/linux-4.4.14/drivers/staging/wlan-ng/ |
D | p80211wep.c | 122 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument 124 if (keylen < 0) in wep_change_key() 126 if (keylen >= MAX_KEYLEN) in wep_change_key() 136 wlandev->wep_keylens[keynum] = keylen; in wep_change_key() 137 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key() 149 u32 i, j, k, crc, keylen; in wep_decrypt() local 169 keylen = wlandev->wep_keylens[keyidx]; in wep_decrypt() 171 if (keylen == 0) in wep_decrypt() 175 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt() 177 keylen += 3; /* add in IV bytes */ in wep_decrypt() [all …]
|
D | p80211netdev.h | 230 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen);
|
/linux-4.4.14/fs/cachefiles/ |
D | key.c | 37 char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type) in cachefiles_cook_key() argument 44 _enter(",%d", keylen); in cachefiles_cook_key() 46 BUG_ON(keylen < 2 || keylen > 514); in cachefiles_cook_key() 50 for (loop = 2; loop < keylen; loop++) { in cachefiles_cook_key() 58 max = keylen - 2; in cachefiles_cook_key() 67 keylen = (keylen + 2) / 3; in cachefiles_cook_key() 69 max = keylen * 4; in cachefiles_cook_key() 102 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key() 121 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key()
|
D | interface.c | 34 unsigned keylen, auxlen; in cachefiles_alloc_object() local 68 keylen = cookie->def->get_key(cookie->netfs_data, buffer + 2, 512); in cachefiles_alloc_object() 69 ASSERTCMP(keylen, <, 512); in cachefiles_alloc_object() 71 *(uint16_t *)buffer = keylen; in cachefiles_alloc_object() 72 ((char *)buffer)[keylen + 2] = 0; in cachefiles_alloc_object() 73 ((char *)buffer)[keylen + 3] = 0; in cachefiles_alloc_object() 74 ((char *)buffer)[keylen + 4] = 0; in cachefiles_alloc_object() 77 key = cachefiles_cook_key(buffer, keylen + 2, object->type); in cachefiles_alloc_object()
|
D | namei.c | 36 unsigned keylen, loop; in __cachefiles_printk_object() local 59 keylen = cookie->def->get_key(cookie->netfs_data, keybuf, in __cachefiles_printk_object() 62 keylen = 0; in __cachefiles_printk_object() 65 keylen = 0; in __cachefiles_printk_object() 69 if (keylen) { in __cachefiles_printk_object() 70 pr_err("%skey=[%u] '", prefix, keylen); in __cachefiles_printk_object() 71 for (loop = 0; loop < keylen; loop++) in __cachefiles_printk_object()
|
D | internal.h | 155 extern char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type);
|
/linux-4.4.14/fs/hfs/ |
D | bfind.c | 45 u16 off, len, keylen; in __hfs_brec_find() local 56 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 57 if (keylen == 0) { in __hfs_brec_find() 61 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 75 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 76 if (keylen == 0) { in __hfs_brec_find() 80 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 85 fd->keylength = keylen; in __hfs_brec_find() 86 fd->entryoffset = off + keylen; in __hfs_brec_find() 87 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
/linux-4.4.14/fs/hfsplus/ |
D | bfind.c | 116 u16 off, len, keylen; in __hfs_brec_find() local 128 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 129 if (keylen == 0) { in __hfs_brec_find() 133 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 142 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 143 if (keylen == 0) { in __hfs_brec_find() 147 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 153 fd->keylength = keylen; in __hfs_brec_find() 154 fd->entryoffset = off + keylen; in __hfs_brec_find() 155 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
/linux-4.4.14/crypto/ |
D | cipher.c | 24 unsigned int keylen) in setkey_unaligned() argument 32 absize = keylen + alignmask; in setkey_unaligned() 38 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 39 ret = cia->cia_setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 40 memset(alignbuffer, 0, keylen); in setkey_unaligned() 46 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument 52 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { in setkey() 58 return setkey_unaligned(tfm, key, keylen); in setkey() 60 return cia->cia_setkey(tfm, key, keylen); in setkey()
|
D | blowfish_common.c | 349 int blowfish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in blowfish_setkey() argument 369 ((u32)key[(j + 1) % keylen] << 16) | in blowfish_setkey() 370 ((u32)key[(j + 2) % keylen] << 8) | in blowfish_setkey() 371 ((u32)key[(j + 3) % keylen])); in blowfish_setkey() 374 j = (j + 4) % keylen; in blowfish_setkey()
|
D | aead.c | 32 unsigned int keylen) in setkey_unaligned() argument 39 absize = keylen + alignmask; in setkey_unaligned() 45 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 46 ret = crypto_aead_alg(tfm)->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 47 memset(alignbuffer, 0, keylen); in setkey_unaligned() 53 const u8 *key, unsigned int keylen) in crypto_aead_setkey() argument 58 return setkey_unaligned(tfm, key, keylen); in crypto_aead_setkey() 60 return crypto_aead_alg(tfm)->setkey(tfm, key, keylen); in crypto_aead_setkey() 176 const u8 *key, unsigned int keylen) in aead_geniv_setkey() argument 180 return crypto_aead_setkey(ctx->child, key, keylen); in aead_geniv_setkey()
|
D | hmac.c | 45 const u8 *inkey, unsigned int keylen) in hmac_setkey() argument 62 if (keylen > bs) { in hmac_setkey() 65 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey() 69 keylen = ds; in hmac_setkey() 71 memcpy(ipad, inkey, keylen); in hmac_setkey() 73 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
|
