Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 200 of 202) sorted by relevance

12

/linux-4.1.27/drivers/staging/wlan-ng/
Dp80211wep.c123 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument
125 if (keylen < 0) in wep_change_key()
127 if (keylen >= MAX_KEYLEN) in wep_change_key()
137 pr_debug("WEP key %d len %d = %*phC\n", keynum, keylen, in wep_change_key()
141 wlandev->wep_keylens[keynum] = keylen; in wep_change_key()
142 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key()
154 u32 i, j, k, crc, keylen; in wep_decrypt() local
174 keylen = wlandev->wep_keylens[keyidx]; in wep_decrypt()
176 if (keylen == 0) in wep_decrypt()
180 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt()
[all …]
Dp80211netdev.h230 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen);
/linux-4.1.27/fs/cachefiles/
Dkey.c37 char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type) in cachefiles_cook_key() argument
44 _enter(",%d", keylen); in cachefiles_cook_key()
46 BUG_ON(keylen < 2 || keylen > 514); in cachefiles_cook_key()
50 for (loop = 2; loop < keylen; loop++) { in cachefiles_cook_key()
58 max = keylen - 2; in cachefiles_cook_key()
67 keylen = (keylen + 2) / 3; in cachefiles_cook_key()
69 max = keylen * 4; in cachefiles_cook_key()
102 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key()
121 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key()
Dinterface.c34 unsigned keylen, auxlen; in cachefiles_alloc_object() local
68 keylen = cookie->def->get_key(cookie->netfs_data, buffer + 2, 512); in cachefiles_alloc_object()
69 ASSERTCMP(keylen, <, 512); in cachefiles_alloc_object()
71 *(uint16_t *)buffer = keylen; in cachefiles_alloc_object()
72 ((char *)buffer)[keylen + 2] = 0; in cachefiles_alloc_object()
73 ((char *)buffer)[keylen + 3] = 0; in cachefiles_alloc_object()
74 ((char *)buffer)[keylen + 4] = 0; in cachefiles_alloc_object()
77 key = cachefiles_cook_key(buffer, keylen + 2, object->type); in cachefiles_alloc_object()
Dnamei.c36 unsigned keylen, loop; in __cachefiles_printk_object() local
59 keylen = cookie->def->get_key(cookie->netfs_data, keybuf, in __cachefiles_printk_object()
62 keylen = 0; in __cachefiles_printk_object()
65 keylen = 0; in __cachefiles_printk_object()
69 if (keylen) { in __cachefiles_printk_object()
70 pr_err("%skey=[%u] '", prefix, keylen); in __cachefiles_printk_object()
71 for (loop = 0; loop < keylen; loop++) in __cachefiles_printk_object()
Dinternal.h156 extern char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type);
/linux-4.1.27/fs/hfs/
Dbfind.c45 u16 off, len, keylen; in __hfs_brec_find() local
56 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find()
57 if (keylen == 0) { in __hfs_brec_find()
61 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find()
75 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find()
76 if (keylen == 0) { in __hfs_brec_find()
80 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find()
85 fd->keylength = keylen; in __hfs_brec_find()
86 fd->entryoffset = off + keylen; in __hfs_brec_find()
87 fd->entrylength = len - keylen; in __hfs_brec_find()
[all …]
/linux-4.1.27/fs/hfsplus/
Dbfind.c116 u16 off, len, keylen; in __hfs_brec_find() local
128 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find()
129 if (keylen == 0) { in __hfs_brec_find()
133 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find()
142 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find()
143 if (keylen == 0) { in __hfs_brec_find()
147 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find()
153 fd->keylength = keylen; in __hfs_brec_find()
154 fd->entryoffset = off + keylen; in __hfs_brec_find()
155 fd->entrylength = len - keylen; in __hfs_brec_find()
[all …]
/linux-4.1.27/crypto/
Dcipher.c24 unsigned int keylen) in setkey_unaligned() argument
32 absize = keylen + alignmask; in setkey_unaligned()
38 memcpy(alignbuffer, key, keylen); in setkey_unaligned()
39 ret = cia->cia_setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
40 memset(alignbuffer, 0, keylen); in setkey_unaligned()
46 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument
52 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { in setkey()
58 return setkey_unaligned(tfm, key, keylen); in setkey()
60 return cia->cia_setkey(tfm, key, keylen); in setkey()
Dblowfish_common.c349 int blowfish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in blowfish_setkey() argument
369 ((u32)key[(j + 1) % keylen] << 16) | in blowfish_setkey()
370 ((u32)key[(j + 2) % keylen] << 8) | in blowfish_setkey()
371 ((u32)key[(j + 3) % keylen])); in blowfish_setkey()
374 j = (j + 4) % keylen; in blowfish_setkey()
Dhmac.c45 const u8 *inkey, unsigned int keylen) in hmac_setkey() argument
62 if (keylen > bs) { in hmac_setkey()
65 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey()
69 keylen = ds; in hmac_setkey()
71 memcpy(ipad, inkey, keylen); in hmac_setkey()
73 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
Dshash.c28 unsigned int keylen) in shash_no_setkey() argument
34 unsigned int keylen) in shash_setkey_unaligned() argument
42 absize = keylen + (alignmask & ~(crypto_tfm_ctx_alignment() - 1)); in shash_setkey_unaligned()
48 memcpy(alignbuffer, key, keylen); in shash_setkey_unaligned()
49 err = shash->setkey(tfm, alignbuffer, keylen); in shash_setkey_unaligned()
55 unsigned int keylen) in crypto_shash_setkey() argument
61 return shash_setkey_unaligned(tfm, key, keylen); in crypto_shash_setkey()
63 return shash->setkey(tfm, key, keylen); in crypto_shash_setkey()
202 unsigned int keylen) in shash_async_setkey() argument
206 return crypto_shash_setkey(*ctx, key, keylen); in shash_async_setkey()
[all …]
Dblkcipher.c375 unsigned int keylen) in setkey_unaligned() argument
383 absize = keylen + alignmask; in setkey_unaligned()
389 memcpy(alignbuffer, key, keylen); in setkey_unaligned()
390 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
391 memset(alignbuffer, 0, keylen); in setkey_unaligned()
396 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument
401 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey()
407 return setkey_unaligned(tfm, key, keylen); in setkey()
409 return cipher->setkey(tfm, key, keylen); in setkey()
413 unsigned int keylen) in async_setkey() argument
[all …]
Dablkcipher.c308 unsigned int keylen) in setkey_unaligned() argument
316 absize = keylen + alignmask; in setkey_unaligned()
322 memcpy(alignbuffer, key, keylen); in setkey_unaligned()
323 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
324 memset(alignbuffer, 0, keylen); in setkey_unaligned()
330 unsigned int keylen) in setkey() argument
335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey()
341 return setkey_unaligned(tfm, key, keylen); in setkey()
343 return cipher->setkey(tfm, key, keylen); in setkey()
Dahash.c189 unsigned int keylen) in ahash_setkey_unaligned() argument
196 absize = keylen + alignmask; in ahash_setkey_unaligned()
202 memcpy(alignbuffer, key, keylen); in ahash_setkey_unaligned()
203 ret = tfm->setkey(tfm, alignbuffer, keylen); in ahash_setkey_unaligned()
209 unsigned int keylen) in crypto_ahash_setkey() argument
214 return ahash_setkey_unaligned(tfm, key, keylen); in crypto_ahash_setkey()
216 return tfm->setkey(tfm, key, keylen); in crypto_ahash_setkey()
221 unsigned int keylen) in ahash_nosetkey() argument
Dctr.c39 unsigned int keylen) in crypto_ctr_setkey() argument
48 err = crypto_cipher_setkey(child, key, keylen); in crypto_ctr_setkey()
253 const u8 *key, unsigned int keylen) in crypto_rfc3686_setkey() argument
260 if (keylen < CTR_RFC3686_NONCE_SIZE) in crypto_rfc3686_setkey()
263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey()
266 keylen -= CTR_RFC3686_NONCE_SIZE; in crypto_rfc3686_setkey()
271 err = crypto_ablkcipher_setkey(child, key, keylen); in crypto_rfc3686_setkey()
Daead.c30 unsigned int keylen) in setkey_unaligned() argument
38 absize = keylen + alignmask; in setkey_unaligned()
