null.c | 61 unsigned int keylen) null_hash_setkey() 65 unsigned int keylen) null_setkey() 60 null_hash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) null_hash_setkey() argument 64 null_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) null_setkey() argument
|
H A D | ghash-generic.c | 45 const u8 *key, unsigned int keylen) ghash_setkey() 49 if (keylen != GHASH_BLOCK_SIZE) { ghash_setkey() 44 ghash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) ghash_setkey() argument
|
H A D | michael_mic.c | 137 unsigned int keylen) michael_setkey() 143 if (keylen != 8) { michael_setkey() 136 michael_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) michael_setkey() argument
|
H A D | af_alg.c | 202 unsigned int keylen) alg_setkey() 209 key = sock_kmalloc(sk, keylen, GFP_KERNEL); alg_setkey() 214 if (copy_from_user(key, ukey, keylen)) alg_setkey() 217 err = type->setkey(ask->private, key, keylen); alg_setkey() 220 sock_kzfree_s(sk, key, keylen); alg_setkey() 201 alg_setkey(struct sock *sk, char __user *ukey, unsigned int keylen) alg_setkey() argument
|
H A D | ccm.c | 77 unsigned int keylen) crypto_ccm_setkey() 87 err = crypto_ablkcipher_setkey(ctr, key, keylen); crypto_ccm_setkey() 96 err = crypto_cipher_setkey(tfm, key, keylen); crypto_ccm_setkey() 639 unsigned int keylen) crypto_rfc4309_setkey() 645 if (keylen < 3) crypto_rfc4309_setkey() 648 keylen -= 3; crypto_rfc4309_setkey() 649 memcpy(ctx->nonce, key + keylen, 3); crypto_rfc4309_setkey() 654 err = crypto_aead_setkey(child, key, keylen); crypto_rfc4309_setkey() 76 crypto_ccm_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) crypto_ccm_setkey() argument 638 crypto_rfc4309_setkey(struct crypto_aead *parent, const u8 *key, unsigned int keylen) crypto_rfc4309_setkey() argument
|
H A D | crc32c_generic.c | 77 unsigned int keylen) chksum_setkey() 81 if (keylen != sizeof(mctx->key)) { chksum_setkey() 76 chksum_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) chksum_setkey() argument
|
H A D | ecb.c | 26 unsigned int keylen) crypto_ecb_setkey() 35 err = crypto_cipher_setkey(child, key, keylen); crypto_ecb_setkey() 25 crypto_ecb_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_ecb_setkey() argument
|
H A D | gcm.c | 105 unsigned int keylen) crypto_gcm_setkey() 125 err = crypto_ablkcipher_setkey(ctr, key, keylen); crypto_gcm_setkey() 859 unsigned int keylen) crypto_rfc4106_setkey() 865 if (keylen < 4) crypto_rfc4106_setkey() 868 keylen -= 4; crypto_rfc4106_setkey() 869 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4106_setkey() 874 err = crypto_aead_setkey(child, key, keylen); crypto_rfc4106_setkey() 1070 unsigned int keylen) crypto_rfc4543_setkey() 1076 if (keylen < 4) crypto_rfc4543_setkey() 1079 keylen -= 4; crypto_rfc4543_setkey() 1080 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4543_setkey() 1085 err = crypto_aead_setkey(child, key, keylen); crypto_rfc4543_setkey() 104 crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) crypto_gcm_setkey() argument 858 crypto_rfc4106_setkey(struct crypto_aead *parent, const u8 *key, unsigned int keylen) crypto_rfc4106_setkey() argument 1069 crypto_rfc4543_setkey(struct crypto_aead *parent, const u8 *key, unsigned int keylen) crypto_rfc4543_setkey() argument
|
H A D | lrw.c | 80 unsigned int keylen) setkey() 85 const u8 *tweak = key + keylen - bsize; setkey() 90 err = crypto_cipher_setkey(child, key, keylen - bsize); setkey() 79 setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) setkey() argument
|
H A D | blowfish_common.c | 349 int blowfish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) blowfish_setkey() argument 369 ((u32)key[(j + 1) % keylen] << 16) | blowfish_setkey() 370 ((u32)key[(j + 2) % keylen] << 8) | blowfish_setkey() 371 ((u32)key[(j + 3) % keylen])); blowfish_setkey() 374 j = (j + 4) % keylen; blowfish_setkey()
|
H A D | authenc.c | 56 unsigned int keylen) crypto_authenc_extractkeys() 61 if (!RTA_OK(rta, keylen)) crypto_authenc_extractkeys() 72 keylen -= RTA_ALIGN(rta->rta_len); crypto_authenc_extractkeys() 74 if (keylen < keys->enckeylen) crypto_authenc_extractkeys() 77 keys->authkeylen = keylen - keys->enckeylen; crypto_authenc_extractkeys() 86 unsigned int keylen) crypto_authenc_setkey() 94 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) crypto_authenc_setkey() 55 crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, unsigned int keylen) crypto_authenc_extractkeys() argument 85 crypto_authenc_setkey(struct crypto_aead *authenc, const u8 *key, unsigned int keylen) crypto_authenc_setkey() argument
|
H A D | cast6_generic.c | 157 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) cast6_setkey() argument 159 return __cast6_setkey(crypto_tfm_ctx(tfm), key, keylen, cast6_setkey()
|
H A D | cbc.c | 27 unsigned int keylen) crypto_cbc_setkey() 36 err = crypto_cipher_setkey(child, key, keylen); crypto_cbc_setkey() 26 crypto_cbc_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_cbc_setkey() argument
|
H A D | cmac.c | 55 const u8 *inkey, unsigned int keylen) crypto_cmac_digest_setkey() 65 err = crypto_cipher_setkey(ctx->child, inkey, keylen); crypto_cmac_digest_setkey() 54 crypto_cmac_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) crypto_cmac_digest_setkey() argument
|
H A D | pcbc.c | 30 unsigned int keylen) crypto_pcbc_setkey() 39 err = crypto_cipher_setkey(child, key, keylen); crypto_pcbc_setkey() 29 crypto_pcbc_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_pcbc_setkey() argument
|
H A D | serpent_generic.c | 233 unsigned int keylen) __serpent_setkey() 242 for (i = 0; i < keylen; ++i) __serpent_setkey() 439 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) serpent_setkey() argument 441 return __serpent_setkey(crypto_tfm_ctx(tfm), key, keylen); serpent_setkey() 571 unsigned int keylen) tnepres_setkey() 576 for (i = 0; i < keylen; ++i) tnepres_setkey() 577 rev_key[keylen - i - 1] = key[i]; tnepres_setkey() 579 return serpent_setkey(tfm, rev_key, keylen); tnepres_setkey() 232 __serpent_setkey(struct serpent_ctx *ctx, const u8 *key, unsigned int keylen) __serpent_setkey() argument 570 tnepres_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) tnepres_setkey() argument
|
H A D | xcbc.c | 62 const u8 *inkey, unsigned int keylen) crypto_xcbc_digest_setkey() 71 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) crypto_xcbc_digest_setkey() 61 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) crypto_xcbc_digest_setkey() argument
|
H A D | cryptd.c | 186 const u8 *key, unsigned int keylen) cryptd_blkcipher_setkey() 195 err = crypto_blkcipher_setkey(child, key, keylen); cryptd_blkcipher_setkey() 421 const u8 *key, unsigned int keylen) cryptd_hash_setkey() 430 err = crypto_shash_setkey(child, key, keylen); cryptd_hash_setkey() 185 cryptd_blkcipher_setkey(struct crypto_ablkcipher *parent, const u8 *key, unsigned int keylen) cryptd_blkcipher_setkey() argument 420 cryptd_hash_setkey(struct crypto_ahash *parent, const u8 *key, unsigned int keylen) cryptd_hash_setkey() argument
|
H A D | algif_hash.c | 373 static int hash_setkey(void *private, const u8 *key, unsigned int keylen) hash_setkey() argument 378 err = crypto_ahash_setkey(tfm->hash, key, keylen); hash_setkey()
|
H A D | cts.c | 58 unsigned int keylen) crypto_cts_setkey() 67 err = crypto_blkcipher_setkey(child, key, keylen); crypto_cts_setkey() 57 crypto_cts_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_cts_setkey() argument
|
H A D | algif_aead.c | 579 static int aead_setkey(void *private, const u8 *key, unsigned int keylen) aead_setkey() argument 581 return crypto_aead_setkey(private, key, keylen); aead_setkey()
|
H A D | mcryptd.c | 302 const u8 *key, unsigned int keylen) mcryptd_hash_setkey() 311 err = crypto_shash_setkey(child, key, keylen); mcryptd_hash_setkey() 301 mcryptd_hash_setkey(struct crypto_ahash *parent, const u8 *key, unsigned int keylen) mcryptd_hash_setkey() argument
|
H A D | pcrypt.c | 102 const u8 *key, unsigned int keylen) pcrypt_aead_setkey() 106 return crypto_aead_setkey(ctx->child, key, keylen); pcrypt_aead_setkey() 101 pcrypt_aead_setkey(struct crypto_aead *parent, const u8 *key, unsigned int keylen) pcrypt_aead_setkey() argument
|
H A D | des_generic.c | 782 unsigned int keylen) des_setkey() 863 unsigned int keylen) __des3_ede_setkey() 883 unsigned int keylen) des3_ede_setkey() 889 return __des3_ede_setkey(expkey, flags, key, keylen); des3_ede_setkey() 781 des_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) des_setkey() argument 862 __des3_ede_setkey(u32 *expkey, u32 *flags, const u8 *key, unsigned int keylen) __des3_ede_setkey() argument 882 des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) des3_ede_setkey() argument
|
H A D | algif_skcipher.c | 882 static int skcipher_setkey(void *private, const u8 *key, unsigned int keylen) skcipher_setkey() argument 887 err = crypto_ablkcipher_setkey(tfm->skcipher, key, keylen); skcipher_setkey()
|
H A D | authencesn.c | 60 unsigned int keylen) crypto_authenc_esn_setkey() 68 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) crypto_authenc_esn_setkey() 59 crypto_authenc_esn_setkey(struct crypto_aead *authenc_esn, const u8 *key, unsigned int keylen) crypto_authenc_esn_setkey() argument
|
H A D | vmac.c | 545 const u8 *key, unsigned int keylen) vmac_setkey() 549 if (keylen != VMAC_KEY_LEN) { vmac_setkey() 544 vmac_setkey(struct crypto_shash *parent, const u8 *key, unsigned int keylen) vmac_setkey() argument
|
H A D | fcrypt.c | 303 static int fcrypt_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) fcrypt_setkey() argument
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
H A D | p80211wep.c | 121 /* keylen in bytes! */ 123 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen) wep_change_key() argument 125 if (keylen < 0) wep_change_key() 127 if (keylen >= MAX_KEYLEN) wep_change_key() 137 pr_debug("WEP key %d len %d = %*phC\n", keynum, keylen, wep_change_key() 141 wlandev->wep_keylens[keynum] = keylen; wep_change_key() 142 memcpy(wlandev->wep_keys[keynum], key, keylen); wep_change_key() 154 u32 i, j, k, crc, keylen; wep_decrypt() local 174 keylen = wlandev->wep_keylens[keyidx]; wep_decrypt() 176 if (keylen == 0) wep_decrypt() 180 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); wep_decrypt() 182 keylen += 3; /* add in IV bytes */ wep_decrypt() 186 keyidx, keylen, 5, key + 3); wep_decrypt() 194 j = (j + s[i] + key[i % keylen]) & 0xff; wep_decrypt() 231 u32 i, j, k, crc, keylen; wep_encrypt() local 241 keylen = wlandev->wep_keylens[keynum]; wep_encrypt() 242 if (keylen <= 0) wep_encrypt() 247 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[0] < keylen)) wep_encrypt() 257 memcpy(key + 3, wlandev->wep_keys[keynum], keylen); wep_encrypt() 259 keylen += 3; /* add in IV bytes */ wep_encrypt() 263 iv[3], keynum, keylen, 3, key, 5, key + 3); wep_encrypt() 271 j = (j + s[i] + key[i % keylen]) & 0xff; wep_encrypt()