D | shash.c | 28 unsigned int keylen) in shash_no_setkey() argument 34 unsigned int keylen) in shash_setkey_unaligned() argument 42 absize = keylen + (alignmask & ~(crypto_tfm_ctx_alignment() - 1)); in shash_setkey_unaligned() 48 memcpy(alignbuffer, key, keylen); in shash_setkey_unaligned() 49 err = shash->setkey(tfm, alignbuffer, keylen); in shash_setkey_unaligned() 55 unsigned int keylen) in crypto_shash_setkey() argument 61 return shash_setkey_unaligned(tfm, key, keylen); in crypto_shash_setkey() 63 return shash->setkey(tfm, key, keylen); in crypto_shash_setkey() 202 unsigned int keylen) in shash_async_setkey() argument 206 return crypto_shash_setkey(*ctx, key, keylen); in shash_async_setkey() [all …]
|
D | blkcipher.c | 376 unsigned int keylen) in setkey_unaligned() argument 384 absize = keylen + alignmask; in setkey_unaligned() 390 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 391 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 392 memset(alignbuffer, 0, keylen); in setkey_unaligned() 397 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument 402 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 408 return setkey_unaligned(tfm, key, keylen); in setkey() 410 return cipher->setkey(tfm, key, keylen); in setkey() 414 unsigned int keylen) in async_setkey() argument [all …]
|
D | ahash.c | 189 unsigned int keylen) in ahash_setkey_unaligned() argument 196 absize = keylen + alignmask; in ahash_setkey_unaligned() 202 memcpy(alignbuffer, key, keylen); in ahash_setkey_unaligned() 203 ret = tfm->setkey(tfm, alignbuffer, keylen); in ahash_setkey_unaligned() 209 unsigned int keylen) in crypto_ahash_setkey() argument 214 return ahash_setkey_unaligned(tfm, key, keylen); in crypto_ahash_setkey() 216 return tfm->setkey(tfm, key, keylen); in crypto_ahash_setkey() 221 unsigned int keylen) in ahash_nosetkey() argument
|
D | ablkcipher.c | 308 unsigned int keylen) in setkey_unaligned() argument 316 absize = keylen + alignmask; in setkey_unaligned() 322 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 323 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 324 memset(alignbuffer, 0, keylen); in setkey_unaligned() 330 unsigned int keylen) in setkey() argument 335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 341 return setkey_unaligned(tfm, key, keylen); in setkey() 343 return cipher->setkey(tfm, key, keylen); in setkey()
|
D | ctr.c | 39 unsigned int keylen) in crypto_ctr_setkey() argument 48 err = crypto_cipher_setkey(child, key, keylen); in crypto_ctr_setkey() 253 const u8 *key, unsigned int keylen) in crypto_rfc3686_setkey() argument 260 if (keylen < CTR_RFC3686_NONCE_SIZE) in crypto_rfc3686_setkey() 263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey() 266 keylen -= CTR_RFC3686_NONCE_SIZE; in crypto_rfc3686_setkey() 271 err = crypto_ablkcipher_setkey(child, key, keylen); in crypto_rfc3686_setkey()
|
D | skcipher.c | 35 const u8 *key, unsigned int keylen) in skcipher_setkey_blkcipher() argument 44 err = crypto_blkcipher_setkey(blkcipher, key, keylen); in skcipher_setkey_blkcipher() 127 const u8 *key, unsigned int keylen) in skcipher_setkey_ablkcipher() argument 137 err = crypto_ablkcipher_setkey(ablkcipher, key, keylen); in skcipher_setkey_ablkcipher()
|
D | xts.c | 34 unsigned int keylen) in setkey() argument 43 if (keylen % 2) { in setkey() 57 err = crypto_cipher_setkey(child, key + keylen/2, keylen/2); in setkey() 70 err = crypto_cipher_setkey(child, key, keylen/2); in setkey()
|
D | authenc.c | 52 unsigned int keylen) in crypto_authenc_extractkeys() argument 57 if (!RTA_OK(rta, keylen)) in crypto_authenc_extractkeys() 68 keylen -= RTA_ALIGN(rta->rta_len); in crypto_authenc_extractkeys() 70 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 73 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 82 unsigned int keylen) in crypto_authenc_setkey() argument 90 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
|
D | rsa.c | 275 unsigned int keylen) in rsa_set_pub_key() argument 280 ret = rsa_parse_pub_key(pkey, key, keylen); in rsa_set_pub_key() 292 unsigned int keylen) in rsa_set_priv_key() argument 297 ret = rsa_parse_priv_key(pkey, key, keylen); in rsa_set_priv_key()
|
D | crc32.c | 64 unsigned int keylen) in crc32_setkey() argument 68 if (keylen != sizeof(u32)) { in crc32_setkey()
|
D | crc32c_generic.c | 77 unsigned int keylen) in chksum_setkey() argument 81 if (keylen != sizeof(mctx->key)) { in chksum_setkey()
|
D | af_alg.c | 205 unsigned int keylen) in alg_setkey() argument 212 key = sock_kmalloc(sk, keylen, GFP_KERNEL); in alg_setkey() 217 if (copy_from_user(key, ukey, keylen)) in alg_setkey() 220 err = type->setkey(ask->private, key, keylen); in alg_setkey() 223 sock_kzfree_s(sk, key, keylen); in alg_setkey()
|
D | gcm.c | 113 unsigned int keylen) in crypto_gcm_setkey() argument 132 err = crypto_ablkcipher_setkey(ctr, key, keylen); in crypto_gcm_setkey() 784 unsigned int keylen) in crypto_rfc4106_setkey() argument 790 if (keylen < 4) in crypto_rfc4106_setkey() 793 keylen -= 4; in crypto_rfc4106_setkey() 794 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey() 799 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4106_setkey() 1016 unsigned int keylen) in crypto_rfc4543_setkey() argument 1022 if (keylen < 4) in crypto_rfc4543_setkey() 1025 keylen -= 4; in crypto_rfc4543_setkey() [all …]
|
D | ghash-generic.c | 45 const u8 *key, unsigned int keylen) in ghash_setkey() argument 49 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
|
D | ccm.c | 83 unsigned int keylen) in crypto_ccm_setkey() argument 93 err = crypto_ablkcipher_setkey(ctr, key, keylen); in crypto_ccm_setkey() 102 err = crypto_cipher_setkey(tfm, key, keylen); in crypto_ccm_setkey() 666 unsigned int keylen) in crypto_rfc4309_setkey() argument 672 if (keylen < 3) in crypto_rfc4309_setkey() 675 keylen -= 3; in crypto_rfc4309_setkey() 676 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey() 681 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4309_setkey()
|
D | michael_mic.c | 137 unsigned int keylen) in michael_setkey() argument 143 if (keylen != 8) { in michael_setkey()
|