44 memcpy(alignbuffer, key, keylen); in setkey_unaligned()
45 ret = aead->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
46 memset(alignbuffer, 0, keylen); in setkey_unaligned()
51 static int setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) in setkey() argument
57 return setkey_unaligned(tfm, key, keylen); in setkey()
59 return aead->setkey(tfm, key, keylen); in setkey()
Dxts.c34 unsigned int keylen) in setkey() argument
43 if (keylen % 2) { in setkey()
57 err = crypto_cipher_setkey(child, key + keylen/2, keylen/2); in setkey()
70 err = crypto_cipher_setkey(child, key, keylen/2); in setkey()
Dcrc32.c64 unsigned int keylen) in crc32_setkey() argument
68 if (keylen != sizeof(u32)) { in crc32_setkey()
Dcrc32c_generic.c77 unsigned int keylen) in chksum_setkey() argument
81 if (keylen != sizeof(mctx->key)) { in chksum_setkey()
Daf_alg.c202 unsigned int keylen) in alg_setkey() argument
209 key = sock_kmalloc(sk, keylen, GFP_KERNEL); in alg_setkey()
214 if (copy_from_user(key, ukey, keylen)) in alg_setkey()
217 err = type->setkey(ask->private, key, keylen); in alg_setkey()
220 sock_kzfree_s(sk, key, keylen); in alg_setkey()
Dccm.c77 unsigned int keylen) in crypto_ccm_setkey() argument
87 err = crypto_ablkcipher_setkey(ctr, key, keylen); in crypto_ccm_setkey()
96 err = crypto_cipher_setkey(tfm, key, keylen); in crypto_ccm_setkey()
639 unsigned int keylen) in crypto_rfc4309_setkey() argument
645 if (keylen < 3) in crypto_rfc4309_setkey()
648 keylen -= 3; in crypto_rfc4309_setkey()
649 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey()
654 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4309_setkey()
Dghash-generic.c45 const u8 *key, unsigned int keylen) in ghash_setkey() argument
49 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
Dcrypto_null.c61 unsigned int keylen) in null_hash_setkey() argument
65 unsigned int keylen) in null_setkey() argument
Dmichael_mic.c137 unsigned int keylen) in michael_setkey() argument
143 if (keylen != 8) { in michael_setkey()
Dgcm.c105 unsigned int keylen) in crypto_gcm_setkey() argument
125 err = crypto_ablkcipher_setkey(ctr, key, keylen); in crypto_gcm_setkey()
859 unsigned int keylen) in crypto_rfc4106_setkey() argument
865 if (keylen < 4) in crypto_rfc4106_setkey()
868 keylen -= 4; in crypto_rfc4106_setkey()
869 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey()
874 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4106_setkey()
1070 unsigned int keylen) in crypto_rfc4543_setkey() argument
1076 if (keylen < 4) in crypto_rfc4543_setkey()
1079 keylen -= 4; in crypto_rfc4543_setkey()
[all …]
Dauthenc.c56 unsigned int keylen) in crypto_authenc_extractkeys() argument
61 if (!RTA_OK(rta, keylen)) in crypto_authenc_extractkeys()
72 keylen -= RTA_ALIGN(rta->rta_len); in crypto_authenc_extractkeys()
74 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
77 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
86 unsigned int keylen) in crypto_authenc_setkey() argument
94 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
Decb.c26 unsigned int keylen) in crypto_ecb_setkey() argument
35 err = crypto_cipher_setkey(child, key, keylen); in crypto_ecb_setkey()
Dlrw.c80 unsigned int keylen) in setkey() argument
85 const u8 *tweak = key + keylen - bsize; in setkey()
90 err = crypto_cipher_setkey(child, key, keylen - bsize); in setkey()
Dxcbc.c62 const u8 *inkey, unsigned int keylen) in crypto_xcbc_digest_setkey() argument
71 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) in crypto_xcbc_digest_setkey()
Dcmac.c55 const u8 *inkey, unsigned int keylen) in crypto_cmac_digest_setkey() argument
65 err = crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cmac_digest_setkey()
Dcbc.c27 unsigned int keylen) in crypto_cbc_setkey() argument
36 err = crypto_cipher_setkey(child, key, keylen); in crypto_cbc_setkey()
Dpcbc.c30 unsigned int keylen) in crypto_pcbc_setkey() argument
39 err = crypto_cipher_setkey(child, key, keylen); in crypto_pcbc_setkey()
Dserpent_generic.c233 unsigned int keylen) in __serpent_setkey() argument
242 for (i = 0; i < keylen; ++i) in __serpent_setkey()
439 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in serpent_setkey() argument
441 return __serpent_setkey(crypto_tfm_ctx(tfm), key, keylen); in serpent_setkey()
571 unsigned int keylen) in tnepres_setkey() argument
576 for (i = 0; i < keylen; ++i) in tnepres_setkey()
577 rev_key[keylen - i - 1] = key[i]; in tnepres_setkey()
579 return serpent_setkey(tfm, rev_key, keylen); in tnepres_setkey()
Dcts.c58 unsigned int keylen) in crypto_cts_setkey() argument
67 err = crypto_blkcipher_setkey(child, key, keylen); in crypto_cts_setkey()
Dcast6_generic.c157 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in cast6_setkey() argument
159 return __cast6_setkey(crypto_tfm_ctx(tfm), key, keylen, in cast6_setkey()
Dalgif_hash.c373 static int hash_setkey(void *private, const u8 *key, unsigned int keylen) in hash_setkey() argument
378 err = crypto_ahash_setkey(tfm->hash, key, keylen); in hash_setkey()
Ddes_generic.c782 unsigned int keylen) in des_setkey() argument
863 unsigned int keylen) in __des3_ede_setkey() argument
883 unsigned int keylen) in des3_ede_setkey() argument
889 return __des3_ede_setkey(expkey, flags, key, keylen); in des3_ede_setkey()
Dcryptd.c186 const u8 *key, unsigned int keylen) in cryptd_blkcipher_setkey() argument
195 err = crypto_blkcipher_setkey(child, key, keylen); in cryptd_blkcipher_setkey()
421 const u8 *key, unsigned int keylen) in cryptd_hash_setkey() argument
430 err = crypto_shash_setkey(child, key, keylen); in cryptd_hash_setkey()
Dpcrypt.c102 const u8 *key, unsigned int keylen) in pcrypt_aead_setkey() argument
106 return crypto_aead_setkey(ctx->child, key, keylen); in pcrypt_aead_setkey()
Dalgif_aead.c579 static int aead_setkey(void *private, const u8 *key, unsigned int keylen) in aead_setkey() argument
581 return crypto_aead_setkey(private, key, keylen); in aead_setkey()
Dmcryptd.c302 const u8 *key, unsigned int keylen) in mcryptd_hash_setkey() argument
311 err = crypto_shash_setkey(child, key, keylen); in mcryptd_hash_setkey()
Dvmac.c545 const u8 *key, unsigned int keylen) in vmac_setkey() argument
549 if (keylen != VMAC_KEY_LEN) { in vmac_setkey()
Dalgif_skcipher.c882 static int skcipher_setkey(void *private, const u8 *key, unsigned int keylen) in skcipher_setkey() argument
887 err = crypto_ablkcipher_setkey(tfm->skcipher, key, keylen); in skcipher_setkey()
Dauthencesn.c60 unsigned int keylen) in crypto_authenc_esn_setkey() argument
68 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
Dfcrypt.c303 static int fcrypt_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in fcrypt_setkey() argument
/linux-4.1.27/net/mac80211/
Dwep.c57 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument
66 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv()
74 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument
77 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv()
92 int keylen, int keyidx) in ieee80211_wep_add_iv() argument
113 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv()
163 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument
172 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt()
182 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt()
187 return ieee80211_wep_encrypt_data(local->wep_tx_tfm, rc4key, keylen + 3, in ieee80211_wep_encrypt()
[all …]
Dwep.h25 const u8 *key, int keylen, int keyidx);
Ddebugfs_key.c56 KEY_CONF_FILE(keylen, D);
277 int i, bufsize = 2 * key->conf.keylen + 2; in key_key_read()
285 for (i = 0; i < key->conf.keylen; i++) in key_key_read()
324 DEBUGFS_ADD(keylen); in ieee80211_debugfs_key_add()
Dkey.c398 key->conf.keylen = key_len; in ieee80211_key_alloc()
1155 keyconf->keylen, keyconf->key, in ieee80211_gtk_rekey_add()
/linux-4.1.27/fs/befs/
Dbtree.c117 int index, u16 * keylen);
344 u16 keylen; in befs_find_key() local
357 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key()