|
H A D | p80211netdev.h | 230 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen);
|
/linux-4.1.27/fs/hfsplus/ |
H A D | bfind.c | 116 u16 off, len, keylen; __hfs_brec_find() local 128 keylen = hfs_brec_keylen(bnode, rec); __hfs_brec_find() 129 if (keylen == 0) { __hfs_brec_find() 133 hfs_bnode_read(bnode, fd->key, off, keylen); __hfs_brec_find() 142 keylen = hfs_brec_keylen(bnode, e); __hfs_brec_find() 143 if (keylen == 0) { __hfs_brec_find() 147 hfs_bnode_read(bnode, fd->key, off, keylen); __hfs_brec_find() 153 fd->keylength = keylen; __hfs_brec_find() 154 fd->entryoffset = off + keylen; __hfs_brec_find() 155 fd->entrylength = len - keylen; __hfs_brec_find() 235 u16 off, len, keylen; hfs_brec_goto() local 280 keylen = hfs_brec_keylen(bnode, fd->record); hfs_brec_goto() 281 if (keylen == 0) { hfs_brec_goto() 286 fd->keylength = keylen; hfs_brec_goto() 287 fd->entryoffset = off + keylen; hfs_brec_goto() 288 fd->entrylength = len - keylen; hfs_brec_goto() 289 hfs_bnode_read(bnode, fd->key, off, keylen); hfs_brec_goto()
|
H A D | brec.c | 54 pr_err("keylen %d too large\n", hfs_brec_keylen()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | key_gen.h | 16 int split_key_pad_len, const u8 *key_in, u32 keylen,
|
H A D | key_gen.c | 45 int split_key_pad_len, const u8 *key_in, u32 keylen, gen_split_key() 59 dma_addr_in = dma_map_single(jrdev, (void *)key_in, keylen, gen_split_key() 74 append_key(desc, dma_addr_in, keylen, CLASS_2 | KEY_DEST_CLASS_REG); gen_split_key() 95 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); gen_split_key() 118 dma_unmap_single(jrdev, dma_addr_in, keylen, DMA_TO_DEVICE); gen_split_key() 44 gen_split_key(struct device *jrdev, u8 *key_out, int split_key_len, int split_key_pad_len, const u8 *key_in, u32 keylen, u32 alg_op) gen_split_key() argument
|
H A D | caamhash.c | 429 u32 keylen) gen_split_hash_key() 432 ctx->split_key_pad_len, key_in, keylen, gen_split_hash_key() 438 u32 *keylen, u8 *key_out, u32 digestsize) hash_digest_key() 454 src_dma = dma_map_single(jrdev, (void *)key_in, *keylen, hash_digest_key() 465 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); hash_digest_key() 473 append_seq_in_ptr(desc, src_dma, *keylen, 0); hash_digest_key() 474 append_seq_fifo_load(desc, *keylen, FIFOLD_CLASS_CLASS2 | hash_digest_key() 482 DUMP_PREFIX_ADDRESS, 16, 4, key_in, *keylen, 1); hash_digest_key() 502 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); hash_digest_key() 505 *keylen = digestsize; hash_digest_key() 513 const u8 *key, unsigned int keylen) ahash_setkey() 525 printk(KERN_ERR "keylen %d\n", keylen); ahash_setkey() 528 if (keylen > blocksize) { ahash_setkey() 533 ret = hash_digest_key(ctx, key, &keylen, hashed_key, ahash_setkey() 549 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); ahash_setkey() 552 ret = gen_split_hash_key(ctx, key, keylen); ahash_setkey() 428 gen_split_hash_key(struct caam_hash_ctx *ctx, const u8 *key_in, u32 keylen) gen_split_hash_key() argument 437 hash_digest_key(struct caam_hash_ctx *ctx, const u8 *key_in, u32 *keylen, u8 *key_out, u32 digestsize) hash_digest_key() argument 512 ahash_setkey(struct crypto_ahash *ahash, const u8 *key, unsigned int keylen) ahash_setkey() argument
|
H A D | caamalg.c | 1654 const u8 *key, unsigned int keylen) aead_setkey() 1663 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) aead_setkey() 1675 printk(KERN_ERR "keylen %d enckeylen %d authkeylen %d\n", aead_setkey() 1681 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); aead_setkey() 1719 const u8 *key, unsigned int keylen) gcm_setkey() 1727 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); gcm_setkey() 1730 memcpy(ctx->key, key, keylen); gcm_setkey() 1731 ctx->key_dma = dma_map_single(jrdev, ctx->key, keylen, gcm_setkey() 1737 ctx->enckeylen = keylen; gcm_setkey() 1749 const u8 *key, unsigned int keylen) rfc4106_setkey() 1755 if (keylen < 4) rfc4106_setkey() 1760 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); rfc4106_setkey() 1763 memcpy(ctx->key, key, keylen); rfc4106_setkey() 1769 ctx->enckeylen = keylen - 4; rfc4106_setkey() 1788 const u8 *key, unsigned int keylen) rfc4543_setkey() 1794 if (keylen < 4) rfc4543_setkey() 1799 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); rfc4543_setkey() 1802 memcpy(ctx->key, key, keylen); rfc4543_setkey() 1808 ctx->enckeylen = keylen - 4; rfc4543_setkey() 1827 const u8 *key, unsigned int keylen) ablkcipher_setkey() 1847 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); ablkcipher_setkey() 1864 keylen -= CTR_RFC3686_NONCE_SIZE; ablkcipher_setkey() 1867 memcpy(ctx->key, key, keylen); ablkcipher_setkey() 1868 ctx->key_dma = dma_map_single(jrdev, ctx->key, keylen, ablkcipher_setkey() 1874 ctx->enckeylen = keylen; ablkcipher_setkey() 1890 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 1949 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 2012 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 1653 aead_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) aead_setkey() argument 1718 gcm_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) gcm_setkey() argument 1748 rfc4106_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) rfc4106_setkey() argument 1787 rfc4543_setkey(struct crypto_aead *aead, const u8 *key, unsigned int keylen) rfc4543_setkey() argument 1826 ablkcipher_setkey(struct crypto_ablkcipher *ablkcipher, const u8 *key, unsigned int keylen) ablkcipher_setkey() argument
|
/linux-4.1.27/arch/x86/include/asm/crypto/ |
H A D | twofish.h | 39 unsigned int keylen); 44 unsigned int keylen);
|
H A D | serpent-avx.h | 41 unsigned int keylen); 46 unsigned int keylen);
|
H A D | camellia.h | 33 unsigned int keylen); 37 unsigned int keylen);
|
/linux-4.1.27/arch/powerpc/boot/ |
H A D | planetcore.c | 43 int keylen = strlen(key); planetcore_get_key() local 46 if (!strncmp(table, key, keylen) && table[keylen] == '=') planetcore_get_key() 47 return table + keylen + 1; planetcore_get_key()
|
/linux-4.1.27/net/mac80211/ |
H A D | wep.c | 57 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) ieee80211_wep_weak_iv() argument 66 if (B >= 3 && B < 3 + keylen) ieee80211_wep_weak_iv() 74 int keylen, int keyidx, u8 *iv) ieee80211_wep_get_iv() 77 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) ieee80211_wep_get_iv() 92 int keylen, int keyidx) ieee80211_wep_add_iv() 113 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); ieee80211_wep_add_iv() 163 const u8 *key, int keylen, int keyidx) ieee80211_wep_encrypt() 172 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); ieee80211_wep_encrypt() 182 memcpy(rc4key + 3, key, keylen); ieee80211_wep_encrypt() 187 return ieee80211_wep_encrypt_data(local->wep_tx_tfm, rc4key, keylen + 3, ieee80211_wep_encrypt() 251 klen = 3 + key->conf.keylen; ieee80211_wep_decrypt() 257 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); ieee80211_wep_decrypt() 310 tx->key->conf.keylen, wep_encrypt_skb() 316 tx->key->conf.keylen, wep_encrypt_skb() 73 ieee80211_wep_get_iv(struct ieee80211_local *local, int keylen, int keyidx, u8 *iv) ieee80211_wep_get_iv() argument 90 ieee80211_wep_add_iv(struct ieee80211_local *local, struct sk_buff *skb, int keylen, int keyidx) ieee80211_wep_add_iv() argument 161 ieee80211_wep_encrypt(struct ieee80211_local *local, struct sk_buff *skb, const u8 *key, int keylen, int keyidx) ieee80211_wep_encrypt() argument
|
H A D | wep.h | 25 const u8 *key, int keylen, int keyidx);
|
H A D | debugfs_key.c | 56 KEY_CONF_FILE(keylen, D); 277 int i, bufsize = 2 * key->conf.keylen + 2; key_key_read() 285 for (i = 0; i < key->conf.keylen; i++) key_key_read() 324 DEBUGFS_ADD(keylen); ieee80211_debugfs_key_add()
|
H A D | key.c | 398 key->conf.keylen = key_len; ieee80211_key_alloc() 1155 keyconf->keylen, keyconf->key, ieee80211_gtk_rekey_add()
|
H A D | cfg.c | 407 params.key_len = key->conf.keylen; ieee80211_get_key()
|
/linux-4.1.27/drivers/crypto/amcc/ |
H A D | crypto4xx_alg.c | 106 unsigned int keylen, crypto4xx_setkey_aes() 115 if (keylen != AES_KEYSIZE_256 && crypto4xx_setkey_aes() 116 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { crypto4xx_setkey_aes() 126 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); crypto4xx_setkey_aes() 154 key, keylen); crypto4xx_setkey_aes() 155 sa->sa_contents = SA_AES_CONTENTS | (keylen << 2); crypto4xx_setkey_aes() 156 sa->sa_command_1.bf.key_len = keylen >> 3; crypto4xx_setkey_aes() 171 const u8 *key, unsigned int keylen) crypto4xx_setkey_aes_cbc() 173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, crypto4xx_setkey_aes_cbc() 104 crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen, unsigned char cm, u8 fb) crypto4xx_setkey_aes() argument 170 crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) crypto4xx_setkey_aes_cbc() argument
|
H A D | crypto4xx_core.h | 188 const u8 *key, unsigned int keylen);
|
/linux-4.1.27/drivers/crypto/vmx/ |
H A D | aes.c | 76 unsigned int keylen) p8_aes_setkey() 84 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); p8_aes_setkey() 85 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); p8_aes_setkey() 88 ret += crypto_cipher_setkey(ctx->fallback, key, keylen); p8_aes_setkey() 75 p8_aes_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) p8_aes_setkey() argument
|
H A D | aes_cbc.c | 77 unsigned int keylen) p8_aes_cbc_setkey() 85 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); p8_aes_cbc_setkey() 86 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); p8_aes_cbc_setkey() 89 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); p8_aes_cbc_setkey() 76 p8_aes_cbc_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) p8_aes_cbc_setkey() argument
|
H A D | aes_ctr.c | 75 unsigned int keylen) p8_aes_ctr_setkey() 83 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); p8_aes_ctr_setkey() 86 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); p8_aes_ctr_setkey() 74 p8_aes_ctr_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) p8_aes_ctr_setkey() argument
|
H A D | ghash.c | 110 unsigned int keylen) p8_ghash_setkey() 114 if (keylen != GHASH_KEY_LEN) p8_ghash_setkey() 123 return crypto_shash_setkey(ctx->fallback, key, keylen); p8_ghash_setkey() 109 p8_ghash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) p8_ghash_setkey() argument