D | crypto_null.c | 65 unsigned int keylen) in null_hash_setkey() argument 69 unsigned int keylen) in null_setkey() argument
|
D | ecb.c | 26 unsigned int keylen) in crypto_ecb_setkey() argument 35 err = crypto_cipher_setkey(child, key, keylen); in crypto_ecb_setkey()
|
D | lrw.c | 80 unsigned int keylen) in setkey() argument 85 const u8 *tweak = key + keylen - bsize; in setkey() 90 err = crypto_cipher_setkey(child, key, keylen - bsize); in setkey()
|
D | chacha20poly1305.c | 484 unsigned int keylen) in chachapoly_setkey() argument 489 if (keylen != ctx->saltlen + CHACHA20_KEY_SIZE) in chachapoly_setkey() 492 keylen -= ctx->saltlen; in chachapoly_setkey() 493 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey() 499 err = crypto_ablkcipher_setkey(ctx->chacha, key, keylen); in chachapoly_setkey()
|
D | xcbc.c | 62 const u8 *inkey, unsigned int keylen) in crypto_xcbc_digest_setkey() argument 71 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) in crypto_xcbc_digest_setkey()
|
D | cmac.c | 55 const u8 *inkey, unsigned int keylen) in crypto_cmac_digest_setkey() argument 65 err = crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cmac_digest_setkey()
|
D | cryptd.c | 185 const u8 *key, unsigned int keylen) in cryptd_blkcipher_setkey() argument 194 err = crypto_blkcipher_setkey(child, key, keylen); in cryptd_blkcipher_setkey() 430 const u8 *key, unsigned int keylen) in cryptd_hash_setkey() argument 439 err = crypto_shash_setkey(child, key, keylen); in cryptd_hash_setkey() 667 const u8 *key, unsigned int keylen) in cryptd_aead_setkey() argument 672 return crypto_aead_setkey(child, key, keylen); in cryptd_aead_setkey()
|
D | keywrap.c | 306 unsigned int keylen) in crypto_kw_setkey() argument 315 err = crypto_cipher_setkey(child, key, keylen); in crypto_kw_setkey()
|
D | pcbc.c | 30 unsigned int keylen) in crypto_pcbc_setkey() argument 39 err = crypto_cipher_setkey(child, key, keylen); in crypto_pcbc_setkey()
|
D | cbc.c | 27 unsigned int keylen) in crypto_cbc_setkey() argument 36 err = crypto_cipher_setkey(child, key, keylen); in crypto_cbc_setkey()
|
D | serpent_generic.c | 233 unsigned int keylen) in __serpent_setkey() argument 242 for (i = 0; i < keylen; ++i) in __serpent_setkey() 439 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in serpent_setkey() argument 441 return __serpent_setkey(crypto_tfm_ctx(tfm), key, keylen); in serpent_setkey() 571 unsigned int keylen) in tnepres_setkey() argument 576 for (i = 0; i < keylen; ++i) in tnepres_setkey() 577 rev_key[keylen - i - 1] = key[i]; in tnepres_setkey() 579 return serpent_setkey(tfm, rev_key, keylen); in tnepres_setkey()
|
D | cts.c | 58 unsigned int keylen) in crypto_cts_setkey() argument 67 err = crypto_blkcipher_setkey(child, key, keylen); in crypto_cts_setkey()
|
D | cast6_generic.c | 157 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in cast6_setkey() argument 159 return __cast6_setkey(crypto_tfm_ctx(tfm), key, keylen, in cast6_setkey()
|
D | algif_hash.c | 381 static int hash_setkey(void *private, const u8 *key, unsigned int keylen) in hash_setkey() argument 386 err = crypto_ahash_setkey(tfm->hash, key, keylen); in hash_setkey()
|
D | des_generic.c | 782 unsigned int keylen) in des_setkey() argument 863 unsigned int keylen) in __des3_ede_setkey() argument 883 unsigned int keylen) in des3_ede_setkey() argument 889 return __des3_ede_setkey(expkey, flags, key, keylen); in des3_ede_setkey()
|
D | pcrypt.c | 103 const u8 *key, unsigned int keylen) in pcrypt_aead_setkey() argument 107 return crypto_aead_setkey(ctx->child, key, keylen); in pcrypt_aead_setkey()
|
D | algif_aead.c | 531 static int aead_setkey(void *private, const u8 *key, unsigned int keylen) in aead_setkey() argument 533 return crypto_aead_setkey(private, key, keylen); in aead_setkey()
|
D | authencesn.c | 64 unsigned int keylen) in crypto_authenc_esn_setkey() argument 72 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
|
D | mcryptd.c | 302 const u8 *key, unsigned int keylen) in mcryptd_hash_setkey() argument 311 err = crypto_shash_setkey(child, key, keylen); in mcryptd_hash_setkey()
|
D | poly1305_generic.c | 55 const u8 *key, unsigned int keylen) in crypto_poly1305_setkey() argument
|
D | vmac.c | 545 const u8 *key, unsigned int keylen) in vmac_setkey() argument 549 if (keylen != VMAC_KEY_LEN) { in vmac_setkey()
|
D | algif_skcipher.c | 884 static int skcipher_setkey(void *private, const u8 *key, unsigned int keylen) in skcipher_setkey() argument 889 err = crypto_skcipher_setkey(tfm->skcipher, key, keylen); in skcipher_setkey()
|
D | fcrypt.c | 303 static int fcrypt_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in fcrypt_setkey() argument
|
/linux-4.4.14/net/mac80211/ |
D | wep.c | 57 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 66 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 74 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 77 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 92 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 113 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv() 163 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 172 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 182 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 187 return ieee80211_wep_encrypt_data(local->wep_tx_tfm, rc4key, keylen + 3, in ieee80211_wep_encrypt() [all …]
|
D | wep.h | 25 const u8 *key, int keylen, int keyidx);
|
D | debugfs_key.c | 65 KEY_CONF_FILE(keylen, D); 305 int i, bufsize = 2 * key->conf.keylen + 2; in key_key_read() 313 for (i = 0; i < key->conf.keylen; i++) in key_key_read() 355 DEBUGFS_ADD(keylen); in ieee80211_debugfs_key_add()
|
D | key.c | 399 key->conf.keylen = key_len; in ieee80211_key_alloc() 1122 keyconf->keylen, keyconf->key, in ieee80211_gtk_rekey_add()
|
/linux-4.4.14/drivers/crypto/sunxi-ss/ |