359 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key()
374 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key()
375 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key()
429 u16 keylen; in befs_btree_read() local
498 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read()
502 (int)keylen); in befs_btree_read()
504 if (bufsize < keylen + 1) { in befs_btree_read()
[all …]
/linux-4.1.27/drivers/crypto/caam/
Dkey_gen.c45 int split_key_pad_len, const u8 *key_in, u32 keylen, in gen_split_key() argument
59 dma_addr_in = dma_map_single(jrdev, (void *)key_in, keylen, in gen_split_key()
74 append_key(desc, dma_addr_in, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key()
95 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key()
118 dma_unmap_single(jrdev, dma_addr_in, keylen, DMA_TO_DEVICE); in gen_split_key()
Dkey_gen.h16 int split_key_pad_len, const u8 *key_in, u32 keylen,
Dcaamhash.c429 u32 keylen) in gen_split_hash_key() argument
432 ctx->split_key_pad_len, key_in, keylen, in gen_split_hash_key()
438 u32 *keylen, u8 *key_out, u32 digestsize) in hash_digest_key() argument
454 src_dma = dma_map_single(jrdev, (void *)key_in, *keylen, in hash_digest_key()
465 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); in hash_digest_key()
473 append_seq_in_ptr(desc, src_dma, *keylen, 0); in hash_digest_key()
474 append_seq_fifo_load(desc, *keylen, FIFOLD_CLASS_CLASS2 | in hash_digest_key()
482 DUMP_PREFIX_ADDRESS, 16, 4, key_in, *keylen, 1); in hash_digest_key()
502 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); in hash_digest_key()
505 *keylen = digestsize; in hash_digest_key()
[all …]
Dcaamalg.c1654 const u8 *key, unsigned int keylen) in aead_setkey() argument
1663 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
1681 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey()
1719 const u8 *key, unsigned int keylen) in gcm_setkey() argument
1727 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in gcm_setkey()
1730 memcpy(ctx->key, key, keylen); in gcm_setkey()
1731 ctx->key_dma = dma_map_single(jrdev, ctx->key, keylen, in gcm_setkey()
1737 ctx->enckeylen = keylen; in gcm_setkey()
1749 const u8 *key, unsigned int keylen) in rfc4106_setkey() argument
1755 if (keylen < 4) in rfc4106_setkey()
[all …]
/linux-4.1.27/drivers/crypto/amcc/
Dcrypto4xx_alg.c106 unsigned int keylen, in crypto4xx_setkey_aes() argument
115 if (keylen != AES_KEYSIZE_256 && in crypto4xx_setkey_aes()
116 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { in crypto4xx_setkey_aes()
126 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); in crypto4xx_setkey_aes()
154 key, keylen); in crypto4xx_setkey_aes()
155 sa->sa_contents = SA_AES_CONTENTS | (keylen << 2); in crypto4xx_setkey_aes()
156 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes()
171 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cbc() argument
173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
Dcrypto4xx_core.h188 const u8 *key, unsigned int keylen);
/linux-4.1.27/arch/powerpc/boot/
Dplanetcore.c43 int keylen = strlen(key); in planetcore_get_key() local
46 if (!strncmp(table, key, keylen) && table[keylen] == '=') in planetcore_get_key()
47 return table + keylen + 1; in planetcore_get_key()
/linux-4.1.27/drivers/net/ppp/
Dppp_mppe.c102 unsigned keylen; /* key length in bytes */ member
144 nbytes = setup_sg(&sg[0], state->master_key, state->keylen); in get_new_key_from_sha()
147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); in get_new_key_from_sha()
169 state->keylen); in mppe_rekey()
172 setup_sg(sg_in, state->sha1_digest, state->keylen); in mppe_rekey()
173 setup_sg(sg_out, state->session_key, state->keylen); in mppe_rekey()
175 state->keylen) != 0) { in mppe_rekey()
179 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey()
181 if (state->keylen == 8) { in mppe_rekey()
187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); in mppe_rekey()
[all …]
/linux-4.1.27/drivers/crypto/
Ds5p-sss.c171 int keylen; member
398 uint8_t *key, uint8_t *iv, unsigned int keylen) in s5p_set_aes() argument
405 if (keylen == AES_KEYSIZE_256) in s5p_set_aes()
407 else if (keylen == AES_KEYSIZE_192) in s5p_set_aes()
412 memcpy(keystart, key, keylen); in s5p_set_aes()
432 if (dev->ctx->keylen == AES_KEYSIZE_192) in s5p_aes_crypt_start()
434 else if (dev->ctx->keylen == AES_KEYSIZE_256) in s5p_aes_crypt_start()
461 s5p_set_aes(dev, dev->ctx->aes_key, req->info, dev->ctx->keylen); in s5p_aes_crypt_start()
549 const uint8_t *key, unsigned int keylen) in s5p_aes_setkey() argument
554 if (keylen != AES_KEYSIZE_128 && in s5p_aes_setkey()
[all …]
Dgeode-aes.c122 op->keylen = len; in geode_setkey_cip()
155 op->keylen = len; in geode_setkey_blk()
220 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt()
241 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt()
312 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt()
344 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt()
425 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt()
455 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
Datmel-tdes.c77 int keylen; member
276 if (dd->ctx->keylen > (DES_KEY_SIZE << 1)) { in atmel_tdes_write_ctrl()
279 } else if (dd->ctx->keylen > DES_KEY_SIZE) { in atmel_tdes_write_ctrl()
310 dd->ctx->keylen >> 2); in atmel_tdes_write_ctrl()
778 unsigned int keylen) in atmel_des_setkey() argument
786 if (keylen != DES_KEY_SIZE) { in atmel_des_setkey()
797 memcpy(ctx->key, key, keylen); in atmel_des_setkey()
798 ctx->keylen = keylen; in atmel_des_setkey()
804 unsigned int keylen) in atmel_tdes_setkey() argument
815 && (keylen != 2*DES_KEY_SIZE)) { in atmel_tdes_setkey()
[all …]
Dn2_core.c443 unsigned int keylen) in n2_hmac_async_setkey() argument
452 err = crypto_ahash_setkey(fallback_tfm, key, keylen); in n2_hmac_async_setkey()
463 if (keylen > bs) { in n2_hmac_async_setkey()
464 err = crypto_shash_digest(shash, key, keylen, in n2_hmac_async_setkey()
468 keylen = ds; in n2_hmac_async_setkey()
469 } else if (keylen <= N2_HASH_KEY_MAX) in n2_hmac_async_setkey()
470 memcpy(ctx->hash_key, key, keylen); in n2_hmac_async_setkey()
472 ctx->hash_key_len = keylen; in n2_hmac_async_setkey()
715 unsigned int keylen) in n2_aes_setkey() argument
723 switch (keylen) { in n2_aes_setkey()
[all …]
Dsahara.c151 int keylen; member
486 memcpy(dev->key_base, ctx->key, ctx->keylen); in sahara_hw_descriptor_create()
496 dev->hw_desc[idx]->len2 = ctx->keylen; in sahara_hw_descriptor_create()
628 unsigned int keylen) in sahara_aes_setkey() argument
633 ctx->keylen = keylen; in sahara_aes_setkey()
636 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey()
637 memcpy(ctx->key, key, keylen); in sahara_aes_setkey()
642 if (keylen != AES_KEYSIZE_128 && in sahara_aes_setkey()
643 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in sahara_aes_setkey()
653 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); in sahara_aes_setkey()
[all …]
Domap-aes.c102 int keylen; member
263 key32 = dd->ctx->keylen / sizeof(u32); in omap_aes_write_ctrl()
274 val = FLD_VAL(((dd->ctx->keylen >> 3) - 1), 4, 3); in omap_aes_write_ctrl()
746 unsigned int keylen) in omap_aes_setkey() argument
750 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_setkey()
751 keylen != AES_KEYSIZE_256) in omap_aes_setkey()
754 pr_debug("enter, keylen: %d\n", keylen); in omap_aes_setkey()
756 memcpy(ctx->key, key, keylen); in omap_aes_setkey()
757 ctx->keylen = keylen; in omap_aes_setkey()
Dtalitos.c646 unsigned int keylen; member
680 const u8 *key, unsigned int keylen) in aead_setkey() argument
685 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
694 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey()
1321 const u8 *key, unsigned int keylen) in ablkcipher_setkey() argument
1325 memcpy(&ctx->key, key, keylen); in ablkcipher_setkey()
1326 ctx->keylen = keylen; in ablkcipher_setkey()
1387 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, in common_nonsnoop()