|
/linux-4.1.27/drivers/crypto/ |
H A D | s5p-sss.c | 171 int keylen; member in struct:s5p_aes_ctx 398 uint8_t *key, uint8_t *iv, unsigned int keylen) s5p_set_aes() 405 if (keylen == AES_KEYSIZE_256) s5p_set_aes() 407 else if (keylen == AES_KEYSIZE_192) s5p_set_aes() 412 memcpy(keystart, key, keylen); s5p_set_aes() 432 if (dev->ctx->keylen == AES_KEYSIZE_192) s5p_aes_crypt_start() 434 else if (dev->ctx->keylen == AES_KEYSIZE_256) s5p_aes_crypt_start() 461 s5p_set_aes(dev, dev->ctx->aes_key, req->info, dev->ctx->keylen); s5p_aes_crypt_start() 549 const uint8_t *key, unsigned int keylen) s5p_aes_setkey() 554 if (keylen != AES_KEYSIZE_128 && s5p_aes_setkey() 555 keylen != AES_KEYSIZE_192 && s5p_aes_setkey() 556 keylen != AES_KEYSIZE_256) s5p_aes_setkey() 559 memcpy(ctx->aes_key, key, keylen); s5p_aes_setkey() 560 ctx->keylen = keylen; s5p_aes_setkey() 397 s5p_set_aes(struct s5p_aes_dev *dev, uint8_t *key, uint8_t *iv, unsigned int keylen) s5p_set_aes() argument 548 s5p_aes_setkey(struct crypto_ablkcipher *cipher, const uint8_t *key, unsigned int keylen) s5p_aes_setkey() argument
|
H A D | geode-aes.c | 122 op->keylen = len; geode_setkey_cip() 155 op->keylen = len; geode_setkey_blk() 220 if (unlikely(op->keylen != AES_KEYSIZE_128)) { geode_encrypt() 241 if (unlikely(op->keylen != AES_KEYSIZE_128)) { geode_decrypt() 312 if (unlikely(op->keylen != AES_KEYSIZE_128)) geode_cbc_decrypt() 344 if (unlikely(op->keylen != AES_KEYSIZE_128)) geode_cbc_encrypt() 425 if (unlikely(op->keylen != AES_KEYSIZE_128)) geode_ecb_decrypt() 455 if (unlikely(op->keylen != AES_KEYSIZE_128)) geode_ecb_encrypt()
|
H A D | n2_core.c | 443 unsigned int keylen) n2_hmac_async_setkey() 452 err = crypto_ahash_setkey(fallback_tfm, key, keylen); n2_hmac_async_setkey() 463 if (keylen > bs) { n2_hmac_async_setkey() 464 err = crypto_shash_digest(shash, key, keylen, n2_hmac_async_setkey() 468 keylen = ds; n2_hmac_async_setkey() 469 } else if (keylen <= N2_HASH_KEY_MAX) n2_hmac_async_setkey() 470 memcpy(ctx->hash_key, key, keylen); n2_hmac_async_setkey() 472 ctx->hash_key_len = keylen; n2_hmac_async_setkey() 715 unsigned int keylen) n2_aes_setkey() 723 switch (keylen) { n2_aes_setkey() 738 ctx->key_len = keylen; n2_aes_setkey() 739 memcpy(ctx->key.aes, key, keylen); n2_aes_setkey() 744 unsigned int keylen) n2_des_setkey() 754 if (keylen != DES_KEY_SIZE) { n2_des_setkey() 765 ctx->key_len = keylen; n2_des_setkey() 766 memcpy(ctx->key.des, key, keylen); n2_des_setkey() 771 unsigned int keylen) n2_3des_setkey() 779 if (keylen != (3 * DES_KEY_SIZE)) { n2_3des_setkey() 783 ctx->key_len = keylen; n2_3des_setkey() 784 memcpy(ctx->key.des3, key, keylen); n2_3des_setkey() 789 unsigned int keylen) n2_arc4_setkey() 811 if (++k >= keylen) n2_arc4_setkey() 442 n2_hmac_async_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) n2_hmac_async_setkey() argument 714 n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) n2_aes_setkey() argument 743 n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) n2_des_setkey() argument 770 n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) n2_3des_setkey() argument 788 n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) n2_arc4_setkey() argument
|
H A D | atmel-tdes.c | 77 int keylen; member in struct:atmel_tdes_ctx 276 if (dd->ctx->keylen > (DES_KEY_SIZE << 1)) { atmel_tdes_write_ctrl() 279 } else if (dd->ctx->keylen > DES_KEY_SIZE) { atmel_tdes_write_ctrl() 310 dd->ctx->keylen >> 2); atmel_tdes_write_ctrl() 778 unsigned int keylen) atmel_des_setkey() 786 if (keylen != DES_KEY_SIZE) { atmel_des_setkey() 797 memcpy(ctx->key, key, keylen); atmel_des_setkey() 798 ctx->keylen = keylen; atmel_des_setkey() 804 unsigned int keylen) atmel_tdes_setkey() 815 && (keylen != 2*DES_KEY_SIZE)) { atmel_tdes_setkey() 818 } else if ((keylen != 2*DES_KEY_SIZE) && (keylen != 3*DES_KEY_SIZE)) { atmel_tdes_setkey() 823 memcpy(ctx->key, key, keylen); atmel_tdes_setkey() 824 ctx->keylen = keylen; atmel_tdes_setkey() 777 atmel_des_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) atmel_des_setkey() argument 803 atmel_tdes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) atmel_tdes_setkey() argument
|
H A D | geode-aes.h | 70 u32 keylen; member in struct:geode_aes_op
|
H A D | sahara.c | 151 int keylen; member in struct:sahara_ctx 486 memcpy(dev->key_base, ctx->key, ctx->keylen); sahara_hw_descriptor_create() 496 dev->hw_desc[idx]->len2 = ctx->keylen; sahara_hw_descriptor_create() 628 unsigned int keylen) sahara_aes_setkey() 633 ctx->keylen = keylen; sahara_aes_setkey() 636 if (keylen == AES_KEYSIZE_128) { sahara_aes_setkey() 637 memcpy(ctx->key, key, keylen); sahara_aes_setkey() 642 if (keylen != AES_KEYSIZE_128 && sahara_aes_setkey() 643 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) sahara_aes_setkey() 653 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); sahara_aes_setkey() 698 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { sahara_aes_ecb_encrypt() 716 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { sahara_aes_ecb_decrypt() 734 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { sahara_aes_cbc_encrypt() 752 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { sahara_aes_cbc_decrypt() 627 sahara_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) sahara_aes_setkey() argument
|
H A D | omap-aes.c | 102 int keylen; member in struct:omap_aes_ctx 263 key32 = dd->ctx->keylen / sizeof(u32); omap_aes_write_ctrl() 274 val = FLD_VAL(((dd->ctx->keylen >> 3) - 1), 4, 3); omap_aes_write_ctrl() 746 unsigned int keylen) omap_aes_setkey() 750 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && omap_aes_setkey() 751 keylen != AES_KEYSIZE_256) omap_aes_setkey() 754 pr_debug("enter, keylen: %d\n", keylen); omap_aes_setkey() 756 memcpy(ctx->key, key, keylen); omap_aes_setkey() 757 ctx->keylen = keylen; omap_aes_setkey() 745 omap_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) omap_aes_setkey() argument
|
H A D | atmel-aes.c | 85 int keylen; member in struct:atmel_aes_ctx 507 if (dd->ctx->keylen == AES_KEYSIZE_128) atmel_aes_write_ctrl() 509 else if (dd->ctx->keylen == AES_KEYSIZE_192) atmel_aes_write_ctrl() 551 dd->ctx->keylen >> 2); atmel_aes_write_ctrl() 824 unsigned int keylen) atmel_aes_setkey() 828 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && atmel_aes_setkey() 829 keylen != AES_KEYSIZE_256) { atmel_aes_setkey() 834 memcpy(ctx->key, key, keylen); atmel_aes_setkey() 835 ctx->keylen = keylen; atmel_aes_setkey() 823 atmel_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) atmel_aes_setkey() argument
|
H A D | omap-des.c | 83 int keylen; member in struct:omap_des_ctx 258 key32 = dd->ctx->keylen / sizeof(u32); omap_des_write_ctrl() 728 unsigned int keylen) omap_des_setkey() 732 if (keylen != DES_KEY_SIZE && keylen != (3*DES_KEY_SIZE)) omap_des_setkey() 735 pr_debug("enter, keylen: %d\n", keylen); omap_des_setkey() 737 memcpy(ctx->key, key, keylen); omap_des_setkey() 738 ctx->keylen = keylen; omap_des_setkey() 727 omap_des_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) omap_des_setkey() argument
|
H A D | talitos.c | 646 unsigned int keylen; member in struct:talitos_ctx 680 const u8 *key, unsigned int keylen) aead_setkey() 685 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) aead_setkey() 694 ctx->keylen = keys.authkeylen + keys.enckeylen; aead_setkey() 1321 const u8 *key, unsigned int keylen) ablkcipher_setkey() 1325 memcpy(&ctx->key, key, keylen); ablkcipher_setkey() 1326 ctx->keylen = keylen; ablkcipher_setkey() 1387 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, common_nonsnoop() 1582 if (ctx->keylen) common_nonsnoop_hash() 1583 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, common_nonsnoop_hash() 1770 /* When the tfm context has a keylen, it's an HMAC. ahash_process_req() 1773 if (ctx->keylen && (req_ctx->first || req_ctx->last)) ahash_process_req() 1834 static int keyhash(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen, keyhash() argument 1850 /* Keep tfm keylen == 0 during hash of the long key */ keyhash() 1851 ctx->keylen = 0; keyhash() 1855 sg_init_one(&sg[0], key, keylen); keyhash() 1857 ahash_request_set_crypt(req, sg, hash, keylen); keyhash() 1878 unsigned int keylen) ahash_setkey() 1884 unsigned int keysize = keylen; ahash_setkey() 1888 if (keylen <= blocksize) ahash_setkey() 1892 ret = keyhash(tfm, key, keylen, hash); ahash_setkey() 1903 ctx->keylen = keysize; ahash_setkey() 2429 ctx->keylen = 0; talitos_cra_init_ahash() 679 aead_setkey(struct crypto_aead *authenc, const u8 *key, unsigned int keylen) aead_setkey() argument 1320 ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) ablkcipher_setkey() argument 1877 ahash_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) ahash_setkey() argument
|
H A D | mv_cesa.c | 774 unsigned int keylen) mv_hash_setkey() 783 rc = crypto_shash_setkey(ctx->fallback, key, keylen); mv_hash_setkey() 804 if (keylen > bs) { mv_hash_setkey() 808 crypto_shash_digest(shash, key, keylen, ipad); mv_hash_setkey() 812 keylen = ds; mv_hash_setkey() 814 memcpy(ipad, key, keylen); mv_hash_setkey() 816 memset(ipad + keylen, 0, bs - keylen); mv_hash_setkey() 773 mv_hash_setkey(struct crypto_ahash *tfm, const u8 * key, unsigned int keylen) mv_hash_setkey() argument
|
H A D | omap-sham.c | 1184 unsigned int keylen) omap_sham_setkey() 1205 err = crypto_shash_setkey(tctx->fallback, key, keylen); omap_sham_setkey() 1209 if (keylen > bs) { omap_sham_setkey() 1212 key, keylen, bctx->ipad); omap_sham_setkey() 1215 keylen = ds; omap_sham_setkey() 1217 memcpy(bctx->ipad, key, keylen); omap_sham_setkey() 1220 memset(bctx->ipad + keylen, 0, bs - keylen); omap_sham_setkey() 1183 omap_sham_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) omap_sham_setkey() argument
|
H A D | ixp4xx_crypto.c | 37 /* hash: cfgword + 2 * digestlen; crypt: keylen + cfgword */ 769 /* NPE wants keylen set to DES3_EDE_KEY_SIZE even for single DES */ setup_cipher() 1148 unsigned int keylen) aead_setkey() 1153 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) aead_setkey() 1147 aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) aead_setkey() argument
|
H A D | bfin_crc.c | 474 unsigned int keylen) bfin_crypto_crc_setkey() 479 if (keylen != CHKSUM_DIGEST_SIZE) { bfin_crypto_crc_setkey() 473 bfin_crypto_crc_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) bfin_crypto_crc_setkey() argument
|