D | sun4i-ss-cipher.c | 55 for (i = 0; i < op->keylen; i += 4) in sun4i_ss_opti_poll() 188 for (i = 0; i < op->keylen; i += 4) in sun4i_ss_cipher_poll() 474 unsigned int keylen) in sun4i_ss_aes_setkey() argument 479 switch (keylen) { in sun4i_ss_aes_setkey() 490 dev_err(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun4i_ss_aes_setkey() 494 op->keylen = keylen; in sun4i_ss_aes_setkey() 495 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey() 501 unsigned int keylen) in sun4i_ss_des_setkey() argument 509 if (unlikely(keylen != DES_KEY_SIZE)) { in sun4i_ss_des_setkey() 510 dev_err(ss->dev, "Invalid keylen %u\n", keylen); in sun4i_ss_des_setkey() [all …]
|
D | sun4i-ss.h | 151 u32 keylen; member 197 unsigned int keylen); 199 unsigned int keylen); 201 unsigned int keylen);
|
/linux-4.4.14/fs/befs/ |
D | btree.c | 117 int index, u16 * keylen); 344 u16 keylen; in befs_find_key() local 357 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key() 359 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key() 374 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key() 375 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key() 429 u16 keylen; in befs_btree_read() local 498 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read() 502 (int)keylen); in befs_btree_read() 504 if (bufsize < keylen + 1) { in befs_btree_read() [all …]
|
/linux-4.4.14/drivers/crypto/caam/ |
D | key_gen.c | 45 int split_key_pad_len, const u8 *key_in, u32 keylen, in gen_split_key() argument 59 dma_addr_in = dma_map_single(jrdev, (void *)key_in, keylen, in gen_split_key() 74 append_key(desc, dma_addr_in, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 95 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 118 dma_unmap_single(jrdev, dma_addr_in, keylen, DMA_TO_DEVICE); in gen_split_key()
|
D | caamalg.c | 1284 const u8 *key, unsigned int keylen) in aead_setkey() argument 1293 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 1311 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey() 1349 const u8 *key, unsigned int keylen) in gcm_setkey() argument 1357 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in gcm_setkey() 1360 memcpy(ctx->key, key, keylen); in gcm_setkey() 1361 ctx->key_dma = dma_map_single(jrdev, ctx->key, keylen, in gcm_setkey() 1367 ctx->enckeylen = keylen; in gcm_setkey() 1379 const u8 *key, unsigned int keylen) in rfc4106_setkey() argument 1385 if (keylen < 4) in rfc4106_setkey() [all …]
|
D | key_gen.h | 16 int split_key_pad_len, const u8 *key_in, u32 keylen,
|
D | caamhash.c | 437 u32 keylen) in gen_split_hash_key() argument 440 ctx->split_key_pad_len, key_in, keylen, in gen_split_hash_key() 446 u32 *keylen, u8 *key_out, u32 digestsize) in hash_digest_key() argument 462 src_dma = dma_map_single(jrdev, (void *)key_in, *keylen, in hash_digest_key() 473 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); in hash_digest_key() 481 append_seq_in_ptr(desc, src_dma, *keylen, 0); in hash_digest_key() 482 append_seq_fifo_load(desc, *keylen, FIFOLD_CLASS_CLASS2 | in hash_digest_key() 490 DUMP_PREFIX_ADDRESS, 16, 4, key_in, *keylen, 1); in hash_digest_key() 510 dma_unmap_single(jrdev, src_dma, *keylen, DMA_TO_DEVICE); in hash_digest_key() 513 *keylen = digestsize; in hash_digest_key() [all …]
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 106 unsigned int keylen, in crypto4xx_setkey_aes() argument 115 if (keylen != AES_KEYSIZE_256 && in crypto4xx_setkey_aes() 116 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { in crypto4xx_setkey_aes() 126 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); in crypto4xx_setkey_aes() 154 key, keylen); in crypto4xx_setkey_aes() 155 sa->sa_contents = SA_AES_CONTENTS | (keylen << 2); in crypto4xx_setkey_aes() 156 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes() 171 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cbc() argument 173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
|
D | crypto4xx_core.h | 188 const u8 *key, unsigned int keylen);
|
/linux-4.4.14/include/crypto/ |
D | akcipher.h | 98 unsigned int keylen); 100 unsigned int keylen); 359 unsigned int keylen) in crypto_akcipher_set_pub_key() argument 363 return alg->set_pub_key(tfm, key, keylen); in crypto_akcipher_set_pub_key() 380 unsigned int keylen) in crypto_akcipher_set_priv_key() argument 384 return alg->set_priv_key(tfm, key, keylen); in crypto_akcipher_set_priv_key()
|
D | serpent.h | 21 unsigned int keylen); 22 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
D | cast6.h | 18 unsigned int keylen, u32 *flags); 19 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
D | hash.h | 137 unsigned int keylen); 183 unsigned int keylen); 204 unsigned int keylen); 377 unsigned int keylen); 762 unsigned int keylen);
|
D | skcipher.h | 57 unsigned int keylen); 305 const u8 *key, unsigned int keylen) in crypto_skcipher_setkey() argument 307 return tfm->setkey(tfm, key, keylen); in crypto_skcipher_setkey()
|
D | authenc.h | 35 unsigned int keylen);
|
D | des.h | 20 unsigned int keylen);
|
D | cast5.h | 18 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
D | aead.h | 136 unsigned int keylen); 287 const u8 *key, unsigned int keylen);
|
D | poly1305.h | 34 const u8 *key, unsigned int keylen);
|
D | if_alg.h | 54 int (*setkey)(void *private, const u8 *key, unsigned int keylen);
|
/linux-4.4.14/arch/powerpc/boot/ |
D | planetcore.c | 43 int keylen = strlen(key); in planetcore_get_key() local 46 if (!strncmp(table, key, keylen) && table[keylen] == '=') in planetcore_get_key() 47 return table + keylen + 1; in planetcore_get_key()
|
/linux-4.4.14/drivers/net/ppp/ |