1582 if (ctx->keylen) in common_nonsnoop_hash()
1583 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, in common_nonsnoop_hash()
[all …]
Datmel-aes.c85 int keylen; member
507 if (dd->ctx->keylen == AES_KEYSIZE_128) in atmel_aes_write_ctrl()
509 else if (dd->ctx->keylen == AES_KEYSIZE_192) in atmel_aes_write_ctrl()
551 dd->ctx->keylen >> 2); in atmel_aes_write_ctrl()
824 unsigned int keylen) in atmel_aes_setkey() argument
828 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in atmel_aes_setkey()
829 keylen != AES_KEYSIZE_256) { in atmel_aes_setkey()
834 memcpy(ctx->key, key, keylen); in atmel_aes_setkey()
835 ctx->keylen = keylen; in atmel_aes_setkey()
Domap-des.c83 int keylen; member
258 key32 = dd->ctx->keylen / sizeof(u32); in omap_des_write_ctrl()
728 unsigned int keylen) in omap_des_setkey() argument
732 if (keylen != DES_KEY_SIZE && keylen != (3*DES_KEY_SIZE)) in omap_des_setkey()
735 pr_debug("enter, keylen: %d\n", keylen); in omap_des_setkey()
737 memcpy(ctx->key, key, keylen); in omap_des_setkey()
738 ctx->keylen = keylen; in omap_des_setkey()
Dgeode-aes.h70 u32 keylen; member
Dmv_cesa.c774 unsigned int keylen) in mv_hash_setkey() argument
783 rc = crypto_shash_setkey(ctx->fallback, key, keylen); in mv_hash_setkey()
804 if (keylen > bs) { in mv_hash_setkey()
808 crypto_shash_digest(shash, key, keylen, ipad); in mv_hash_setkey()
812 keylen = ds; in mv_hash_setkey()
814 memcpy(ipad, key, keylen); in mv_hash_setkey()
816 memset(ipad + keylen, 0, bs - keylen); in mv_hash_setkey()
Domap-sham.c1184 unsigned int keylen) in omap_sham_setkey() argument
1205 err = crypto_shash_setkey(tctx->fallback, key, keylen); in omap_sham_setkey()
1209 if (keylen > bs) { in omap_sham_setkey()
1212 key, keylen, bctx->ipad); in omap_sham_setkey()
1215 keylen = ds; in omap_sham_setkey()
1217 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey()
1220 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey()
Dbfin_crc.c474 unsigned int keylen) in bfin_crypto_crc_setkey() argument
479 if (keylen != CHKSUM_DIGEST_SIZE) { in bfin_crypto_crc_setkey()
Dhifn_795x.c1126 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) in hifn_setup_crypto_command() argument
1151 if (keylen) { in hifn_setup_crypto_command()
1152 memcpy(buf_pos, key, keylen); in hifn_setup_crypto_command()
1153 buf_pos += keylen; in hifn_setup_crypto_command()
Dixp4xx_crypto.c1148 unsigned int keylen) in aead_setkey() argument
1153 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
Dpicoxcell_crypto.c494 unsigned int keylen) in spacc_aead_setkey() argument
501 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey()
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/
Dcapa.c243 u8 *key, unsigned int *keylen, in ll_crypto_hmac() argument
251 rv = crypto_hash_setkey(desc.tfm, key, *keylen); in ll_crypto_hmac()
263 int keylen; in capa_hmac() local
278 keylen = alg->ha_keylen; in capa_hmac()
285 ll_crypto_hmac(tfm, key, &keylen, &sl, sl.length, hmac); in capa_hmac()
292 int capa_encrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) in capa_encrypt_id() argument
311 if (keylen < min) { in capa_encrypt_id()
345 int capa_decrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) in capa_decrypt_id() argument
364 if (keylen < min) { in capa_decrypt_id()
Dobd_config.c1300 int i, keylen, vallen; in class_process_proc_param() local
1326 keylen = sval - key; in class_process_proc_param()
1335 && keylen == strlen(var->name)) { in class_process_proc_param()
1353 if (strnchr(key, keylen, '.')) in class_process_proc_param()
/linux-4.1.27/drivers/crypto/ux500/hash/
Dhash_core.c262 if (!ctx->keylen) { in get_empty_message_digest()
442 const u8 *key, unsigned int keylen) in hash_hw_write_key() argument
449 while (keylen >= 4) { in hash_hw_write_key()
453 keylen -= 4; in hash_hw_write_key()
458 if (keylen) { in hash_hw_write_key()
460 while (keylen) { in hash_hw_write_key()
461 word |= (key[keylen - 1] << (8 * (keylen - 1))); in hash_hw_write_key()
462 keylen--; in hash_hw_write_key()
500 hash_hw_write_key(device_data, ctx->key, ctx->keylen); in init_hash_hw()
571 ctx->keylen = 0; in hash_init()
[all …]
Dhash_alg.h330 u32 keylen; member
/linux-4.1.27/lib/
Dbtree.c52 int keylen; member
58 .keylen = 1,
66 .keylen = LONG_PER_U64,
73 .keylen = 2 * LONG_PER_U64,
140 for (i = geo->keylen - 1; i >= 0; i--) { in dec_key()
150 return &node[n * geo->keylen]; in bkey()
161 longcpy(bkey(geo, node, n), key, geo->keylen); in setkey()
172 longset(bkey(geo, node, n), 0, geo->keylen); in clearpair()
219 longcpy(key, bkey(geo, node, 0), geo->keylen); in btree_last()
227 return longcmp(bkey(geo, node, pos), key, geo->keylen); in keycmp()
[all …]
Dassoc_array.c500 size_t keylen; in assoc_array_insert_into_terminal_node() local
775 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); in assoc_array_insert_into_terminal_node()
776 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; in assoc_array_insert_into_terminal_node()
779 keylen * sizeof(unsigned long), GFP_KERNEL); in assoc_array_insert_into_terminal_node()
797 for (i = 0; i < keylen; i++) in assoc_array_insert_into_terminal_node()
802 pr_devel("blank off [%zu] %d: %lx\n", keylen - 1, level, blank); in assoc_array_insert_into_terminal_node()
803 new_s0->index_key[keylen - 1] &= ~blank; in assoc_array_insert_into_terminal_node()
832 size_t keylen; in assoc_array_insert_mid_shortcut() local
881 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); in assoc_array_insert_mid_shortcut()
882 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; in assoc_array_insert_mid_shortcut()
[all …]
/linux-4.1.27/drivers/crypto/vmx/
Daes.c76 unsigned int keylen) in p8_aes_setkey() argument
84 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_setkey()
85 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_setkey()
88 ret += crypto_cipher_setkey(ctx->fallback, key, keylen); in p8_aes_setkey()
Daes_cbc.c77 unsigned int keylen) in p8_aes_cbc_setkey() argument
85 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_cbc_setkey()
86 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_cbc_setkey()
89 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey()
Daes_ctr.c75 unsigned int keylen) in p8_aes_ctr_setkey() argument
83 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_ctr_setkey()
86 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey()
Dghash.c110 unsigned int keylen) in p8_ghash_setkey() argument
114 if (keylen != GHASH_KEY_LEN) in p8_ghash_setkey()
123 return crypto_shash_setkey(ctx->fallback, key, keylen); in p8_ghash_setkey()
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/
Drtl_crypto.h76 unsigned int keylen, u32 *flags);
87 unsigned int keylen, u32 *flags);
142 const u8 *key, unsigned int keylen);
170 const u8 *key, unsigned int keylen);
299 const u8 *key, unsigned int keylen) in crypto_digest_setkey() argument
304 return tfm->crt_digest.dit_setkey(tfm, key, keylen); in crypto_digest_setkey()
308 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument
311 return tfm->crt_cipher.cit_setkey(tfm, key, keylen); in crypto_cipher_setkey()
/linux-4.1.27/fs/cifs/
Dcache.c233 uint16_t keylen; in cifs_fscache_inode_get_key() local
236 keylen = sizeof(cifsi->uniqueid); in cifs_fscache_inode_get_key()
237 if (keylen > maxbuf) in cifs_fscache_inode_get_key()
238 keylen = 0; in cifs_fscache_inode_get_key()
240 memcpy(buffer, &cifsi->uniqueid, keylen); in cifs_fscache_inode_get_key()
242 return keylen; in cifs_fscache_inode_get_key()
/linux-4.1.27/fs/fscache/
Dobject-list.c255 uint16_t keylen = 0, auxlen = 0; in fscache_objlist_show() local
278 keylen = cookie->def->get_key(cookie->netfs_data, in fscache_objlist_show()
284 buf + keylen, 512 - keylen); in fscache_objlist_show()
287 if (keylen > 0 || auxlen > 0) { in fscache_objlist_show()
289 for (p = buf; keylen > 0; keylen--) in fscache_objlist_show()
/linux-4.1.27/include/linux/