H A D | hifn_795x.c | 1126 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) hifn_setup_crypto_command() 1151 if (keylen) { hifn_setup_crypto_command() 1152 memcpy(buf_pos, key, keylen); hifn_setup_crypto_command() 1153 buf_pos += keylen; hifn_setup_crypto_command() 1124 hifn_setup_crypto_command(struct hifn_device *dev, u8 *buf, unsigned dlen, unsigned slen, u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) hifn_setup_crypto_command() argument
|
H A D | picoxcell_crypto.c | 494 unsigned int keylen) spacc_aead_setkey() 501 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) spacc_aead_setkey() 493 spacc_aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) spacc_aead_setkey() argument
|
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/ |
H A D | capa.c | 243 u8 *key, unsigned int *keylen, ll_crypto_hmac() 251 rv = crypto_hash_setkey(desc.tfm, key, *keylen); ll_crypto_hmac() 263 int keylen; capa_hmac() local 278 keylen = alg->ha_keylen; capa_hmac() 285 ll_crypto_hmac(tfm, key, &keylen, &sl, sl.length, hmac); capa_hmac() 292 int capa_encrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) capa_encrypt_id() argument 311 if (keylen < min) { capa_encrypt_id() 312 CERROR("keylen at least %d bits for aes\n", min * 8); capa_encrypt_id() 345 int capa_decrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) capa_decrypt_id() argument 364 if (keylen < min) { capa_decrypt_id() 365 CERROR("keylen at least %d bits for aes\n", min * 8); capa_decrypt_id() 242 ll_crypto_hmac(struct crypto_hash *tfm, u8 *key, unsigned int *keylen, struct scatterlist *sg, unsigned int size, u8 *result) ll_crypto_hmac() argument
|
H A D | obd_config.c | 1300 int i, keylen, vallen; class_process_proc_param() local 1326 keylen = sval - key; class_process_proc_param() 1335 && keylen == strlen(var->name)) { class_process_proc_param() 1353 if (strnchr(key, keylen, '.')) class_process_proc_param()
|
/linux-4.1.27/lib/ |
H A D | btree.c | 52 int keylen; member in struct:btree_geo 58 .keylen = 1, 66 .keylen = LONG_PER_U64, 73 .keylen = 2 * LONG_PER_U64, 140 for (i = geo->keylen - 1; i >= 0; i--) { dec_key() 150 return &node[n * geo->keylen]; bkey() 161 longcpy(bkey(geo, node, n), key, geo->keylen); setkey() 172 longset(bkey(geo, node, n), 0, geo->keylen); clearpair() 219 longcpy(key, bkey(geo, node, 0), geo->keylen); btree_last() 227 return longcmp(bkey(geo, node, pos), key, geo->keylen); keycmp() 234 for (i = 0; i < geo->keylen; i++) keyzero() 316 unsigned long *retry_key = NULL, key[geo->keylen]; btree_get_prev() 323 longcpy(key, __key, geo->keylen); btree_get_prev() 347 longcpy(__key, bkey(geo, node, i), geo->keylen); btree_get_prev() 355 longcpy(key, retry_key, geo->keylen); btree_get_prev() 642 unsigned long key[geo->keylen]; btree_merge() 643 unsigned long dup[geo->keylen]; btree_merge() 669 longcpy(dup, key, geo->keylen); btree_merge()
|
H A D | assoc_array.c | 500 size_t keylen; assoc_array_insert_into_terminal_node() local 775 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); assoc_array_insert_into_terminal_node() 776 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; assoc_array_insert_into_terminal_node() 779 keylen * sizeof(unsigned long), GFP_KERNEL); assoc_array_insert_into_terminal_node() 797 for (i = 0; i < keylen; i++) assoc_array_insert_into_terminal_node() 802 pr_devel("blank off [%zu] %d: %lx\n", keylen - 1, level, blank); assoc_array_insert_into_terminal_node() 803 new_s0->index_key[keylen - 1] &= ~blank; assoc_array_insert_into_terminal_node() 832 size_t keylen; assoc_array_insert_mid_shortcut() local 881 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); assoc_array_insert_mid_shortcut() 882 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; assoc_array_insert_mid_shortcut() 885 keylen * sizeof(unsigned long), GFP_KERNEL); assoc_array_insert_mid_shortcut() 899 keylen * sizeof(unsigned long)); assoc_array_insert_mid_shortcut() 902 pr_devel("blank off [%zu] %d: %lx\n", keylen - 1, diff, blank); assoc_array_insert_mid_shortcut() 903 new_s0->index_key[keylen - 1] &= ~blank; assoc_array_insert_mid_shortcut() 931 keylen = round_up(shortcut->skip_to_level, ASSOC_ARRAY_KEY_CHUNK_SIZE); assoc_array_insert_mid_shortcut() 932 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; assoc_array_insert_mid_shortcut() 935 keylen * sizeof(unsigned long), GFP_KERNEL); assoc_array_insert_mid_shortcut() 948 keylen * sizeof(unsigned long)); assoc_array_insert_mid_shortcut() 1496 int keylen, slot, nr_free, next_slot, i; assoc_array_gc() local 1522 keylen = round_up(shortcut->skip_to_level, ASSOC_ARRAY_KEY_CHUNK_SIZE); assoc_array_gc() 1523 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; assoc_array_gc() 1525 keylen * sizeof(unsigned long), GFP_KERNEL); assoc_array_gc() 1530 keylen * sizeof(unsigned long))); assoc_array_gc()
|
/linux-4.1.27/drivers/crypto/ux500/hash/ |
H A D | hash_core.c | 262 if (!ctx->keylen) { get_empty_message_digest() 435 * @keylen: The lengt of the key. 442 const u8 *key, unsigned int keylen) hash_hw_write_key() 449 while (keylen >= 4) { hash_hw_write_key() 453 keylen -= 4; hash_hw_write_key() 458 if (keylen) { hash_hw_write_key() 460 while (keylen) { hash_hw_write_key() 461 word |= (key[keylen - 1] << (8 * (keylen - 1))); hash_hw_write_key() 462 keylen--; hash_hw_write_key() 500 hash_hw_write_key(device_data, ctx->key, ctx->keylen); init_hash_hw() 571 ctx->keylen = 0; hash_init() 732 if (device_data->current_ctx->keylen > HASH_BLOCK_SIZE) { hash_setconfiguration() 917 hash_hw_write_key(device_data, ctx->key, ctx->keylen); hash_dma_final() 948 unsigned int keylen = ctx->keylen; hash_dma_final() local 951 dev_dbg(device_data->dev, "%s: keylen: %d\n", hash_dma_final() 952 __func__, ctx->keylen); hash_dma_final() 953 hash_hw_write_key(device_data, key, keylen); hash_dma_final() 997 } else if (req->nbytes == 0 && ctx->keylen == 0) { hash_hw_final() 1024 } else if (req->nbytes == 0 && ctx->keylen > 0) { hash_hw_final() 1049 unsigned int keylen = ctx->keylen; hash_hw_final() local 1052 dev_dbg(device_data->dev, "%s: keylen: %d\n", hash_hw_final() 1053 __func__, ctx->keylen); hash_hw_final() 1054 hash_hw_write_key(device_data, key, keylen); hash_hw_final() 1347 const u8 *key, unsigned int keylen, int alg) hash_setkey() 1355 ctx->key = kmemdup(key, keylen, GFP_KERNEL); hash_setkey() 1361 ctx->keylen = keylen; hash_setkey() 1479 const u8 *key, unsigned int keylen) hmac_sha1_setkey() 1481 return hash_setkey(tfm, key, keylen, HASH_ALGO_SHA1); hmac_sha1_setkey() 1485 const u8 *key, unsigned int keylen) hmac_sha256_setkey() 1487 return hash_setkey(tfm, key, keylen, HASH_ALGO_SHA256); hmac_sha256_setkey() 441 hash_hw_write_key(struct hash_device_data *device_data, const u8 *key, unsigned int keylen) hash_hw_write_key() argument 1346 hash_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen, int alg) hash_setkey() argument 1478 hmac_sha1_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) hmac_sha1_setkey() argument 1484 hmac_sha256_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) hmac_sha256_setkey() argument
|
H A D | hash_alg.h | 322 * @keylen: The length of the key. 330 u32 keylen; member in struct:hash_ctx
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_crypto.h | 76 unsigned int keylen, u32 *flags); 87 unsigned int keylen, u32 *flags); 142 const u8 *key, unsigned int keylen); 170 const u8 *key, unsigned int keylen); 299 const u8 *key, unsigned int keylen) crypto_digest_setkey() 304 return tfm->crt_digest.dit_setkey(tfm, key, keylen); crypto_digest_setkey() 308 const u8 *key, unsigned int keylen) crypto_cipher_setkey() 311 return tfm->crt_cipher.cit_setkey(tfm, key, keylen); crypto_cipher_setkey() 298 crypto_digest_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) crypto_digest_setkey() argument 307 crypto_cipher_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) crypto_cipher_setkey() argument
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | twofish_glue_3way.c | 217 unsigned int keylen) lrw_twofish_setkey() 222 err = __twofish_setkey(&ctx->twofish_ctx, key, keylen - TF_BLOCK_SIZE, lrw_twofish_setkey() 227 return lrw_init_table(&ctx->lrw_table, key + keylen - TF_BLOCK_SIZE); lrw_twofish_setkey() 274 unsigned int keylen) xts_twofish_setkey() 283 if (keylen % 2) { xts_twofish_setkey() 289 err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); xts_twofish_setkey() 294 return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, xts_twofish_setkey() 216 lrw_twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_twofish_setkey() argument 273 xts_twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_twofish_setkey() argument
|
H A D | cast6_avx_glue.c | 249 unsigned int keylen) lrw_cast6_setkey() 254 err = __cast6_setkey(&ctx->cast6_ctx, key, keylen - CAST6_BLOCK_SIZE, lrw_cast6_setkey() 259 return lrw_init_table(&ctx->lrw_table, key + keylen - CAST6_BLOCK_SIZE); lrw_cast6_setkey() 327 unsigned int keylen) xts_cast6_setkey() 336 if (keylen % 2) { xts_cast6_setkey() 342 err = __cast6_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); xts_cast6_setkey() 347 return __cast6_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, xts_cast6_setkey() 248 lrw_cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_cast6_setkey() argument 326 xts_cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_cast6_setkey() argument
|
H A D | fpu.c | 28 unsigned int keylen) crypto_fpu_setkey() 37 err = crypto_blkcipher_setkey(child, key, keylen); crypto_fpu_setkey() 27 crypto_fpu_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) crypto_fpu_setkey() argument
|
H A D | serpent_avx_glue.c | 257 unsigned int keylen) lrw_serpent_setkey() 262 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - lrw_serpent_setkey() 267 return lrw_init_table(&ctx->lrw_table, key + keylen - lrw_serpent_setkey() 333 unsigned int keylen) xts_serpent_setkey() 342 if (keylen % 2) { xts_serpent_setkey() 348 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); xts_serpent_setkey() 353 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); xts_serpent_setkey() 256 lrw_serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_serpent_setkey() argument 332 xts_serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_serpent_setkey() argument
|
H A D | serpent_sse2_glue.c | 230 unsigned int keylen) lrw_serpent_setkey() 235 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - lrw_serpent_setkey() 240 return lrw_init_table(&ctx->lrw_table, key + keylen - lrw_serpent_setkey() 309 unsigned int keylen) xts_serpent_setkey() 318 if (keylen % 2) { xts_serpent_setkey() 324 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); xts_serpent_setkey() 329 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); xts_serpent_setkey() 229 lrw_serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_serpent_setkey() argument 308 xts_serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_serpent_setkey() argument