D | ppp_mppe.c | 102 unsigned keylen; /* key length in bytes */ member 144 nbytes = setup_sg(&sg[0], state->master_key, state->keylen); in get_new_key_from_sha() 147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); in get_new_key_from_sha() 169 state->keylen); in mppe_rekey() 172 setup_sg(sg_in, state->sha1_digest, state->keylen); in mppe_rekey() 173 setup_sg(sg_out, state->session_key, state->keylen); in mppe_rekey() 175 state->keylen) != 0) { in mppe_rekey() 179 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey() 181 if (state->keylen == 8) { in mppe_rekey() 187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); in mppe_rekey() [all …]
|
/linux-4.4.14/drivers/crypto/ |
D | s5p-sss.c | 173 int keylen; member 380 uint8_t *key, uint8_t *iv, unsigned int keylen) in s5p_set_aes() argument 387 if (keylen == AES_KEYSIZE_256) in s5p_set_aes() 389 else if (keylen == AES_KEYSIZE_192) in s5p_set_aes() 394 memcpy(keystart, key, keylen); in s5p_set_aes() 414 if (dev->ctx->keylen == AES_KEYSIZE_192) in s5p_aes_crypt_start() 416 else if (dev->ctx->keylen == AES_KEYSIZE_256) in s5p_aes_crypt_start() 443 s5p_set_aes(dev, dev->ctx->aes_key, req->info, dev->ctx->keylen); in s5p_aes_crypt_start() 531 const uint8_t *key, unsigned int keylen) in s5p_aes_setkey() argument 536 if (keylen != AES_KEYSIZE_128 && in s5p_aes_setkey() [all …]
|
D | geode-aes.c | 122 op->keylen = len; in geode_setkey_cip() 155 op->keylen = len; in geode_setkey_blk() 220 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 241 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 312 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt() 344 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt() 425 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt() 455 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
|
D | atmel-tdes.c | 77 int keylen; member 276 if (dd->ctx->keylen > (DES_KEY_SIZE << 1)) { in atmel_tdes_write_ctrl() 279 } else if (dd->ctx->keylen > DES_KEY_SIZE) { in atmel_tdes_write_ctrl() 310 dd->ctx->keylen >> 2); in atmel_tdes_write_ctrl() 778 unsigned int keylen) in atmel_des_setkey() argument 786 if (keylen != DES_KEY_SIZE) { in atmel_des_setkey() 797 memcpy(ctx->key, key, keylen); in atmel_des_setkey() 798 ctx->keylen = keylen; in atmel_des_setkey() 804 unsigned int keylen) in atmel_tdes_setkey() argument 815 && (keylen != 2*DES_KEY_SIZE)) { in atmel_tdes_setkey() [all …]
|
D | n2_core.c | 443 unsigned int keylen) in n2_hmac_async_setkey() argument 452 err = crypto_ahash_setkey(fallback_tfm, key, keylen); in n2_hmac_async_setkey() 463 if (keylen > bs) { in n2_hmac_async_setkey() 464 err = crypto_shash_digest(shash, key, keylen, in n2_hmac_async_setkey() 468 keylen = ds; in n2_hmac_async_setkey() 469 } else if (keylen <= N2_HASH_KEY_MAX) in n2_hmac_async_setkey() 470 memcpy(ctx->hash_key, key, keylen); in n2_hmac_async_setkey() 472 ctx->hash_key_len = keylen; in n2_hmac_async_setkey() 715 unsigned int keylen) in n2_aes_setkey() argument 723 switch (keylen) { in n2_aes_setkey() [all …]
|
D | sahara.c | 151 int keylen; member 460 memcpy(dev->key_base, ctx->key, ctx->keylen); in sahara_hw_descriptor_create() 470 dev->hw_desc[idx]->len2 = ctx->keylen; in sahara_hw_descriptor_create() 602 unsigned int keylen) in sahara_aes_setkey() argument 607 ctx->keylen = keylen; in sahara_aes_setkey() 610 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 611 memcpy(ctx->key, key, keylen); in sahara_aes_setkey() 616 if (keylen != AES_KEYSIZE_128 && in sahara_aes_setkey() 617 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in sahara_aes_setkey() 627 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); in sahara_aes_setkey() [all …]
|
D | omap-aes.c | 103 int keylen; member 264 key32 = dd->ctx->keylen / sizeof(u32); in omap_aes_write_ctrl() 275 val = FLD_VAL(((dd->ctx->keylen >> 3) - 1), 4, 3); in omap_aes_write_ctrl() 744 unsigned int keylen) in omap_aes_setkey() argument 748 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_setkey() 749 keylen != AES_KEYSIZE_256) in omap_aes_setkey() 752 pr_debug("enter, keylen: %d\n", keylen); in omap_aes_setkey() 754 memcpy(ctx->key, key, keylen); in omap_aes_setkey() 755 ctx->keylen = keylen; in omap_aes_setkey()
|
D | atmel-aes.c | 85 int keylen; member 507 if (dd->ctx->keylen == AES_KEYSIZE_128) in atmel_aes_write_ctrl() 509 else if (dd->ctx->keylen == AES_KEYSIZE_192) in atmel_aes_write_ctrl() 551 dd->ctx->keylen >> 2); in atmel_aes_write_ctrl() 824 unsigned int keylen) in atmel_aes_setkey() argument 828 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in atmel_aes_setkey() 829 keylen != AES_KEYSIZE_256) { in atmel_aes_setkey() 834 memcpy(ctx->key, key, keylen); in atmel_aes_setkey() 835 ctx->keylen = keylen; in atmel_aes_setkey()
|
D | omap-des.c | 83 int keylen; member 258 key32 = dd->ctx->keylen / sizeof(u32); in omap_des_write_ctrl() 728 unsigned int keylen) in omap_des_setkey() argument 732 if (keylen != DES_KEY_SIZE && keylen != (3*DES_KEY_SIZE)) in omap_des_setkey() 735 pr_debug("enter, keylen: %d\n", keylen); in omap_des_setkey() 737 memcpy(ctx->key, key, keylen); in omap_des_setkey() 738 ctx->keylen = keylen; in omap_des_setkey()
|
D | talitos.c | 816 unsigned int keylen; member 849 const u8 *key, unsigned int keylen) in aead_setkey() argument 854 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 863 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 1387 const u8 *key, unsigned int keylen) in ablkcipher_setkey() argument 1391 memcpy(&ctx->key, key, keylen); in ablkcipher_setkey() 1392 ctx->keylen = keylen; in ablkcipher_setkey() 1574 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, in common_nonsnoop() 1752 if (ctx->keylen) in common_nonsnoop_hash() 1753 map_single_talitos_ptr(dev, &desc->ptr[2], ctx->keylen, in common_nonsnoop_hash() [all …]
|
D | geode-aes.h | 70 u32 keylen; member
|
D | mv_cesa.c | 779 unsigned int keylen) in mv_hash_setkey() argument 788 rc = crypto_shash_setkey(ctx->fallback, key, keylen); in mv_hash_setkey() 809 if (keylen > bs) { in mv_hash_setkey() 813 crypto_shash_digest(shash, key, keylen, ipad); in mv_hash_setkey() 817 keylen = ds; in mv_hash_setkey() 819 memcpy(ipad, key, keylen); in mv_hash_setkey() 821 memset(ipad + keylen, 0, bs - keylen); in mv_hash_setkey()