Dcrypto.h283 unsigned int keylen);
324 unsigned int keylen);
351 unsigned int keylen);
417 unsigned int keylen);
593 unsigned int keylen);
607 unsigned int keylen);
623 unsigned int keylen);
632 const u8 *key, unsigned int keylen);
645 unsigned int keylen);
999 const u8 *key, unsigned int keylen) in crypto_ablkcipher_setkey() argument
[all …]
/linux-4.1.27/arch/x86/crypto/
Dtwofish_glue_3way.c217 unsigned int keylen) in lrw_twofish_setkey() argument
222 err = __twofish_setkey(&ctx->twofish_ctx, key, keylen - TF_BLOCK_SIZE, in lrw_twofish_setkey()
227 return lrw_init_table(&ctx->lrw_table, key + keylen - TF_BLOCK_SIZE); in lrw_twofish_setkey()
274 unsigned int keylen) in xts_twofish_setkey() argument
283 if (keylen % 2) { in xts_twofish_setkey()
289 err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_twofish_setkey()
294 return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_twofish_setkey()
Dcast6_avx_glue.c249 unsigned int keylen) in lrw_cast6_setkey() argument
254 err = __cast6_setkey(&ctx->cast6_ctx, key, keylen - CAST6_BLOCK_SIZE, in lrw_cast6_setkey()
259 return lrw_init_table(&ctx->lrw_table, key + keylen - CAST6_BLOCK_SIZE); in lrw_cast6_setkey()
327 unsigned int keylen) in xts_cast6_setkey() argument
336 if (keylen % 2) { in xts_cast6_setkey()
342 err = __cast6_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_cast6_setkey()
347 return __cast6_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_cast6_setkey()
Dserpent_avx_glue.c257 unsigned int keylen) in lrw_serpent_setkey() argument
262 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - in lrw_serpent_setkey()
267 return lrw_init_table(&ctx->lrw_table, key + keylen - in lrw_serpent_setkey()
333 unsigned int keylen) in xts_serpent_setkey() argument
342 if (keylen % 2) { in xts_serpent_setkey()
348 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); in xts_serpent_setkey()
353 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); in xts_serpent_setkey()
Dserpent_sse2_glue.c230 unsigned int keylen) in lrw_serpent_setkey() argument
235 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - in lrw_serpent_setkey()
240 return lrw_init_table(&ctx->lrw_table, key + keylen - in lrw_serpent_setkey()
309 unsigned int keylen) in xts_serpent_setkey() argument
318 if (keylen % 2) { in xts_serpent_setkey()
324 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); in xts_serpent_setkey()
329 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); in xts_serpent_setkey()
Dghash-clmulni-intel_glue.c56 const u8 *key, unsigned int keylen) in ghash_setkey() argument
62 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
244 unsigned int keylen) in ghash_async_setkey() argument
253 err = crypto_ahash_setkey(child, key, keylen); in ghash_async_setkey()
Dcrc32-pclmul_glue.c92 unsigned int keylen) in crc32_pclmul_setkey() argument
96 if (keylen != sizeof(u32)) { in crc32_pclmul_setkey()
Dcamellia_glue.c1441 unsigned int keylen) in lrw_camellia_setkey() argument
1447 keylen - CAMELLIA_BLOCK_SIZE, in lrw_camellia_setkey()
1453 key + keylen - CAMELLIA_BLOCK_SIZE); in lrw_camellia_setkey()
1500 unsigned int keylen) in xts_camellia_setkey() argument
1509 if (keylen % 2) { in xts_camellia_setkey()
1515 err = __camellia_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_camellia_setkey()
1520 return __camellia_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_camellia_setkey()
Dfpu.c28 unsigned int keylen) in crypto_fpu_setkey() argument
37 err = crypto_blkcipher_setkey(child, key, keylen); in crypto_fpu_setkey()
Dcrc32c-intel_glue.c116 unsigned int keylen) in crc32c_intel_setkey() argument
120 if (keylen != sizeof(u32)) { in crc32c_intel_setkey()
Daesni-intel_glue.c569 unsigned int keylen) in lrw_aesni_setkey() argument
575 keylen - AES_BLOCK_SIZE); in lrw_aesni_setkey()
579 return lrw_init_table(&ctx->lrw_table, key + keylen - AES_BLOCK_SIZE); in lrw_aesni_setkey()
638 unsigned int keylen) in xts_aesni_setkey() argument
647 if (keylen % 2) { in xts_aesni_setkey()
653 err = aes_set_key_common(tfm, ctx->raw_crypt_ctx, key, keylen / 2); in xts_aesni_setkey()
658 return aes_set_key_common(tfm, ctx->raw_tweak_ctx, key + keylen / 2, in xts_aesni_setkey()
659 keylen / 2); in xts_aesni_setkey()
Ddes3_ede_glue.c360 unsigned int keylen) in des3_ede_x86_setkey() argument
367 err = __des3_ede_setkey(ctx->enc_expkey, &tfm->crt_flags, key, keylen); in des3_ede_x86_setkey()
/linux-4.1.27/include/crypto/
Dserpent.h21 unsigned int keylen);
22 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
Dcast6.h18 unsigned int keylen, u32 *flags);
19 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
Dhash.h132 unsigned int keylen);
178 unsigned int keylen);
199 unsigned int keylen);
358 unsigned int keylen);
743 unsigned int keylen);
Dauthenc.h35 unsigned int keylen);
Ddes.h20 unsigned int keylen);
Dcast5.h18 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
Dif_alg.h54 int (*setkey)(void *private, const u8 *key, unsigned int keylen);
/linux-4.1.27/drivers/isdn/mISDN/
Ddsp_blowfish.c599 dsp_bf_init(struct dsp *dsp, const u8 *key, uint keylen) in dsp_bf_init() argument
606 if (keylen < 4 || keylen > 56) in dsp_bf_init()
634 ((u32)key[(j + 1) % keylen] << 16) | in dsp_bf_init()
635 ((u32)key[(j + 2) % keylen] << 8) | in dsp_bf_init()
636 ((u32)key[(j + 3) % keylen])); in dsp_bf_init()
639 j = (j + 4) % keylen; in dsp_bf_init()
Ddsp.h266 extern int dsp_bf_init(struct dsp *dsp, const u8 *key, unsigned int keylen);
/linux-4.1.27/drivers/crypto/qce/
Dablkcipher.c163 unsigned int keylen) in qce_ablkcipher_setkey() argument
170 if (!key || !keylen) in qce_ablkcipher_setkey()
174 switch (keylen) { in qce_ablkcipher_setkey()
190 ctx->enc_keylen = keylen; in qce_ablkcipher_setkey()
191 memcpy(ctx->enc_key, key, keylen); in qce_ablkcipher_setkey()
194 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); in qce_ablkcipher_setkey()
196 ctx->enc_keylen = keylen; in qce_ablkcipher_setkey()
Dcommon.c326 unsigned int keylen; in qce_setup_regs_ablkcipher() local
334 keylen = ctx->enc_keylen / 2; in qce_setup_regs_ablkcipher()
336 keylen = ctx->enc_keylen; in qce_setup_regs_ablkcipher()
338 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_ablkcipher()
339 enckey_words = keylen / sizeof(u32); in qce_setup_regs_ablkcipher()
343 encr_cfg = qce_encr_cfg(flags, keylen); in qce_setup_regs_ablkcipher()
Dsha.c368 unsigned int keylen) in qce_ahash_hmac_setkey() argument
384 if (keylen <= blocksize) { in qce_ahash_hmac_setkey()
385 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey()
412 buf = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, GFP_KERNEL); in qce_ahash_hmac_setkey()
418 memcpy(buf, key, keylen); in qce_ahash_hmac_setkey()
419 sg_init_one(&sg, buf, keylen); in qce_ahash_hmac_setkey()
420 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
/linux-4.1.27/drivers/staging/lustre/lustre/include/
Dlustre_capa.h64 #define DEF_CAPA_HMAC_ALG(name, type, len, keylen) \ argument
68 .ha_keylen = keylen, \
191 int capa_encrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen);
192 int capa_decrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen);
Dobd_class.h508 struct obd_export *exp, __u32 keylen, in obd_get_info() argument
517 rc = OBP(exp->exp_obd, get_info)(env, exp, keylen, key, vallen, val, in obd_get_info()
523 struct obd_export *exp, u32 keylen, in obd_set_info_async() argument
532 rc = OBP(exp->exp_obd, set_info_async)(env, exp, keylen, key, vallen, in obd_set_info_async()
Dlustre_lib.h77 u32 keylen, void *key,
Dobd.h1107 __u32 keylen, void *key, __u32 *vallen, void *val,
1110 __u32 keylen, void *key,
Dobd_support.h817 (keylen >= (sizeof(str)-1) && memcmp(key, str, (sizeof(str)-1)) == 0)
/linux-4.1.27/arch/x86/include/asm/crypto/
Dtwofish.h39 unsigned int keylen);
44 unsigned int keylen);
Dserpent-avx.h41 unsigned int keylen);
46 unsigned int keylen);
Dcamellia.h33 unsigned int keylen);
37 unsigned int keylen);