|
H A D | ghash-clmulni-intel_glue.c | 56 const u8 *key, unsigned int keylen) ghash_setkey() 62 if (keylen != GHASH_BLOCK_SIZE) { ghash_setkey() 244 unsigned int keylen) ghash_async_setkey() 253 err = crypto_ahash_setkey(child, key, keylen); ghash_async_setkey() 55 ghash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) ghash_setkey() argument 243 ghash_async_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) ghash_async_setkey() argument
|
H A D | crc32-pclmul_glue.c | 92 unsigned int keylen) crc32_pclmul_setkey() 96 if (keylen != sizeof(u32)) { crc32_pclmul_setkey() 91 crc32_pclmul_setkey(struct crypto_shash *hash, const u8 *key, unsigned int keylen) crc32_pclmul_setkey() argument
|
H A D | crc32c-intel_glue.c | 116 unsigned int keylen) crc32c_intel_setkey() 120 if (keylen != sizeof(u32)) { crc32c_intel_setkey() 115 crc32c_intel_setkey(struct crypto_shash *hash, const u8 *key, unsigned int keylen) crc32c_intel_setkey() argument
|
H A D | aesni-intel_glue.c | 569 unsigned int keylen) lrw_aesni_setkey() 575 keylen - AES_BLOCK_SIZE); lrw_aesni_setkey() 579 return lrw_init_table(&ctx->lrw_table, key + keylen - AES_BLOCK_SIZE); lrw_aesni_setkey() 638 unsigned int keylen) xts_aesni_setkey() 647 if (keylen % 2) { xts_aesni_setkey() 653 err = aes_set_key_common(tfm, ctx->raw_crypt_ctx, key, keylen / 2); xts_aesni_setkey() 658 return aes_set_key_common(tfm, ctx->raw_tweak_ctx, key + keylen / 2, xts_aesni_setkey() 659 keylen / 2); xts_aesni_setkey() 568 lrw_aesni_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_aesni_setkey() argument 637 xts_aesni_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_aesni_setkey() argument
|
H A D | camellia_glue.c | 1441 unsigned int keylen) lrw_camellia_setkey() 1447 keylen - CAMELLIA_BLOCK_SIZE, lrw_camellia_setkey() 1453 key + keylen - CAMELLIA_BLOCK_SIZE); lrw_camellia_setkey() 1500 unsigned int keylen) xts_camellia_setkey() 1509 if (keylen % 2) { xts_camellia_setkey() 1515 err = __camellia_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); xts_camellia_setkey() 1520 return __camellia_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, xts_camellia_setkey() 1440 lrw_camellia_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) lrw_camellia_setkey() argument 1499 xts_camellia_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) xts_camellia_setkey() argument
|
H A D | des3_ede_glue.c | 360 unsigned int keylen) des3_ede_x86_setkey() 367 err = __des3_ede_setkey(ctx->enc_expkey, &tfm->crt_flags, key, keylen); des3_ede_x86_setkey() 359 des3_ede_x86_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) des3_ede_x86_setkey() argument
|
/linux-4.1.27/fs/cifs/ |
H A D | cache.c | 233 uint16_t keylen; cifs_fscache_inode_get_key() local 236 keylen = sizeof(cifsi->uniqueid); cifs_fscache_inode_get_key() 237 if (keylen > maxbuf) cifs_fscache_inode_get_key() 238 keylen = 0; cifs_fscache_inode_get_key() 240 memcpy(buffer, &cifsi->uniqueid, keylen); cifs_fscache_inode_get_key() 242 return keylen; cifs_fscache_inode_get_key()
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | ablkcipher.c | 163 unsigned int keylen) qce_ablkcipher_setkey() 170 if (!key || !keylen) qce_ablkcipher_setkey() 174 switch (keylen) { qce_ablkcipher_setkey() 190 ctx->enc_keylen = keylen; qce_ablkcipher_setkey() 191 memcpy(ctx->enc_key, key, keylen); qce_ablkcipher_setkey() 194 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); qce_ablkcipher_setkey() 196 ctx->enc_keylen = keylen; qce_ablkcipher_setkey() 162 qce_ablkcipher_setkey(struct crypto_ablkcipher *ablk, const u8 *key, unsigned int keylen) qce_ablkcipher_setkey() argument
|
H A D | common.c | 326 unsigned int keylen; qce_setup_regs_ablkcipher() local 334 keylen = ctx->enc_keylen / 2; qce_setup_regs_ablkcipher() 336 keylen = ctx->enc_keylen; qce_setup_regs_ablkcipher() 338 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); qce_setup_regs_ablkcipher() 339 enckey_words = keylen / sizeof(u32); qce_setup_regs_ablkcipher() 343 encr_cfg = qce_encr_cfg(flags, keylen); qce_setup_regs_ablkcipher()
|
H A D | sha.c | 368 unsigned int keylen) qce_ahash_hmac_setkey() 384 if (keylen <= blocksize) { qce_ahash_hmac_setkey() 385 memcpy(ctx->authkey, key, keylen); qce_ahash_hmac_setkey() 412 buf = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, GFP_KERNEL); qce_ahash_hmac_setkey() 418 memcpy(buf, key, keylen); qce_ahash_hmac_setkey() 419 sg_init_one(&sg, buf, keylen); qce_ahash_hmac_setkey() 420 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); qce_ahash_hmac_setkey() 367 qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) qce_ahash_hmac_setkey() argument
|
/linux-4.1.27/fs/fscache/ |
H A D | object-list.c | 255 uint16_t keylen = 0, auxlen = 0; fscache_objlist_show() local 278 keylen = cookie->def->get_key(cookie->netfs_data, fscache_objlist_show() 284 buf + keylen, 512 - keylen); fscache_objlist_show() 287 if (keylen > 0 || auxlen > 0) { fscache_objlist_show() 289 for (p = buf; keylen > 0; keylen--) fscache_objlist_show()
|
/linux-4.1.27/fs/befs/ |
H A D | btree.c | 117 int index, u16 * keylen); 344 u16 keylen; befs_find_key() local 357 thiskey = befs_bt_get_key(sb, node, last, &keylen); befs_find_key() 359 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); befs_find_key() 374 thiskey = befs_bt_get_key(sb, node, mid, &keylen); befs_find_key() 375 eq = befs_compare_strings(thiskey, keylen, findkey, befs_find_key() 429 u16 keylen; befs_btree_read() local 498 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); befs_btree_read() 502 (int)keylen); befs_btree_read() 504 if (bufsize < keylen + 1) { befs_btree_read() 506 "for key of size %d", __func__, bufsize, keylen); befs_btree_read() 511 strlcpy(keybuf, keystart, keylen + 1); befs_btree_read() 513 *keysize = keylen; befs_btree_read() 516 cur_key, keylen, keybuf, *value); befs_btree_read() 618 * befs_bt_keylen_index - Finds start of keylen index in a node 619 * @node: Pointer to the node structure to find the keylen index within 678 * @keylen: modified to be the length of the key at @index 681 * Returns NULL on failure (bad input) and sets *@keylen = 0 685 int index, u16 * keylen) befs_bt_get_key() 692 *keylen = 0; befs_bt_get_key() 704 *keylen = fs16_to_cpu(sb, keylen_index[index]) - prev_key_end; befs_bt_get_key() 684 befs_bt_get_key(struct super_block *sb, struct befs_btree_node *node, int index, u16 * keylen) befs_bt_get_key() argument
|
/linux-4.1.27/drivers/net/ppp/ |
H A D | ppp_mppe.c | 102 unsigned keylen; /* key length in bytes */ member in struct:ppp_mppe_state 144 nbytes = setup_sg(&sg[0], state->master_key, state->keylen); get_new_key_from_sha() 147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); get_new_key_from_sha() 169 state->keylen); mppe_rekey() 172 setup_sg(sg_in, state->sha1_digest, state->keylen); mppe_rekey() 173 setup_sg(sg_out, state->session_key, state->keylen); mppe_rekey() 175 state->keylen) != 0) { mppe_rekey() 179 memcpy(state->session_key, state->sha1_digest, state->keylen); mppe_rekey() 181 if (state->keylen == 8) { mppe_rekey() 187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); mppe_rekey() 285 state->keylen = 16; mppe_init() 287 state->keylen = 8; mppe_init() 305 debugstr, unit, (state->keylen == 16) ? 128 : 40, mppe_init()
|
/linux-4.1.27/drivers/staging/vt6655/ |
H A D | key.c | 101 if (key->keylen == WLAN_KEY_LEN_WEP40) vnt_set_keymode() 103 if (key->keylen == WLAN_KEY_LEN_WEP104) vnt_set_keymode()
|
H A D | rxtx.c | 1227 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); vnt_fill_txkey() 1229 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { vnt_fill_txkey() 1407 if (tx_key->keylen > 0) vnt_generate_fifo_header()
|
/linux-4.1.27/drivers/staging/vt6656/ |
H A D | key.c | 110 if (key->keylen == WLAN_KEY_LEN_WEP40) vnt_set_keymode() 112 if (key->keylen == WLAN_KEY_LEN_WEP104) vnt_set_keymode()
|
H A D | rxtx.c | 727 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); vnt_fill_txkey() 729 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { vnt_fill_txkey() 958 if (tx_key->keylen > 0) vnt_tx_packet()
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/ |
H A D | linux-crypto-adler.c | 55 unsigned int keylen) adler32_setkey() 59 if (keylen != sizeof(u32)) { adler32_setkey() 54 adler32_setkey(struct crypto_shash *hash, const u8 *key, unsigned int keylen) adler32_setkey() argument
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | crc32c_glue.c | 31 unsigned int keylen) crc32c_sparc64_setkey() 35 if (keylen != sizeof(u32)) { crc32c_sparc64_setkey() 30 crc32c_sparc64_setkey(struct crypto_shash *hash, const u8 *key, unsigned int keylen) crc32c_sparc64_setkey() argument
|
H A D | des_glue.c | 44 unsigned int keylen) des_set_key() 201 unsigned int keylen) des3_ede_set_key() 43 des_set_key(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) des_set_key() argument 200 des3_ede_set_key(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) des3_ede_set_key() argument
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | ghash_s390.c | 41 const u8 *key, unsigned int keylen) ghash_setkey() 45 if (keylen != GHASH_BLOCK_SIZE) { ghash_setkey() 40 ghash_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) ghash_setkey() argument
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | ghash-ce-glue.c | 104 const u8 *inkey, unsigned int keylen) ghash_setkey() 109 if (keylen != GHASH_BLOCK_SIZE) { ghash_setkey() 103 ghash_setkey(struct crypto_shash *tfm, const u8 *inkey, unsigned int keylen) ghash_setkey() argument
|
H A D | crc32-arm64.c | 116 unsigned int keylen) chksum_setkey() 120 if (keylen != sizeof(mctx->key)) { chksum_setkey() 115 chksum_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) chksum_setkey() argument