|
D | omap-sham.c | 1190 unsigned int keylen) in omap_sham_setkey() argument 1211 err = crypto_shash_setkey(tctx->fallback, key, keylen); in omap_sham_setkey() 1215 if (keylen > bs) { in omap_sham_setkey() 1218 key, keylen, bctx->ipad); in omap_sham_setkey() 1221 keylen = ds; in omap_sham_setkey() 1223 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey() 1226 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey()
|
D | bfin_crc.c | 454 unsigned int keylen) in bfin_crypto_crc_setkey() argument 459 if (keylen != CHKSUM_DIGEST_SIZE) { in bfin_crypto_crc_setkey()
|
D | picoxcell_crypto.c | 450 unsigned int keylen) in spacc_aead_setkey() argument 459 err = crypto_aead_setkey(ctx->sw_cipher, key, keylen); in spacc_aead_setkey() 466 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey()
|
D | hifn_795x.c | 1124 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) in hifn_setup_crypto_command() argument 1149 if (keylen) { in hifn_setup_crypto_command() 1150 memcpy(buf_pos, key, keylen); in hifn_setup_crypto_command() 1151 buf_pos += keylen; in hifn_setup_crypto_command()
|
D | ixp4xx_crypto.c | 1157 unsigned int keylen) in aead_setkey() argument 1162 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
|
/linux-4.4.14/drivers/crypto/ux500/hash/ |
D | hash_core.c | 262 if (!ctx->keylen) { in get_empty_message_digest() 442 const u8 *key, unsigned int keylen) in hash_hw_write_key() argument 449 while (keylen >= 4) { in hash_hw_write_key() 453 keylen -= 4; in hash_hw_write_key() 458 if (keylen) { in hash_hw_write_key() 460 while (keylen) { in hash_hw_write_key() 461 word |= (key[keylen - 1] << (8 * (keylen - 1))); in hash_hw_write_key() 462 keylen--; in hash_hw_write_key() 500 hash_hw_write_key(device_data, ctx->key, ctx->keylen); in init_hash_hw() 571 ctx->keylen = 0; in hash_init() [all …]
|
D | hash_alg.h | 330 u32 keylen; member
|
/linux-4.4.14/lib/ |
D | btree.c | 52 int keylen; member 58 .keylen = 1, 66 .keylen = LONG_PER_U64, 73 .keylen = 2 * LONG_PER_U64, 140 for (i = geo->keylen - 1; i >= 0; i--) { in dec_key() 150 return &node[n * geo->keylen]; in bkey() 161 longcpy(bkey(geo, node, n), key, geo->keylen); in setkey() 172 longset(bkey(geo, node, n), 0, geo->keylen); in clearpair() 219 longcpy(key, bkey(geo, node, 0), geo->keylen); in btree_last() 227 return longcmp(bkey(geo, node, pos), key, geo->keylen); in keycmp() [all …]
|
D | assoc_array.c | 500 size_t keylen; in assoc_array_insert_into_terminal_node() local 775 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); in assoc_array_insert_into_terminal_node() 776 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; in assoc_array_insert_into_terminal_node() 779 keylen * sizeof(unsigned long), GFP_KERNEL); in assoc_array_insert_into_terminal_node() 797 for (i = 0; i < keylen; i++) in assoc_array_insert_into_terminal_node() 802 pr_devel("blank off [%zu] %d: %lx\n", keylen - 1, level, blank); in assoc_array_insert_into_terminal_node() 803 new_s0->index_key[keylen - 1] &= ~blank; in assoc_array_insert_into_terminal_node() 832 size_t keylen; in assoc_array_insert_mid_shortcut() local 881 keylen = round_up(diff, ASSOC_ARRAY_KEY_CHUNK_SIZE); in assoc_array_insert_mid_shortcut() 882 keylen >>= ASSOC_ARRAY_KEY_CHUNK_SHIFT; in assoc_array_insert_mid_shortcut() [all …]
|
/linux-4.4.14/drivers/crypto/vmx/ |
D | aes.c | 79 unsigned int keylen) in p8_aes_setkey() argument 88 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_setkey() 89 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_setkey() 93 ret += crypto_cipher_setkey(ctx->fallback, key, keylen); in p8_aes_setkey()
|
D | aes_cbc.c | 80 unsigned int keylen) in p8_aes_cbc_setkey() argument 89 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_cbc_setkey() 90 ret += aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_cbc_setkey() 94 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey()
|
D | aes_ctr.c | 78 unsigned int keylen) in p8_aes_ctr_setkey() argument 86 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_ctr_setkey() 89 ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey()
|
D | ghash.c | 112 unsigned int keylen) in p8_ghash_setkey() argument 116 if (keylen != GHASH_KEY_LEN) in p8_ghash_setkey() 127 return crypto_shash_setkey(ctx->fallback, key, keylen); in p8_ghash_setkey()
|
/linux-4.4.14/fs/cifs/ |
D | cache.c | 233 uint16_t keylen; in cifs_fscache_inode_get_key() local 236 keylen = sizeof(cifsi->uniqueid); in cifs_fscache_inode_get_key() 237 if (keylen > maxbuf) in cifs_fscache_inode_get_key() 238 keylen = 0; in cifs_fscache_inode_get_key() 240 memcpy(buffer, &cifsi->uniqueid, keylen); in cifs_fscache_inode_get_key() 242 return keylen; in cifs_fscache_inode_get_key()
|
/linux-4.4.14/fs/fscache/ |
D | object-list.c | 255 uint16_t keylen = 0, auxlen = 0; in fscache_objlist_show() local 278 keylen = cookie->def->get_key(cookie->netfs_data, in fscache_objlist_show() 284 buf + keylen, 512 - keylen); in fscache_objlist_show() 287 if (keylen > 0 || auxlen > 0) { in fscache_objlist_show() 289 for (p = buf; keylen > 0; keylen--) in fscache_objlist_show()
|
/linux-4.4.14/arch/x86/crypto/ |
D | twofish_glue_3way.c | 217 unsigned int keylen) in lrw_twofish_setkey() argument 222 err = __twofish_setkey(&ctx->twofish_ctx, key, keylen - TF_BLOCK_SIZE, in lrw_twofish_setkey() 227 return lrw_init_table(&ctx->lrw_table, key + keylen - TF_BLOCK_SIZE); in lrw_twofish_setkey() 274 unsigned int keylen) in xts_twofish_setkey() argument 283 if (keylen % 2) { in xts_twofish_setkey() 289 err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_twofish_setkey() 294 return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_twofish_setkey()