/linux-4.1.27/drivers/crypto/ux500/cryp/
Dcryp_core.c77 u32 keylen; member
338 int num_of_regs = ctx->keylen / 8; in cfg_keys()
347 ctx->keylen); in cfg_keys()
349 for (i = 0; i < ctx->keylen / 4; i++) in cfg_keys()
945 const u8 *key, unsigned int keylen) in aes_ablkcipher_setkey() argument
952 switch (keylen) { in aes_ablkcipher_setkey()
971 memcpy(ctx->key, key, keylen); in aes_ablkcipher_setkey()
972 ctx->keylen = keylen; in aes_ablkcipher_setkey()
980 const u8 *key, unsigned int keylen) in des_ablkcipher_setkey() argument
988 if (keylen != DES_KEY_SIZE) { in des_ablkcipher_setkey()
[all …]
/linux-4.1.27/security/keys/
Dtrusted.c77 unsigned int keylen, ...) in TSS_rawhmac() argument
91 ret = crypto_shash_setkey(hmacalg, key, keylen); in TSS_rawhmac()
98 va_start(argp, keylen); in TSS_rawhmac()
124 unsigned int keylen, unsigned char *h1, in TSS_authhmac() argument
163 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac()
178 unsigned int keylen, ...) in TSS_checkhmac1() argument
223 va_start(argp, keylen); in TSS_checkhmac1()
239 ret = TSS_rawhmac(testhmac, key, keylen, SHA1_DIGEST_SIZE, paramdigest, in TSS_checkhmac1()
807 long keylen; in datablob_parse() local
823 ret = kstrtol(c, 10, &keylen); in datablob_parse()
[all …]
/linux-4.1.27/drivers/crypto/qat/qat_common/
Dqat_algs.c455 const uint8_t *key, unsigned int keylen) in qat_alg_ablkcipher_init_com() argument
461 memcpy(cd->aes.key, key, keylen); in qat_alg_ablkcipher_init_com()
467 cd_ctrl->cipher_key_sz = keylen >> 3; in qat_alg_ablkcipher_init_com()
476 unsigned int keylen) in qat_alg_ablkcipher_init_enc() argument
482 qat_alg_ablkcipher_init_com(ctx, req, enc_cd, key, keylen); in qat_alg_ablkcipher_init_enc()
489 unsigned int keylen) in qat_alg_ablkcipher_init_dec() argument
495 qat_alg_ablkcipher_init_com(ctx, req, dec_cd, key, keylen); in qat_alg_ablkcipher_init_dec()
519 const uint8_t *key, unsigned int keylen) in qat_alg_aead_init_sessions() argument
527 if (crypto_authenc_extractkeys(&keys, key, keylen)) in qat_alg_aead_init_sessions()
549 unsigned int keylen) in qat_alg_ablkcipher_init_sessions() argument
[all …]
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/
Dlinux-crypto-adler.c55 unsigned int keylen) in adler32_setkey() argument
59 if (keylen != sizeof(u32)) { in adler32_setkey()
/linux-4.1.27/arch/arm/crypto/
Dghash-ce-glue.c110 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument
115 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
230 unsigned int keylen) in ghash_async_setkey() argument
239 err = crypto_ahash_setkey(child, key, keylen); in ghash_async_setkey()
/linux-4.1.27/drivers/staging/vt6655/
Dkey.c101 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode()
103 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode()
Drxtx.c1227 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); in vnt_fill_txkey()
1229 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { in vnt_fill_txkey()
1407 if (tx_key->keylen > 0) in vnt_generate_fifo_header()
/linux-4.1.27/arch/arm64/crypto/
Dghash-ce-glue.c104 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument
109 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
Dcrc32-arm64.c116 unsigned int keylen) in chksum_setkey() argument
120 if (keylen != sizeof(mctx->key)) { in chksum_setkey()
/linux-4.1.27/arch/sparc/crypto/
Dcrc32c_glue.c31 unsigned int keylen) in crc32c_sparc64_setkey() argument
35 if (keylen != sizeof(u32)) { in crc32c_sparc64_setkey()
Ddes_glue.c44 unsigned int keylen) in des_set_key() argument
201 unsigned int keylen) in des3_ede_set_key() argument
/linux-4.1.27/drivers/staging/vt6656/
Dkey.c110 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode()
112 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode()
Drxtx.c727 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); in vnt_fill_txkey()
729 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { in vnt_fill_txkey()
958 if (tx_key->keylen > 0) in vnt_tx_packet()
/linux-4.1.27/drivers/isdn/i4l/
Disdn_v110.c66 FlipBits(unsigned char c, int keylen) in FlipBits() argument
72 int hunks = (8 / keylen); in FlipBits()
76 for (j = 0; j < keylen; j++) { in FlipBits()
78 c |= bit >> (keylen - j - 1); in FlipBits()
80 bit >>= keylen; in FlipBits()
/linux-4.1.27/drivers/net/wireless/orinoco/
Dhw.c858 int keylen; in __orinoco_hw_setup_wepkeys() local
862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys()
864 if (keylen > LARGE_KEY_SIZE) { in __orinoco_hw_setup_wepkeys()
866 priv->ndev->name, priv->tx_key, keylen); in __orinoco_hw_setup_wepkeys()
868 } else if (keylen > SMALL_KEY_SIZE) in __orinoco_hw_setup_wepkeys()
869 keylen = LARGE_KEY_SIZE; in __orinoco_hw_setup_wepkeys()
870 else if (keylen > 0) in __orinoco_hw_setup_wepkeys()
871 keylen = SMALL_KEY_SIZE; in __orinoco_hw_setup_wepkeys()
873 keylen = 0; in __orinoco_hw_setup_wepkeys()
884 HERMES_BYTES_TO_RECLEN(keylen), in __orinoco_hw_setup_wepkeys()
/linux-4.1.27/arch/s390/crypto/
Dghash_s390.c41 const u8 *key, unsigned int keylen) in ghash_setkey() argument
45 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/
Dsmd.h91 u8 keylen,
97 u8 keylen,
Dmain.c398 key_conf->keylen, key_conf->flags); in wcn36xx_set_key()
401 key_conf->keylen); in wcn36xx_set_key()
437 memcpy(key, key_conf->key, key_conf->keylen); in wcn36xx_set_key()
453 key_conf->keylen, in wcn36xx_set_key()
460 key_conf->keylen, in wcn36xx_set_key()
468 key_conf->keylen, in wcn36xx_set_key()
Dsmd.c1459 u8 keylen, in wcn36xx_smd_set_stakey() argument
1476 msg_body.set_sta_key_params.key[0].length = keylen; in wcn36xx_smd_set_stakey()
1477 memcpy(msg_body.set_sta_key_params.key[0].key, key, keylen); in wcn36xx_smd_set_stakey()
1500 u8 keylen, in wcn36xx_smd_set_bsskey() argument
1515 msg_body.keys[0].length = keylen; in wcn36xx_smd_set_bsskey()
1516 memcpy(msg_body.keys[0].key, key, keylen); in wcn36xx_smd_set_bsskey()
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/
Dsta.c1075 if (keyconf->keylen != WEP_KEY_LEN_128 && in iwl_set_default_wep_key()
1076 keyconf->keylen != WEP_KEY_LEN_64) { in iwl_set_default_wep_key()
1078 "Bad WEP key length %d\n", keyconf->keylen); in iwl_set_default_wep_key()
1084 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; in iwl_set_default_wep_key()
1086 keyconf->keylen); in iwl_set_default_wep_key()
1090 keyconf->keylen, keyconf->keyidx, ret); in iwl_set_default_wep_key()
1149 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); in iwlagn_send_sta_key()
1156 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); in iwlagn_send_sta_key()
1163 memcpy(&sta_cmd.key.key[3], keyconf->key, keyconf->keylen); in iwlagn_send_sta_key()
1303 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_set_dynamic_key()
Dtx.c218 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); in iwlagn_tx_cmd_build_hwcrypto()
235 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in iwlagn_tx_cmd_build_hwcrypto()
/linux-4.1.27/drivers/hv/
Dhv_kvp.c474 int keylen = 0; in kvp_respond_to_host() local
563 keylen = utf8s_to_utf16s(key_name, strlen(key_name), UTF16_HOST_ENDIAN, in kvp_respond_to_host()
566 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host()
579 if ((keylen < 0) || (valuelen < 0)) in kvp_respond_to_host()
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/
Dcryptocop.h75 size_t keylen; member
/linux-4.1.27/Documentation/security/
Dkeys-ecryptfs.txt39 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
45 keylen:= 64
Dkeys-trusted-encrypted.txt24 keyctl add trusted name "new keylen [options]" ring
61 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
/linux-4.1.27/net/ipv6/
Desp6.c495 unsigned int keylen; in esp_init_authenc() local
525 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc()
528 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc()
567 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
Dtcp_ipv6.c1170 AF_INET6, key->key, key->keylen, in tcp_v6_syn_recv_sock()
/linux-4.1.27/arch/cris/include/arch-v32/arch/