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 455 const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_init_com() 461 memcpy(cd->aes.key, key, keylen); qat_alg_ablkcipher_init_com() 467 cd_ctrl->cipher_key_sz = keylen >> 3; qat_alg_ablkcipher_init_com() 476 unsigned int keylen) qat_alg_ablkcipher_init_enc() 482 qat_alg_ablkcipher_init_com(ctx, req, enc_cd, key, keylen); qat_alg_ablkcipher_init_enc() 489 unsigned int keylen) qat_alg_ablkcipher_init_dec() 495 qat_alg_ablkcipher_init_com(ctx, req, dec_cd, key, keylen); qat_alg_ablkcipher_init_dec() 519 const uint8_t *key, unsigned int keylen) qat_alg_aead_init_sessions() 527 if (crypto_authenc_extractkeys(&keys, key, keylen)) qat_alg_aead_init_sessions() 549 unsigned int keylen) qat_alg_ablkcipher_init_sessions() 553 if (qat_alg_validate_key(keylen, &alg)) qat_alg_ablkcipher_init_sessions() 556 qat_alg_ablkcipher_init_enc(ctx, alg, key, keylen); qat_alg_ablkcipher_init_sessions() 557 qat_alg_ablkcipher_init_dec(ctx, alg, key, keylen); qat_alg_ablkcipher_init_sessions() 565 unsigned int keylen) qat_alg_aead_setkey() 606 if (qat_alg_aead_init_sessions(ctx, key, keylen)) qat_alg_aead_setkey() 952 unsigned int keylen) qat_alg_ablkcipher_setkey() 993 if (qat_alg_ablkcipher_init_sessions(ctx, key, keylen)) qat_alg_ablkcipher_setkey() 452 qat_alg_ablkcipher_init_com(struct qat_alg_ablkcipher_ctx *ctx, struct icp_qat_fw_la_bulk_req *req, struct icp_qat_hw_cipher_algo_blk *cd, const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_init_com() argument 474 qat_alg_ablkcipher_init_enc(struct qat_alg_ablkcipher_ctx *ctx, int alg, const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_init_enc() argument 487 qat_alg_ablkcipher_init_dec(struct qat_alg_ablkcipher_ctx *ctx, int alg, const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_init_dec() argument 518 qat_alg_aead_init_sessions(struct qat_alg_aead_ctx *ctx, const uint8_t *key, unsigned int keylen) qat_alg_aead_init_sessions() argument 547 qat_alg_ablkcipher_init_sessions(struct qat_alg_ablkcipher_ctx *ctx, const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_init_sessions() argument 564 qat_alg_aead_setkey(struct crypto_aead *tfm, const uint8_t *key, unsigned int keylen) qat_alg_aead_setkey() argument 950 qat_alg_ablkcipher_setkey(struct crypto_ablkcipher *tfm, const uint8_t *key, unsigned int keylen) qat_alg_ablkcipher_setkey() argument
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
H A D | cryp_core.c | 63 * @keylen: Length of key. 77 u32 keylen; member in struct:cryp_ctx 338 int num_of_regs = ctx->keylen / 8; cfg_keys() 347 ctx->keylen); cfg_keys() 349 for (i = 0; i < ctx->keylen / 4; i++) cfg_keys() 945 const u8 *key, unsigned int keylen) aes_ablkcipher_setkey() 952 switch (keylen) { aes_ablkcipher_setkey() 966 pr_err(DEV_DBG_NAME "[%s]: Unknown keylen!", __func__); aes_ablkcipher_setkey() 971 memcpy(ctx->key, key, keylen); aes_ablkcipher_setkey() 972 ctx->keylen = keylen; aes_ablkcipher_setkey() 980 const u8 *key, unsigned int keylen) des_ablkcipher_setkey() 988 if (keylen != DES_KEY_SIZE) { des_ablkcipher_setkey() 1003 memcpy(ctx->key, key, keylen); des_ablkcipher_setkey() 1004 ctx->keylen = keylen; des_ablkcipher_setkey() 1011 const u8 *key, unsigned int keylen) des3_ablkcipher_setkey() 1020 if (keylen != DES3_EDE_KEY_SIZE) { des3_ablkcipher_setkey() 1046 memcpy(ctx->key, key, keylen); des3_ablkcipher_setkey() 1047 ctx->keylen = keylen; des3_ablkcipher_setkey() 944 aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) aes_ablkcipher_setkey() argument 979 des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) des_ablkcipher_setkey() argument 1010 des3_ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) des3_ablkcipher_setkey() argument
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/ |
H A D | lustre_capa.h | 64 #define DEF_CAPA_HMAC_ALG(name, type, len, keylen) \ 68 .ha_keylen = keylen, \ 191 int capa_encrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen); 192 int capa_decrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen);
|
H A D | obd_class.h | 508 struct obd_export *exp, __u32 keylen, obd_get_info() 517 rc = OBP(exp->exp_obd, get_info)(env, exp, keylen, key, vallen, val, obd_get_info() 523 struct obd_export *exp, u32 keylen, obd_set_info_async() 532 rc = OBP(exp->exp_obd, set_info_async)(env, exp, keylen, key, vallen, obd_set_info_async() 507 obd_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *lsm) obd_get_info() argument 522 obd_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) obd_set_info_async() argument
|
H A D | lustre_lib.h | 77 u32 keylen, void *key,
|
H A D | obd.h | 1107 __u32 keylen, void *key, __u32 *vallen, void *val, 1110 __u32 keylen, void *key,
|
H A D | obd_support.h | 817 (keylen >= (sizeof(str)-1) && memcmp(key, str, (sizeof(str)-1)) == 0)
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
H A D | cryptocop.h | 75 size_t keylen; member in struct:strcop_session_op
|
/linux-4.1.27/arch/arm/crypto/ |
H A D | ghash-ce-glue.c | 110 const u8 *inkey, unsigned int keylen) ghash_setkey() 115 if (keylen != GHASH_BLOCK_SIZE) { ghash_setkey() 230 unsigned int keylen) ghash_async_setkey() 239 err = crypto_ahash_setkey(child, key, keylen); ghash_async_setkey() 109 ghash_setkey(struct crypto_shash *tfm, const u8 *inkey, unsigned int keylen) ghash_setkey() argument 229 ghash_async_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) ghash_async_setkey() argument
|
/linux-4.1.27/security/keys/ |
H A D | trusted.c | 77 unsigned int keylen, ...) TSS_rawhmac() 91 ret = crypto_shash_setkey(hmacalg, key, keylen); TSS_rawhmac() 98 va_start(argp, keylen); TSS_rawhmac() 124 unsigned int keylen, unsigned char *h1, TSS_authhmac() 163 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, TSS_authhmac() 178 unsigned int keylen, ...) TSS_checkhmac1() 223 va_start(argp, keylen); TSS_checkhmac1() 239 ret = TSS_rawhmac(testhmac, key, keylen, SHA1_DIGEST_SIZE, paramdigest, TSS_checkhmac1() 807 long keylen; datablob_parse() local 823 ret = kstrtol(c, 10, &keylen); datablob_parse() 824 if (ret < 0 || keylen < MIN_KEY_SIZE || keylen > MAX_KEY_SIZE) datablob_parse() 826 p->key_len = keylen; datablob_parse() 76 TSS_rawhmac(unsigned char *digest, const unsigned char *key, unsigned int keylen, ...) TSS_rawhmac() argument 123 TSS_authhmac(unsigned char *digest, const unsigned char *key, unsigned int keylen, unsigned char *h1, unsigned char *h2, unsigned char h3, ...) TSS_authhmac() argument 174 TSS_checkhmac1(unsigned char *buffer, const uint32_t command, const unsigned char *ononce, const unsigned char *key, unsigned int keylen, ...) TSS_checkhmac1() argument
|
/linux-4.1.27/drivers/isdn/i4l/ |
H A D | isdn_v110.c | 60 * FlipBits reorders sequences of keylen bits in one byte. 61 * E.g. source order 7654321 will be converted to 45670123 when keylen = 4, 62 * and to 67452301 when keylen = 2. This is necessary because ordering on 66 FlipBits(unsigned char c, int keylen) FlipBits() argument 72 int hunks = (8 / keylen); FlipBits() 76 for (j = 0; j < keylen; j++) { FlipBits() 78 c |= bit >> (keylen - j - 1); FlipBits() 80 bit >>= keylen; FlipBits() local
|
/linux-4.1.27/drivers/isdn/mISDN/ |
H A D | dsp_blowfish.c | 595 * The margin of keylen must be 4-56 bytes. 599 dsp_bf_init(struct dsp *dsp, const u8 *key, uint keylen) dsp_bf_init() argument 606 if (keylen < 4 || keylen > 56) dsp_bf_init() 634 ((u32)key[(j + 1) % keylen] << 16) | dsp_bf_init() 635 ((u32)key[(j + 2) % keylen] << 8) | dsp_bf_init() 636 ((u32)key[(j + 3) % keylen])); dsp_bf_init() 639 j = (j + 4) % keylen; dsp_bf_init()
|
H A D | dsp.h | 266 extern int dsp_bf_init(struct dsp *dsp, const u8 *key, unsigned int keylen);
|
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/ |
H A D | smd.h | 91 u8 keylen, 97 u8 keylen,
|
H A D | main.c | 398 key_conf->keylen, key_conf->flags); wcn36xx_set_key() 401 key_conf->keylen); wcn36xx_set_key() 437 memcpy(key, key_conf->key, key_conf->keylen); wcn36xx_set_key() 453 key_conf->keylen, wcn36xx_set_key() 460 key_conf->keylen, wcn36xx_set_key() 468 key_conf->keylen, wcn36xx_set_key()
|
H A D | smd.c | 1459 u8 keylen, wcn36xx_smd_set_stakey() 1476 msg_body.set_sta_key_params.key[0].length = keylen; wcn36xx_smd_set_stakey() 1477 memcpy(msg_body.set_sta_key_params.key[0].key, key, keylen); wcn36xx_smd_set_stakey() 1500 u8 keylen, wcn36xx_smd_set_bsskey() 1515 msg_body.keys[0].length = keylen; wcn36xx_smd_set_bsskey() 1516 memcpy(msg_body.keys[0].key, key, keylen); wcn36xx_smd_set_bsskey() 1456 wcn36xx_smd_set_stakey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key, u8 sta_index) wcn36xx_smd_set_stakey() argument 1497 wcn36xx_smd_set_bsskey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key) wcn36xx_smd_set_bsskey() argument
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
H A D | hw.c | 858 int keylen; __orinoco_hw_setup_wepkeys() local 862 keylen = priv->keys[priv->tx_key].key_len; __orinoco_hw_setup_wepkeys() 864 if (keylen > LARGE_KEY_SIZE) { __orinoco_hw_setup_wepkeys() 866 priv->ndev->name, priv->tx_key, keylen); __orinoco_hw_setup_wepkeys() 868 } else if (keylen > SMALL_KEY_SIZE) __orinoco_hw_setup_wepkeys() 869 keylen = LARGE_KEY_SIZE; __orinoco_hw_setup_wepkeys() 870 else if (keylen > 0) __orinoco_hw_setup_wepkeys() 871 keylen = SMALL_KEY_SIZE; __orinoco_hw_setup_wepkeys() 873 keylen = 0; __orinoco_hw_setup_wepkeys() 884 HERMES_BYTES_TO_RECLEN(keylen), __orinoco_hw_setup_wepkeys()
|
/linux-4.1.27/include/linux/ |
H A D | crypto.h | 283 unsigned int keylen); 324 unsigned int keylen); 351 unsigned int keylen); 417 unsigned int keylen); 593 unsigned int keylen); 607 unsigned int keylen); 623 unsigned int keylen); 632 const u8 *key, unsigned int keylen); 645 unsigned int keylen); 986 * @keylen: length of the key in bytes 999 const u8 *key, unsigned int keylen) crypto_ablkcipher_setkey() 1003 return crt->setkey(crt->base, key, keylen); crypto_ablkcipher_setkey() 1336 * @keylen: length of the key in bytes 1349 unsigned int keylen) crypto_aead_setkey() 1353 return crt->setkey(crt->base, key, keylen); crypto_aead_setkey() 1771 * @keylen: length of the key in bytes 1784 const u8 *key, unsigned int keylen) crypto_blkcipher_setkey() 1787 key, keylen); crypto_blkcipher_setkey() 2056 * @keylen: length of the key in bytes 2069 const u8 *key, unsigned int keylen) crypto_cipher_setkey() 2072 key, keylen); crypto_cipher_setkey() 2321 * @keylen: length of the key in bytes 2329 const u8 *key, unsigned int keylen) crypto_hash_setkey() 2331 return crypto_hash_crt(hash)->setkey(hash, key, keylen); crypto_hash_setkey() 998 crypto_ablkcipher_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int keylen) crypto_ablkcipher_setkey() argument 1348 crypto_aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) crypto_aead_setkey() argument 1783 crypto_blkcipher_setkey(struct crypto_blkcipher *tfm, const u8 *key, unsigned int keylen) crypto_blkcipher_setkey() argument 2068 crypto_cipher_setkey(struct crypto_cipher *tfm, const u8 *key, unsigned int keylen) crypto_cipher_setkey() argument 2328 crypto_hash_setkey(struct crypto_hash *hash, const u8 *key, unsigned int keylen) crypto_hash_setkey() argument
|
/linux-4.1.27/arch/cris/include/arch-v32/arch/ |