|
D | serpent_sse2_glue.c | 230 unsigned int keylen) in lrw_serpent_setkey() argument 235 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - in lrw_serpent_setkey() 240 return lrw_init_table(&ctx->lrw_table, key + keylen - in lrw_serpent_setkey() 309 unsigned int keylen) in xts_serpent_setkey() argument 318 if (keylen % 2) { in xts_serpent_setkey() 324 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); in xts_serpent_setkey() 329 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); in xts_serpent_setkey()
|
D | cast6_avx_glue.c | 248 unsigned int keylen) in lrw_cast6_setkey() argument 253 err = __cast6_setkey(&ctx->cast6_ctx, key, keylen - CAST6_BLOCK_SIZE, in lrw_cast6_setkey() 258 return lrw_init_table(&ctx->lrw_table, key + keylen - CAST6_BLOCK_SIZE); in lrw_cast6_setkey() 326 unsigned int keylen) in xts_cast6_setkey() argument 335 if (keylen % 2) { in xts_cast6_setkey() 341 err = __cast6_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_cast6_setkey() 346 return __cast6_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_cast6_setkey()
|
D | serpent_avx_glue.c | 256 unsigned int keylen) in lrw_serpent_setkey() argument 261 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen - in lrw_serpent_setkey() 266 return lrw_init_table(&ctx->lrw_table, key + keylen - in lrw_serpent_setkey() 332 unsigned int keylen) in xts_serpent_setkey() argument 341 if (keylen % 2) { in xts_serpent_setkey() 347 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); in xts_serpent_setkey() 352 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); in xts_serpent_setkey()
|
D | ghash-clmulni-intel_glue.c | 56 const u8 *key, unsigned int keylen) in ghash_setkey() argument 62 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey() 244 unsigned int keylen) in ghash_async_setkey() argument 253 err = crypto_ahash_setkey(child, key, keylen); in ghash_async_setkey()
|
D | crc32-pclmul_glue.c | 92 unsigned int keylen) in crc32_pclmul_setkey() argument 96 if (keylen != sizeof(u32)) { in crc32_pclmul_setkey()
|
D | camellia_glue.c | 1441 unsigned int keylen) in lrw_camellia_setkey() argument 1447 keylen - CAMELLIA_BLOCK_SIZE, in lrw_camellia_setkey() 1453 key + keylen - CAMELLIA_BLOCK_SIZE); in lrw_camellia_setkey() 1500 unsigned int keylen) in xts_camellia_setkey() argument 1509 if (keylen % 2) { in xts_camellia_setkey() 1515 err = __camellia_setkey(&ctx->crypt_ctx, key, keylen / 2, flags); in xts_camellia_setkey() 1520 return __camellia_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2, in xts_camellia_setkey()
|
D | fpu.c | 28 unsigned int keylen) in crypto_fpu_setkey() argument 37 err = crypto_blkcipher_setkey(child, key, keylen); in crypto_fpu_setkey()
|
D | crc32c-intel_glue.c | 115 unsigned int keylen) in crc32c_intel_setkey() argument 119 if (keylen != sizeof(u32)) { in crc32c_intel_setkey()
|
D | aesni-intel_glue.c | 570 unsigned int keylen) in lrw_aesni_setkey() argument 576 keylen - AES_BLOCK_SIZE); in lrw_aesni_setkey() 580 return lrw_init_table(&ctx->lrw_table, key + keylen - AES_BLOCK_SIZE); in lrw_aesni_setkey() 639 unsigned int keylen) in xts_aesni_setkey() argument 648 if (keylen % 2) { in xts_aesni_setkey() 654 err = aes_set_key_common(tfm, ctx->raw_crypt_ctx, key, keylen / 2); in xts_aesni_setkey() 659 return aes_set_key_common(tfm, ctx->raw_tweak_ctx, key + keylen / 2, in xts_aesni_setkey() 660 keylen / 2); in xts_aesni_setkey()
|
D | des3_ede_glue.c | 360 unsigned int keylen) in des3_ede_x86_setkey() argument 367 err = __des3_ede_setkey(ctx->enc_expkey, &tfm->crt_flags, key, keylen); in des3_ede_x86_setkey()
|
/linux-4.4.14/include/linux/ |
D | crypto.h | 255 unsigned int keylen); 282 unsigned int keylen); 348 unsigned int keylen); 493 unsigned int keylen); 508 unsigned int keylen); 517 const u8 *key, unsigned int keylen); 530 unsigned int keylen); 866 const u8 *key, unsigned int keylen) in crypto_ablkcipher_setkey() argument 870 return crt->setkey(crt->base, key, keylen); in crypto_ablkcipher_setkey() 1257 const u8 *key, unsigned int keylen) in crypto_blkcipher_setkey() argument [all …]
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 448 const uint8_t *key, unsigned int keylen) in qat_alg_ablkcipher_init_com() argument 454 memcpy(cd->aes.key, key, keylen); in qat_alg_ablkcipher_init_com() 460 cd_ctrl->cipher_key_sz = keylen >> 3; in qat_alg_ablkcipher_init_com() 469 unsigned int keylen, int mode) in qat_alg_ablkcipher_init_enc() argument 475 qat_alg_ablkcipher_init_com(ctx, req, enc_cd, key, keylen); in qat_alg_ablkcipher_init_enc() 482 unsigned int keylen, int mode) in qat_alg_ablkcipher_init_dec() argument 488 qat_alg_ablkcipher_init_com(ctx, req, dec_cd, key, keylen); in qat_alg_ablkcipher_init_dec() 531 unsigned int keylen, int mode) in qat_alg_aead_init_sessions() argument 536 if (crypto_authenc_extractkeys(&keys, key, keylen)) in qat_alg_aead_init_sessions() 558 unsigned int keylen, in qat_alg_ablkcipher_init_sessions() argument [all …]
|
D | qat_asym_algs.c | 605 unsigned int keylen, bool private) in qat_rsa_setkey() argument 627 keylen); in qat_rsa_setkey() 630 keylen); in qat_rsa_setkey() 665 unsigned int keylen) in qat_rsa_setpubkey() argument 667 return qat_rsa_setkey(tfm, key, keylen, false); in qat_rsa_setpubkey() 671 unsigned int keylen) in qat_rsa_setprivkey() argument 673 return qat_rsa_setkey(tfm, key, keylen, true); in qat_rsa_setprivkey()
|
/linux-4.4.14/drivers/isdn/mISDN/ |
D | dsp_blowfish.c | 599 dsp_bf_init(struct dsp *dsp, const u8 *key, uint keylen) in dsp_bf_init() argument 606 if (keylen < 4 || keylen > 56) in dsp_bf_init() 634 ((u32)key[(j + 1) % keylen] << 16) | in dsp_bf_init() 635 ((u32)key[(j + 2) % keylen] << 8) | in dsp_bf_init() 636 ((u32)key[(j + 3) % keylen])); in dsp_bf_init() 639 j = (j + 4) % keylen; in dsp_bf_init()
|