Dcryptocop.h37 unsigned int keylen; member
/linux-4.1.27/drivers/staging/lustre/lustre/mdc/
Dmdc_request.c1193 __u32 keylen, vallen; in mdc_ioc_fid2path() local
1203 keylen = cfs_size_round(sizeof(KEY_FID2PATH)) + sizeof(*gf); in mdc_ioc_fid2path()
1204 OBD_ALLOC(key, keylen); in mdc_ioc_fid2path()
1221 rc = obd_get_info(NULL, exp, keylen, key, &vallen, gf, NULL); in mdc_ioc_fid2path()
1237 OBD_FREE(key, keylen); in mdc_ioc_fid2path()
1981 u32 keylen, void *key, in mdc_get_info_rpc() argument
1994 RCL_CLIENT, keylen); in mdc_get_info_rpc()
2005 memcpy(tmp, key, keylen); in mdc_get_info_rpc()
2156 u32 keylen, void *key, in mdc_set_info_async() argument
2180 keylen, key, vallen, val, set); in mdc_set_info_async()
[all …]
/linux-4.1.27/net/ipv4/
Desp4.c553 unsigned int keylen; in esp_init_authenc() local
583 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc()
586 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc()
625 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
Dtcp_ipv4.c923 key->keylen = newkeylen; in tcp_md5_do_add()
949 key->keylen = newkeylen; in tcp_md5_do_add()
1320 AF_INET, key->key, key->keylen, GFP_ATOMIC); in tcp_v4_syn_recv_sock()
Dtcp.c2987 sg_init_one(&sg, key->key, key->keylen); in tcp_md5_hash_key()
2988 return crypto_hash_update(&hp->md5_desc, &sg, key->keylen); in tcp_md5_hash_key()
/linux-4.1.27/arch/cris/arch-v32/drivers/
Dcryptocop.c455 get_aes_decrypt_key(tc->tctx->dec_key, tc->tctx->init.key, tc->tctx->init.keylen); in setup_key_dl_desc()
459 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc()
462 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc()
466 switch (tc->tctx->init.keylen) { in setup_key_dl_desc()
1463 if (tinit->keylen != 0) { in transform_ok()
1464 …_API(printk("transform_ok: non-zero keylength, %d, for a digest/csum algorithm\n", tinit->keylen)); in transform_ok()
1469 if (tinit->keylen != 64) { in transform_ok()
1470 DEBUG_API(printk("transform_ok: keylen %d invalid for DES\n", tinit->keylen)); in transform_ok()
1475 if (tinit->keylen != 192) { in transform_ok()
1476 DEBUG_API(printk("transform_ok: keylen %d invalid for 3DES\n", tinit->keylen)); in transform_ok()
[all …]
/linux-4.1.27/drivers/staging/rtl8712/
Drtl871x_mlme.c1242 u8 keylen; in r8712_set_key() local
1264 keylen = 5; in r8712_set_key()
1266 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key()
1269 keylen = 13; in r8712_set_key()
1271 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key()
1278 keylen = 16; in r8712_set_key()
1280 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
1288 keylen = 16; in r8712_set_key()
1290 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
/linux-4.1.27/drivers/net/wireless/ath/
Dkey.c504 hk.kv_len = key->keylen; in ath_key_config()
505 if (key->keylen) in ath_key_config()
506 memcpy(hk.kv_val, key->key, key->keylen); in ath_key_config()
/linux-4.1.27/drivers/staging/rtl8723au/core/
Drtw_mlme.c1781 u8 keylen; in rtw_set_key23a() local
1831 keylen = 5; in rtw_set_key23a()
1833 &psecuritypriv->wep_key[keyid].key, keylen); in rtw_set_key23a()
1836 keylen = 13; in rtw_set_key23a()
1838 &psecuritypriv->wep_key[keyid].key, keylen); in rtw_set_key23a()
1841 keylen = 16; in rtw_set_key23a()
1843 &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key23a()
1847 keylen = 16; in rtw_set_key23a()
1849 &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key23a()
Drtw_security.c175 keylength = psecuritypriv->wep_key[index].keylen; in rtw_wep_encrypt23a()
233 keylength = psecuritypriv->wep_key[keyindex].keylen; in rtw_wep_decrypt23a()
/linux-4.1.27/drivers/net/wireless/hostap/
Dhostap_main.c333 int i, keylen, len, idx; in hostap_set_encryption() local
388 keylen = 6; /* first 5 octets */ in hostap_set_encryption()
392 keylen = WEP_KEY_LEN + 1; /* first 13 octets */ in hostap_set_encryption()
403 keybuf, keylen)) { in hostap_set_encryption()
405 i, keylen); in hostap_set_encryption()
/linux-4.1.27/drivers/staging/lustre/lustre/lov/
Dlov_obd.c1732 static int lov_fiemap(struct lov_obd *lov, __u32 keylen, void *key, in lov_fiemap() argument
1886 keylen, key, vallen, fm_local, lsm); in lov_fiemap()
1970 __u32 keylen, void *key, __u32 *vallen, void *val, in lov_get_info() argument
2035 rc = obd_get_info(env, tgt->ltd_exp, keylen, key, in lov_get_info()
2046 rc = lov_fiemap(lov, keylen, key, vallen, val, lsm); in lov_get_info()
2078 u32 keylen, void *key, u32 vallen, in lov_set_info_async() argument
2147 keylen, key, sizeof(int), in lov_set_info_async()
2151 keylen, key, vallen, in lov_set_info_async()
2163 err = obd_set_info_async(env, tgt->ltd_exp, keylen, in lov_set_info_async()
2173 keylen, key, vallen, val, set); in lov_set_info_async()
/linux-4.1.27/drivers/net/wireless/rt2x00/
Drt2x00mac.c481 if (key->keylen > 32) in rt2x00mac_set_key()
503 memcpy_tkip(&crypto, &key->key[0], key->keylen); in rt2x00mac_set_key()
505 memcpy(crypto.key, &key->key[0], key->keylen); in rt2x00mac_set_key()
/linux-4.1.27/drivers/net/wireless/ath/carl9170/
Dmac.c476 const int keylen) in carl9170_upload_key() argument
489 memcpy(&key.key, keydata, keylen); in carl9170_upload_key()
Dcarl9170.h566 const u8 ktype, const u8 keyidx, const u8 *keydata, const int keylen);
Dmain.c1249 min_t(u8, 16, key->keylen)); in carl9170_op_set_key()
/linux-4.1.27/drivers/staging/rtl8188eu/core/
Drtw_mlme.c1619 u8 keylen; in rtw_set_key() local
1660 keylen = 5; in rtw_set_key()
1661 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); in rtw_set_key()
1664 keylen = 13; in rtw_set_key()
1665 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); in rtw_set_key()
1668 keylen = 16; in rtw_set_key()
1669 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key()
1673 keylen = 16; in rtw_set_key()
1674 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key()
/linux-4.1.27/net/sunrpc/auth_gss/
Dgss_krb5_mech.c610 int keylen; in gss_import_v2_context() local
644 keylen = ctx->gk5e->keylength; in gss_import_v2_context()
646 p = simple_get_bytes(p, end, ctx->Ksess, keylen); in gss_import_v2_context()
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/
Dsta.c1212 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key()
1216 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key()
1223 memcpy(cmd.key + 3, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key()
1227 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key()
1279 memcpy(igtk_cmd.IGTK, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_igtk()
1469 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_mvm_set_sta_key()
Dtx.c254 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); in iwl_mvm_set_tx_cmd_crypto()
272 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in iwl_mvm_set_tx_cmd_crypto()
Dd3.c177 .wep_key.key_size = key->keylen, in iwl_mvm_wowlan_program_keys()
188 memcpy(&wkc.wep_key.key[3], key->key, key->keylen); in iwl_mvm_wowlan_program_keys()
1523 conf.conf.keylen = WLAN_KEY_LEN_CCMP; in iwl_mvm_setup_connection_keep()
1528 conf.conf.keylen = WLAN_KEY_LEN_TKIP; in iwl_mvm_setup_connection_keep()
/linux-4.1.27/drivers/net/wireless/rtlwifi/
Dcore.c1603 key->key, key->keylen); in rtl_op_set_key()
1604 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key()
1613 key->key, key->keylen); in rtl_op_set_key()
1614 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key()
1630 key->key, key->keylen); in rtl_op_set_key()
1631 rtlpriv->sec.key_len[PAIRWISE_KEYIDX] = key->keylen; in rtl_op_set_key()
1658 memset(rtlpriv->sec.key_buf[key_idx], 0, key->keylen); in rtl_op_set_key()
/linux-4.1.27/net/wireless/
Dlib80211_crypt_ccmp.c182 u8 *aeskey, int keylen, void *priv) in lib80211_ccmp_hdr() argument
191 if (aeskey != NULL && keylen >= CCMP_TK_LEN) in lib80211_ccmp_hdr()
Dlib80211_crypt_wep.c92 u8 *key, int keylen, void *priv) in lib80211_wep_build_iv() argument
Dlib80211_crypt_tkip.c310 u8 * rc4key, int keylen, void *priv) in lib80211_tkip_hdr() argument