H A D | cryptocop.h | 37 unsigned int keylen; member in struct:cryptocop_transform_init
|
/linux-4.1.27/net/ipv4/ |
H A D | esp4.c | 553 unsigned int keylen; esp_init_authenc() local 583 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + esp_init_authenc() 586 key = kmalloc(keylen, GFP_KERNEL); esp_init_authenc() 625 err = crypto_aead_setkey(aead, key, keylen); esp_init_authenc()
|
H A D | tcp_ipv4.c | 923 key->keylen = newkeylen; tcp_md5_do_add() 949 key->keylen = newkeylen; tcp_md5_do_add() 1320 AF_INET, key->key, key->keylen, GFP_ATOMIC); tcp_v4_syn_recv_sock()
|
H A D | tcp.c | 2987 sg_init_one(&sg, key->key, key->keylen); tcp_md5_hash_key() 2988 return crypto_hash_update(&hp->md5_desc, &sg, key->keylen); tcp_md5_hash_key()
|
/linux-4.1.27/net/ipv6/ |
H A D | esp6.c | 495 unsigned int keylen; esp_init_authenc() local 525 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + esp_init_authenc() 528 key = kmalloc(keylen, GFP_KERNEL); esp_init_authenc() 567 err = crypto_aead_setkey(aead, key, keylen); esp_init_authenc()
|
H A D | tcp_ipv6.c | 1170 AF_INET6, key->key, key->keylen, tcp_v6_syn_recv_sock()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 455 get_aes_decrypt_key(tc->tctx->dec_key, tc->tctx->init.key, tc->tctx->init.keylen); setup_key_dl_desc() 459 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; setup_key_dl_desc() 462 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; setup_key_dl_desc() 466 switch (tc->tctx->init.keylen) { setup_key_dl_desc() 1463 if (tinit->keylen != 0) { transform_ok() 1464 DEBUG_API(printk("transform_ok: non-zero keylength, %d, for a digest/csum algorithm\n", tinit->keylen)); transform_ok() 1469 if (tinit->keylen != 64) { transform_ok() 1470 DEBUG_API(printk("transform_ok: keylen %d invalid for DES\n", tinit->keylen)); transform_ok() 1475 if (tinit->keylen != 192) { transform_ok() 1476 DEBUG_API(printk("transform_ok: keylen %d invalid for 3DES\n", tinit->keylen)); transform_ok() 1481 if (tinit->keylen != 128 && tinit->keylen != 192 && tinit->keylen != 256) { transform_ok() 1482 DEBUG_API(printk("transform_ok: keylen %d invalid for AES\n", tinit->keylen)); transform_ok() 2987 if (!access_ok(VERIFY_READ, sop.key, sop.keylen)) return -EFAULT; cryptocop_ioctl_create_session() 3017 copy_from_user(ti_cipher.key, sop.key, sop.keylen/8); cryptocop_ioctl_create_session() 3018 ti_cipher.keylen = sop.keylen; cryptocop_ioctl_create_session()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/ |
H A D | sta.c | 1075 if (keyconf->keylen != WEP_KEY_LEN_128 && iwl_set_default_wep_key() 1076 keyconf->keylen != WEP_KEY_LEN_64) { iwl_set_default_wep_key() 1078 "Bad WEP key length %d\n", keyconf->keylen); iwl_set_default_wep_key() 1084 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; iwl_set_default_wep_key() 1086 keyconf->keylen); iwl_set_default_wep_key() 1090 keyconf->keylen, keyconf->keyidx, ret); iwl_set_default_wep_key() 1149 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); iwlagn_send_sta_key() 1156 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); iwlagn_send_sta_key() 1163 memcpy(&sta_cmd.key.key[3], keyconf->key, keyconf->keylen); iwlagn_send_sta_key() 1303 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_set_dynamic_key()
|
H A D | tx.c | 218 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); iwlagn_tx_cmd_build_hwcrypto() 235 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); iwlagn_tx_cmd_build_hwcrypto()
|
/linux-4.1.27/drivers/staging/lustre/lustre/mdc/ |
H A D | mdc_request.c | 1193 __u32 keylen, vallen; mdc_ioc_fid2path() local 1203 keylen = cfs_size_round(sizeof(KEY_FID2PATH)) + sizeof(*gf); mdc_ioc_fid2path() 1204 OBD_ALLOC(key, keylen); mdc_ioc_fid2path() 1221 rc = obd_get_info(NULL, exp, keylen, key, &vallen, gf, NULL); mdc_ioc_fid2path() 1237 OBD_FREE(key, keylen); mdc_ioc_fid2path() 1981 u32 keylen, void *key, mdc_get_info_rpc() 1994 RCL_CLIENT, keylen); mdc_get_info_rpc() 2005 memcpy(tmp, key, keylen); mdc_get_info_rpc() 2156 u32 keylen, void *key, mdc_set_info_async() 2180 keylen, key, vallen, val, set); mdc_set_info_async() 2193 keylen, key, vallen, val, set); mdc_set_info_async() 2206 __u32 keylen, void *key, __u32 *vallen, void *val, mdc_get_info() 2264 rc = mdc_get_info_rpc(exp, keylen, key, *vallen, val); mdc_get_info() 1980 mdc_get_info_rpc(struct obd_export *exp, u32 keylen, void *key, int vallen, void *val) mdc_get_info_rpc() argument 2154 mdc_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) mdc_set_info_async() argument 2205 mdc_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *lsm) mdc_get_info() argument
|
/linux-4.1.27/drivers/staging/rtl8712/ |
H A D | rtl871x_mlme.c | 1242 u8 keylen; r8712_set_key() local 1264 keylen = 5; r8712_set_key() 1266 psecuritypriv->DefKey[keyid].skey, keylen); r8712_set_key() 1269 keylen = 13; r8712_set_key() 1271 psecuritypriv->DefKey[keyid].skey, keylen); r8712_set_key() 1278 keylen = 16; r8712_set_key() 1280 &psecuritypriv->XGrpKey[keyid - 1], keylen); r8712_set_key() 1288 keylen = 16; r8712_set_key() 1290 &psecuritypriv->XGrpKey[keyid - 1], keylen); r8712_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/ |
H A D | key.c | 504 hk.kv_len = key->keylen; ath_key_config() 505 if (key->keylen) ath_key_config() 506 memcpy(hk.kv_val, key->key, key->keylen); ath_key_config()
|
/linux-4.1.27/drivers/hv/ |
H A D | hv_kvp.c | 474 int keylen = 0; kvp_respond_to_host() local 563 keylen = utf8s_to_utf16s(key_name, strlen(key_name), UTF16_HOST_ENDIAN, kvp_respond_to_host() 566 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ kvp_respond_to_host() 579 if ((keylen < 0) || (valuelen < 0)) kvp_respond_to_host()
|
/linux-4.1.27/drivers/net/wireless/ath/carl9170/ |
H A D | mac.c | 476 const int keylen) carl9170_upload_key() 489 memcpy(&key.key, keydata, keylen); carl9170_upload_key() 474 carl9170_upload_key(struct ar9170 *ar, const u8 id, const u8 *mac, const u8 ktype, const u8 keyidx, const u8 *keydata, const int keylen) carl9170_upload_key() argument
|
H A D | carl9170.h | 566 const u8 ktype, const u8 keyidx, const u8 *keydata, const int keylen);
|
H A D | main.c | 1249 min_t(u8, 16, key->keylen)); carl9170_op_set_key()
|
/linux-4.1.27/net/wireless/ |
H A D | lib80211_crypt_ccmp.c | 182 u8 *aeskey, int keylen, void *priv) lib80211_ccmp_hdr() 191 if (aeskey != NULL && keylen >= CCMP_TK_LEN) lib80211_ccmp_hdr() 181 lib80211_ccmp_hdr(struct sk_buff *skb, int hdr_len, u8 *aeskey, int keylen, void *priv) lib80211_ccmp_hdr() argument
|
H A D | lib80211_crypt_wep.c | 92 u8 *key, int keylen, void *priv) lib80211_wep_build_iv() 91 lib80211_wep_build_iv(struct sk_buff *skb, int hdr_len, u8 *key, int keylen, void *priv) lib80211_wep_build_iv() argument
|
H A D | lib80211_crypt_tkip.c | 310 u8 * rc4key, int keylen, void *priv) lib80211_tkip_hdr() 321 if (rc4key == NULL || keylen < 16) lib80211_tkip_hdr() 309 lib80211_tkip_hdr(struct sk_buff *skb, int hdr_len, u8 * rc4key, int keylen, void *priv) lib80211_tkip_hdr() argument
|
/linux-4.1.27/drivers/net/wireless/hostap/ |
H A D | hostap_main.c | 333 int i, keylen, len, idx; hostap_set_encryption() local 387 * same keylen */ hostap_set_encryption() 388 keylen = 6; /* first 5 octets */ hostap_set_encryption() 392 keylen = WEP_KEY_LEN + 1; /* first 13 octets */ hostap_set_encryption() 403 keybuf, keylen)) { hostap_set_encryption() 405 i, keylen); hostap_set_encryption()
|
/linux-4.1.27/drivers/staging/lustre/lustre/lov/ |
H A D | lov_obd.c | 1732 static int lov_fiemap(struct lov_obd *lov, __u32 keylen, void *key, lov_fiemap() argument 1886 keylen, key, vallen, fm_local, lsm); lov_fiemap() 1970 __u32 keylen, void *key, __u32 *vallen, void *val, lov_get_info() 2035 rc = obd_get_info(env, tgt->ltd_exp, keylen, key, lov_get_info() 2046 rc = lov_fiemap(lov, keylen, key, vallen, val, lsm); lov_get_info() 2078 u32 keylen, void *key, u32 vallen, lov_set_info_async() 2147 keylen, key, sizeof(int), lov_set_info_async() 2151 keylen, key, vallen, lov_set_info_async() 2163 err = obd_set_info_async(env, tgt->ltd_exp, keylen, lov_set_info_async() 2173 keylen, key, vallen, val, set); lov_set_info_async() 1969 lov_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *lsm) lov_get_info() argument 2077 lov_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) lov_set_info_async() argument
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
H A D | rtw_mlme.c | 1781 u8 keylen; rtw_set_key23a() local 1831 keylen = 5; rtw_set_key23a() 1833 &psecuritypriv->wep_key[keyid].key, keylen); rtw_set_key23a() 1836 keylen = 13; rtw_set_key23a() 1838 &psecuritypriv->wep_key[keyid].key, keylen); rtw_set_key23a() 1841 keylen = 16; rtw_set_key23a() 1843 &psecuritypriv->dot118021XGrpKey[keyid], keylen); rtw_set_key23a() 1847 keylen = 16; rtw_set_key23a() 1849 &psecuritypriv->dot118021XGrpKey[keyid], keylen); rtw_set_key23a()
|
H A D | rtw_security.c | 175 keylength = psecuritypriv->wep_key[index].keylen; rtw_wep_encrypt23a() 233 keylength = psecuritypriv->wep_key[keyindex].keylen; rtw_wep_decrypt23a()
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
H A D | rtw_mlme.c | 1619 u8 keylen; rtw_set_key() local 1660 keylen = 5; rtw_set_key() 1661 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); rtw_set_key() 1664 keylen = 13; rtw_set_key() 1665 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); rtw_set_key() 1668 keylen = 16; rtw_set_key() 1669 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); rtw_set_key() 1673 keylen = 16; rtw_set_key() 1674 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); rtw_set_key()
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 610 int keylen; gss_import_v2_context() local 644 keylen = ctx->gk5e->keylength; gss_import_v2_context() 646 p = simple_get_bytes(p, end, ctx->Ksess, keylen); gss_import_v2_context()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
H A D | sta.c | 1212 memcpy(cmd.key, keyconf->key, keyconf->keylen); iwl_mvm_send_sta_key() 1216 memcpy(cmd.key, keyconf->key, keyconf->keylen); iwl_mvm_send_sta_key() 1223 memcpy(cmd.key + 3, keyconf->key, keyconf->keylen); iwl_mvm_send_sta_key() 1227 memcpy(cmd.key, keyconf->key, keyconf->keylen); iwl_mvm_send_sta_key() 1279 memcpy(igtk_cmd.IGTK, keyconf->key, keyconf->keylen); iwl_mvm_send_sta_igtk() 1469 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_mvm_set_sta_key()
|
H A D | d3.c | 177 .wep_key.key_size = key->keylen, iwl_mvm_wowlan_program_keys() 188 memcpy(&wkc.wep_key.key[3], key->key, key->keylen); iwl_mvm_wowlan_program_keys() 1523 conf.conf.keylen = WLAN_KEY_LEN_CCMP; iwl_mvm_setup_connection_keep() 1528 conf.conf.keylen = WLAN_KEY_LEN_TKIP; iwl_mvm_setup_connection_keep()