321 if (rc4key == NULL || keylen < 16) in lib80211_tkip_hdr()
/linux-4.1.27/drivers/net/wireless/cw1200/
Dsta.c718 if (key->keylen > 16) { in cw1200_set_key()
729 &key->key[0], key->keylen); in cw1200_set_key()
730 wsm_key->wep_pairwise.keylen = key->keylen; in cw1200_set_key()
734 &key->key[0], key->keylen); in cw1200_set_key()
735 wsm_key->wep_group.keylen = key->keylen; in cw1200_set_key()
Dwsm.h1020 u8 keylen; /* Key length in bytes */ member
1025 u8 keylen; /* Key length in bytes */ member
/linux-4.1.27/drivers/net/wireless/rsi/
Drsi_91x_mac80211.c577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config()
583 key->keylen, in rsi_hal_key_config()
592 key->keylen, in rsi_hal_key_config()
/linux-4.1.27/drivers/net/wireless/ti/wl1251/
Dmain.c913 key->cipher, key->keyidx, key->keylen, key->flags); in wl1251_op_set_key()
914 wl1251_dump(DEBUG_CRYPT, "KEY: ", key->key, key->keylen); in wl1251_op_set_key()
966 memcpy(wl_cmd->key, key->key, key->keylen); in wl1251_op_set_key()
968 wl_cmd->key_size = key->keylen; in wl1251_op_set_key()
/linux-4.1.27/drivers/staging/lustre/lustre/osc/
Dosc_request.c892 u32 keylen, void *key, u32 vallen,
2739 u32 keylen, void *key, __u32 *vallen, void *val, in osc_get_info() argument
2762 RCL_CLIENT, keylen); in osc_get_info()
2770 memcpy(tmp, key, keylen); in osc_get_info()
2839 RCL_CLIENT, keylen); in osc_get_info()
2852 memcpy(tmp, key, keylen); in osc_get_info()
2880 u32 keylen, void *key, u32 vallen, in osc_set_info_async() argument
2952 RCL_CLIENT, keylen); in osc_set_info_async()
2963 memcpy(tmp, key, keylen); in osc_set_info_async()
/linux-4.1.27/drivers/net/wireless/iwlegacy/
D4965-mac.c1622 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); in il4965_tx_cmd_build_hwcrypto()
1642 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in il4965_tx_cmd_build_hwcrypto()
3221 int len = keyconf->keylen; in il4965_set_default_wep_key()
3227 D_WEP("Bad WEP key length %d\n", keyconf->keylen); in il4965_set_default_wep_key()
3260 if (keyconf->keylen == WEP_KEY_LEN_128) in il4965_set_wep_dynamic_key_info()
3269 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il4965_set_wep_dynamic_key_info()
3272 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il4965_set_wep_dynamic_key_info()
3275 keyconf->keylen); in il4965_set_wep_dynamic_key_info()
3319 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il4965_set_ccmp_dynamic_key_info()
3321 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il4965_set_ccmp_dynamic_key_info()
[all …]
D3945-mac.c152 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il3945_set_ccmp_dynamic_key_info()
153 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il3945_set_ccmp_dynamic_key_info()
155 memcpy(il->stations[sta_id].sta.key.key, keyconf->key, keyconf->keylen); in il3945_set_ccmp_dynamic_key_info()
239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il3945_set_dynamic_key()
377 memcpy(tx_cmd->key, keyinfo->key, keyinfo->keylen); in il3945_build_tx_cmd_hwcrypto()
393 memcpy(&tx_cmd->key[3], keyinfo->key, keyinfo->keylen); in il3945_build_tx_cmd_hwcrypto()
Dcommon.h666 int keylen; member
/linux-4.1.27/drivers/staging/rtl8723au/include/
Drtw_security.h88 u16 keylen; member
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/
Dioctl_cfg80211.c517 psecuritypriv->wep_key[key_index].keylen = key_len; in rtw_cfg80211_ap_set_encryption()
750 psecuritypriv->wep_key[key_index].keylen = key_len; in rtw_cfg80211_set_encryption()
983 if (psecuritypriv->wep_key[key_index].keylen == 13) { in cfg80211_rtw_set_default_key()
1748 switch (wep->keylen) { in rtw_cfg80211_add_wep()
1769 __func__, wep->keylen, keyid); in rtw_cfg80211_add_wep()
2103 wep_key.keylen = wep_key_len; in cfg80211_rtw_connect()
2117 memcpy(wep_key.key, (void *)sme->key, wep_key.keylen); in cfg80211_rtw_connect()
/linux-4.1.27/security/keys/encrypted-keys/
Dencrypted.c338 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument
350 ret = crypto_shash_setkey(hmacalg, key, keylen); in calc_hmac()
/linux-4.1.27/drivers/staging/rtl8188eu/os_dep/
Dioctl_linux.c2150 u8 keylen; in set_group_key() local
2180 keylen = 5; in set_group_key()
2183 keylen = 13; in set_group_key()
2189 keylen = 16; in set_group_key()
2192 memcpy(&(psetkeyparm->key[0]), key, keylen); in set_group_key()
2209 static int set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid) in set_wep_key() argument
2213 switch (keylen) { in set_wep_key()
/linux-4.1.27/drivers/staging/lustre/lustre/ldlm/
Dldlm_lockd.c489 int keylen, vallen; in ldlm_handle_setinfo() local
501 keylen = req_capsule_get_size(&req->rq_pill, &RMF_SETINFO_KEY, in ldlm_handle_setinfo()
/linux-4.1.27/drivers/staging/lustre/lustre/lmv/
Dlmv_obd.c2326 __u32 keylen, void *key, __u32 *vallen, void *val, in lmv_get_info() argument
2341 if (keylen >= strlen("remote_flag") && !strcmp(key, "remote_flag")) { in lmv_get_info()
2358 if (!obd_get_info(env, tgt->ltd_exp, keylen, key, in lmv_get_info()
2376 rc = obd_get_info(env, lmv->tgts[0]->ltd_exp, keylen, key, in lmv_get_info()
2391 u32 keylen, void *key, u32 vallen, in lmv_set_info_async() argument
2417 keylen, key, vallen, val, set); in lmv_set_info_async()
/linux-4.1.27/drivers/net/wireless/libertas/
Dhost.h819 __le16 keylen; member
Dcfg.c1037 cmd.param.keylen = cpu_to_le16(key_len); in lbs_set_key_material()
/linux-4.1.27/drivers/staging/lustre/lustre/mgc/
Dmgc_request.c971 u32 keylen, void *key, u32 vallen, in mgc_set_info_async() argument
1048 __u32 keylen, void *key, __u32 *vallen, void *val, in mgc_get_info() argument
/linux-4.1.27/drivers/net/wireless/p54/
Dmain.c597 key->keylen, addr, key->key); in p54_set_key()
Dtxrx.c903 txhdr->key_len = min((u8)16, info->control.hw_key->keylen); in p54_tx_80211()
/linux-4.1.27/drivers/net/wireless/
Dat76c50x-usb.c2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); in at76_set_key()
2156 memcpy(priv->wep_keys[key->keyidx], key->key, key->keylen); in at76_set_key()
2157 priv->wep_keys_len[key->keyidx] = key->keylen; in at76_set_key()
Dairo.c1292 static void emmh32_setseed(emmh32_context *context, u8 *pkey, int keylen,
1631 static void emmh32_setseed(emmh32_context *context, u8 *pkey, int keylen, in emmh32_setseed() argument
5203 u16 keylen, int perm, int lock) in set_wep_key() argument
5209 if (WARN_ON(keylen == 0)) in set_wep_key()
5215 wkr.klen = cpu_to_le16(keylen); in set_wep_key()
5216 memcpy(wkr.key, key, keylen); in set_wep_key()
Dmwl8k.c4278 cmd->key_len = cpu_to_le16(key->keylen); in mwl8k_encryption_set_cmd_info()
4342 sizeof(*key) + key->keylen); in mwl8k_cmd_encryption_set_key()
4346 keymlen = key->keylen; in mwl8k_cmd_encryption_set_key()
4353 keymlen = key->keylen; in mwl8k_cmd_encryption_set_key()
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/
Dpack_generic.c1575 u32 keylen, void *key, in do_set_info_async() argument
1588 RCL_CLIENT, keylen); in do_set_info_async()
1598 memcpy(tmp, key, keylen); in do_set_info_async()
/linux-4.1.27/drivers/net/wireless/ipw2x00/
Dipw2100.c5389 int keylen = len ? (len <= 5 ? 5 : 13) : 0; in ipw2100_set_key() local
5399 idx, keylen, len); in ipw2100_set_key()
5406 wep_key->len = keylen; in ipw2100_set_key()
5408 if (keylen) { in ipw2100_set_key()
5410 memset(wep_key->key + len, 0, keylen - len); in ipw2100_set_key()
5414 if (keylen == 0) in ipw2100_set_key()
5417 else if (keylen == 5) in ipw2100_set_key()
/linux-4.1.27/drivers/net/wireless/ti/wlcore/
Dmain.c3474 key_conf->keylen, key_conf->flags); in wlcore_set_key()
3475 wl1271_dump(DEBUG_CRYPT, "KEY: ", key_conf->key, key_conf->keylen); in wlcore_set_key()
3521 key_conf->keylen, key_conf->key, in wlcore_set_key()
3547 key_conf->keylen, key_conf->key, in wlcore_set_key()
/linux-4.1.27/include/net/
Dtcp.h1259 u8 keylen; member
Dmac80211.h1480 u8 keylen; member
/linux-4.1.27/drivers/net/wireless/b43/
Dmain.c4255 key->key, key->keylen, in b43_op_set_key()
4260 key->key, key->keylen, NULL, key); in b43_op_set_key()

12