|
H A D | tx.c | 254 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); iwl_mvm_set_tx_cmd_crypto() 272 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); iwl_mvm_set_tx_cmd_crypto()
|
/linux-4.1.27/drivers/staging/rtl8723au/include/ |
H A D | rtw_security.h | 88 u16 keylen; member in struct:rtw_wep_key
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
H A D | main.c | 913 key->cipher, key->keyidx, key->keylen, key->flags); wl1251_op_set_key() 914 wl1251_dump(DEBUG_CRYPT, "KEY: ", key->key, key->keylen); wl1251_op_set_key() 966 memcpy(wl_cmd->key, key->key, key->keylen); wl1251_op_set_key() 968 wl_cmd->key_size = key->keylen; wl1251_op_set_key()
|
/linux-4.1.27/security/keys/encrypted-keys/ |
H A D | encrypted.c | 227 pr_info("encrypted_key: keylen parameter is missing\n"); datablob_parse() 338 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, calc_hmac() argument 350 ret = crypto_shash_setkey(hmacalg, key, keylen); calc_hmac() 621 pr_err("encrypted_key: keylen for the ecryptfs format " encrypted_key_alloc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/ |
H A D | core.c | 1603 key->key, key->keylen); rtl_op_set_key() 1604 rtlpriv->sec.key_len[key_idx] = key->keylen; rtl_op_set_key() 1613 key->key, key->keylen); rtl_op_set_key() 1614 rtlpriv->sec.key_len[key_idx] = key->keylen; rtl_op_set_key() 1630 key->key, key->keylen); rtl_op_set_key() 1631 rtlpriv->sec.key_len[PAIRWISE_KEYIDX] = key->keylen; rtl_op_set_key() 1658 memset(rtlpriv->sec.key_buf[key_idx], 0, key->keylen); rtl_op_set_key()
|
/linux-4.1.27/drivers/net/wireless/cw1200/ |
H A D | sta.c | 718 if (key->keylen > 16) { cw1200_set_key() 729 &key->key[0], key->keylen); cw1200_set_key() 730 wsm_key->wep_pairwise.keylen = key->keylen; cw1200_set_key() 734 &key->key[0], key->keylen); cw1200_set_key() 735 wsm_key->wep_group.keylen = key->keylen; cw1200_set_key()
|
H A D | wsm.h | 1020 u8 keylen; /* Key length in bytes */ member in struct:wsm_add_key::__anon7818::__anon7819 1025 u8 keylen; /* Key length in bytes */ member in struct:wsm_add_key::__anon7818::__anon7820
|
/linux-4.1.27/drivers/staging/lustre/lustre/osc/ |
H A D | osc_request.c | 892 u32 keylen, void *key, u32 vallen, 2739 u32 keylen, void *key, __u32 *vallen, void *val, osc_get_info() 2762 RCL_CLIENT, keylen); osc_get_info() 2770 memcpy(tmp, key, keylen); osc_get_info() 2839 RCL_CLIENT, keylen); osc_get_info() 2852 memcpy(tmp, key, keylen); osc_get_info() 2880 u32 keylen, void *key, u32 vallen, osc_set_info_async() 2952 RCL_CLIENT, keylen); osc_set_info_async() 2963 memcpy(tmp, key, keylen); osc_set_info_async() 2738 osc_get_info(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *lsm) osc_get_info() argument 2879 osc_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) osc_set_info_async() argument
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
H A D | host.h | 819 __le16 keylen; member in struct:MrvlIEtype_keyParamSet 821 /* key material of size keylen */
|
H A D | cfg.c | 1037 cmd.param.keylen = cpu_to_le16(key_len); lbs_set_key_material()
|
/linux-4.1.27/drivers/net/wireless/rsi/ |
H A D | rsi_91x_mac80211.c | 577 __func__, key->cipher, key_type, key->keylen); rsi_hal_key_config() 583 key->keylen, rsi_hal_key_config() 592 key->keylen, rsi_hal_key_config()
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
H A D | rt2x00mac.c | 481 if (key->keylen > 32) rt2x00mac_set_key() 503 memcpy_tkip(&crypto, &key->key[0], key->keylen); rt2x00mac_set_key() 505 memcpy(crypto.key, &key->key[0], key->keylen); rt2x00mac_set_key()
|
/linux-4.1.27/drivers/net/wireless/iwlegacy/ |
H A D | 4965-mac.c | 1622 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); il4965_tx_cmd_build_hwcrypto() 1642 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); il4965_tx_cmd_build_hwcrypto() 3221 int len = keyconf->keylen; il4965_set_default_wep_key() 3227 D_WEP("Bad WEP key length %d\n", keyconf->keylen); il4965_set_default_wep_key() 3260 if (keyconf->keylen == WEP_KEY_LEN_128) il4965_set_wep_dynamic_key_info() 3269 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; il4965_set_wep_dynamic_key_info() 3272 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); il4965_set_wep_dynamic_key_info() 3275 keyconf->keylen); il4965_set_wep_dynamic_key_info() 3319 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; il4965_set_ccmp_dynamic_key_info() 3321 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); il4965_set_ccmp_dynamic_key_info() 3323 memcpy(il->stations[sta_id].sta.key.key, keyconf->key, keyconf->keylen); il4965_set_ccmp_dynamic_key_info() 3367 il->stations[sta_id].keyinfo.keylen = 16; il4965_set_tkip_dynamic_key_info() 3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il4965_set_dynamic_key()
|
H A D | 3945-mac.c | 152 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; il3945_set_ccmp_dynamic_key_info() 153 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); il3945_set_ccmp_dynamic_key_info() 155 memcpy(il->stations[sta_id].sta.key.key, keyconf->key, keyconf->keylen); il3945_set_ccmp_dynamic_key_info() 239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il3945_set_dynamic_key() 377 memcpy(tx_cmd->key, keyinfo->key, keyinfo->keylen); il3945_build_tx_cmd_hwcrypto() 393 memcpy(&tx_cmd->key[3], keyinfo->key, keyinfo->keylen); il3945_build_tx_cmd_hwcrypto()
|
H A D | common.h | 666 int keylen; member in struct:il_hw_key
|
/linux-4.1.27/drivers/net/wireless/ |
H A D | at76c50x-usb.c | 1361 "keylen %d", wiphy_name(priv->hw->wiphy), priv->essid_size, at76_startup_device() 2143 "key->keylen %d", at76_set_key() 2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); at76_set_key() 2156 memcpy(priv->wep_keys[key->keyidx], key->key, key->keylen); at76_set_key() 2157 priv->wep_keys_len[key->keyidx] = key->keylen; at76_set_key()
|
H A D | mwl8k.c | 4278 cmd->key_len = cpu_to_le16(key->keylen); mwl8k_encryption_set_cmd_info() 4342 sizeof(*key) + key->keylen); mwl8k_cmd_encryption_set_key() 4346 keymlen = key->keylen; mwl8k_cmd_encryption_set_key() 4353 keymlen = key->keylen; mwl8k_cmd_encryption_set_key()
|
H A D | airo.c | 1292 static void emmh32_setseed(emmh32_context *context, u8 *pkey, int keylen, 1631 static void emmh32_setseed(emmh32_context *context, u8 *pkey, int keylen, emmh32_setseed() argument 5203 u16 keylen, int perm, int lock) set_wep_key() 5209 if (WARN_ON(keylen == 0)) set_wep_key() 5215 wkr.klen = cpu_to_le16(keylen); set_wep_key() 5216 memcpy(wkr.key, key, keylen); set_wep_key() 5202 set_wep_key(struct airo_info *ai, u16 index, const char *key, u16 keylen, int perm, int lock) set_wep_key() argument
|
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/ |
H A D | ioctl_cfg80211.c | 517 psecuritypriv->wep_key[key_index].keylen = key_len; rtw_cfg80211_ap_set_encryption() 750 psecuritypriv->wep_key[key_index].keylen = key_len; rtw_cfg80211_set_encryption() 983 if (psecuritypriv->wep_key[key_index].keylen == 13) { cfg80211_rtw_set_default_key() 1748 switch (wep->keylen) { rtw_cfg80211_add_wep() 1769 __func__, wep->keylen, keyid); rtw_cfg80211_add_wep() 2103 wep_key.keylen = wep_key_len; 2117 memcpy(wep_key.key, (void *)sme->key, wep_key.keylen);
|
/linux-4.1.27/drivers/staging/rtl8188eu/os_dep/ |
H A D | ioctl_linux.c | 2150 u8 keylen; set_group_key() local 2180 keylen = 5; set_group_key() 2183 keylen = 13; set_group_key() 2189 keylen = 16; set_group_key() 2192 memcpy(&(psetkeyparm->key[0]), key, keylen); set_group_key() 2209 static int set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid) set_wep_key() argument 2213 switch (keylen) { set_wep_key()
|
/linux-4.1.27/drivers/staging/lustre/lustre/lmv/ |
H A D | lmv_obd.c | 2326 __u32 keylen, void *key, __u32 *vallen, void *val, lmv_get_info() 2341 if (keylen >= strlen("remote_flag") && !strcmp(key, "remote_flag")) { lmv_get_info() 2358 if (!obd_get_info(env, tgt->ltd_exp, keylen, key, lmv_get_info() 2376 rc = obd_get_info(env, lmv->tgts[0]->ltd_exp, keylen, key, lmv_get_info() 2391 u32 keylen, void *key, u32 vallen, lmv_set_info_async() 2417 keylen, key, vallen, val, set); lmv_set_info_async() 2325 lmv_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *lsm) lmv_get_info() argument 2390 lmv_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) lmv_set_info_async() argument
|
/linux-4.1.27/drivers/staging/lustre/lustre/ldlm/ |
H A D | ldlm_lockd.c | 489 int keylen, vallen; ldlm_handle_setinfo() local 501 keylen = req_capsule_get_size(&req->rq_pill, &RMF_SETINFO_KEY, ldlm_handle_setinfo()
|
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/ |
H A D | pack_generic.c | 1575 u32 keylen, void *key, do_set_info_async() 1588 RCL_CLIENT, keylen); do_set_info_async() 1598 memcpy(tmp, key, keylen); do_set_info_async() 1573 do_set_info_async(struct obd_import *imp, int opcode, int version, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) do_set_info_async() argument
|
/linux-4.1.27/drivers/net/wireless/p54/ |
H A D | main.c | 597 key->keylen, addr, key->key); p54_set_key()
|
H A D | txrx.c | 903 txhdr->key_len = min((u8)16, info->control.hw_key->keylen); p54_tx_80211()
|
/linux-4.1.27/drivers/staging/lustre/lustre/mgc/ |
H A D | mgc_request.c | 971 u32 keylen, void *key, u32 vallen, mgc_set_info_async() 1048 __u32 keylen, void *key, __u32 *vallen, void *val, mgc_get_info() 970 mgc_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) mgc_set_info_async() argument 1047 mgc_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *unused) mgc_get_info() argument
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
H A D | ipw2100.c | 5389 int keylen = len ? (len <= 5 ? 5 : 13) : 0; ipw2100_set_key() local 5399 idx, keylen, len); ipw2100_set_key() 5406 wep_key->len = keylen; ipw2100_set_key() 5408 if (keylen) { ipw2100_set_key() 5410 memset(wep_key->key + len, 0, keylen - len); ipw2100_set_key() 5414 if (keylen == 0) ipw2100_set_key() 5417 else if (keylen == 5) ipw2100_set_key()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
H A D | main.c | 3474 key_conf->keylen, key_conf->flags); wlcore_set_key() 3475 wl1271_dump(DEBUG_CRYPT, "KEY: ", key_conf->key, key_conf->keylen); wlcore_set_key() 3521 key_conf->keylen, key_conf->key, wlcore_set_key() 3547 key_conf->keylen, key_conf->key, wlcore_set_key()
|
/linux-4.1.27/include/net/ |
H A D | tcp.h | 1259 u8 keylen; member in struct:tcp_md5sig_key
|
/linux-4.1.27/drivers/net/wireless/b43/ |
H A D | main.c | 4255 key->key, key->keylen, b43_op_set_key() 4260 key->key, key->keylen, NULL, key); b43_op_set_key()
|