D | dsp.h | 266 extern int dsp_bf_init(struct dsp *dsp, const u8 *key, unsigned int keylen);
|
/linux-4.4.14/drivers/crypto/qce/ |
D | ablkcipher.c | 153 unsigned int keylen) in qce_ablkcipher_setkey() argument 160 if (!key || !keylen) in qce_ablkcipher_setkey() 164 switch (keylen) { in qce_ablkcipher_setkey() 180 ctx->enc_keylen = keylen; in qce_ablkcipher_setkey() 181 memcpy(ctx->enc_key, key, keylen); in qce_ablkcipher_setkey() 184 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keylen); in qce_ablkcipher_setkey() 186 ctx->enc_keylen = keylen; in qce_ablkcipher_setkey()
|
D | common.c | 326 unsigned int keylen; in qce_setup_regs_ablkcipher() local 334 keylen = ctx->enc_keylen / 2; in qce_setup_regs_ablkcipher() 336 keylen = ctx->enc_keylen; in qce_setup_regs_ablkcipher() 338 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_ablkcipher() 339 enckey_words = keylen / sizeof(u32); in qce_setup_regs_ablkcipher() 343 encr_cfg = qce_encr_cfg(flags, keylen); in qce_setup_regs_ablkcipher()
|
D | sha.c | 364 unsigned int keylen) in qce_ahash_hmac_setkey() argument 380 if (keylen <= blocksize) { in qce_ahash_hmac_setkey() 381 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 408 buf = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, GFP_KERNEL); in qce_ahash_hmac_setkey() 414 memcpy(buf, key, keylen); in qce_ahash_hmac_setkey() 415 sg_init_one(&sg, buf, keylen); in qce_ahash_hmac_setkey() 416 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
/linux-4.4.14/arch/x86/include/asm/crypto/ |
D | twofish.h | 39 unsigned int keylen); 44 unsigned int keylen);
|
D | serpent-avx.h | 41 unsigned int keylen); 46 unsigned int keylen);
|
D | camellia.h | 33 unsigned int keylen); 37 unsigned int keylen);
|
/linux-4.4.14/drivers/crypto/marvell/ |
D | hash.c | 1096 const u8 *key, unsigned int keylen, in mv_cesa_ahmac_pad_init() argument 1105 if (keylen <= blocksize) { in mv_cesa_ahmac_pad_init() 1106 memcpy(ipad, key, keylen); in mv_cesa_ahmac_pad_init() 1108 u8 *keydup = kmemdup(key, keylen, GFP_KERNEL); in mv_cesa_ahmac_pad_init() 1116 sg_init_one(&sg, keydup, keylen); in mv_cesa_ahmac_pad_init() 1117 ahash_request_set_crypt(req, &sg, ipad, keylen); in mv_cesa_ahmac_pad_init() 1127 memset(keydup, 0, keylen); in mv_cesa_ahmac_pad_init() 1133 keylen = crypto_ahash_digestsize(crypto_ahash_reqtfm(req)); in mv_cesa_ahmac_pad_init() 1136 memset(ipad + keylen, 0, blocksize - keylen); in mv_cesa_ahmac_pad_init() 1148 const u8 *key, unsigned int keylen, in mv_cesa_ahmac_setkey() argument [all …]
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 77 u32 keylen; member 338 int num_of_regs = ctx->keylen / 8; in cfg_keys() 347 ctx->keylen); in cfg_keys() 349 for (i = 0; i < ctx->keylen / 4; i++) in cfg_keys() 945 const u8 *key, unsigned int keylen) in aes_ablkcipher_setkey() argument 952 switch (keylen) { in aes_ablkcipher_setkey() 971 memcpy(ctx->key, key, keylen); in aes_ablkcipher_setkey() 972 ctx->keylen = keylen; in aes_ablkcipher_setkey() 980 const u8 *key, unsigned int keylen) in des_ablkcipher_setkey() argument 988 if (keylen != DES_KEY_SIZE) { in des_ablkcipher_setkey() [all …]
|
/linux-4.4.14/security/keys/ |
D | trusted.c | 77 unsigned int keylen, ...) in TSS_rawhmac() argument 91 ret = crypto_shash_setkey(hmacalg, key, keylen); in TSS_rawhmac() 98 va_start(argp, keylen); in TSS_rawhmac() 124 unsigned int keylen, unsigned char *h1, in TSS_authhmac() argument 163 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac() 178 unsigned int keylen, ...) in TSS_checkhmac1() argument 223 va_start(argp, keylen); in TSS_checkhmac1() 239 ret = TSS_rawhmac(testhmac, key, keylen, SHA1_DIGEST_SIZE, paramdigest, in TSS_checkhmac1() 807 long keylen; in datablob_parse() local 823 ret = kstrtol(c, 10, &keylen); in datablob_parse() [all …]
|
/linux-4.4.14/drivers/staging/lustre/lustre/libcfs/linux/ |
D | linux-crypto-adler.c | 55 unsigned int keylen) in adler32_setkey() argument 59 if (keylen != sizeof(u32)) { in adler32_setkey()
|
/linux-4.4.14/arch/arm/crypto/ |
D | ghash-ce-glue.c | 110 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 115 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey() 230 unsigned int keylen) in ghash_async_setkey() argument 239 err = crypto_ahash_setkey(child, key, keylen); in ghash_async_setkey()
|
/linux-4.4.14/arch/sparc/crypto/ |
D | crc32c_glue.c | 31 unsigned int keylen) in crc32c_sparc64_setkey() argument 35 if (keylen != sizeof(u32)) { in crc32c_sparc64_setkey()
|
D | des_glue.c | 44 unsigned int keylen) in des_set_key() argument 201 unsigned int keylen) in des3_ede_set_key() argument
|
/linux-4.4.14/drivers/staging/vt6656/ |
D | key.c | 110 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode() 112 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode()
|
D | rxtx.c | 733 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); in vnt_fill_txkey() 735 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { in vnt_fill_txkey() 964 if (tx_key->keylen > 0) in vnt_tx_packet()
|
/linux-4.4.14/drivers/staging/vt6655/ |
D | key.c | 101 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode() 103 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode()
|
D | rxtx.c | 1224 memcpy(key_buffer + 3, tx_key->key, tx_key->keylen); in vnt_fill_txkey() 1226 if (tx_key->keylen == WLAN_KEY_LEN_WEP40) { in vnt_fill_txkey() 1404 if (tx_key->keylen > 0) in vnt_generate_fifo_header()
|
/linux-4.4.14/arch/arm64/crypto/ |
D | ghash-ce-glue.c | 104 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 109 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
|
D | crc32-arm64.c | 116 unsigned int keylen) in chksum_setkey() argument 120 if (keylen != sizeof(mctx->key)) { in chksum_setkey()
|
/linux-4.4.14/drivers/isdn/i4l/ |
D | isdn_v110.c | 66 FlipBits(unsigned char c, int keylen) in FlipBits() argument 72 int hunks = (8 / keylen); in FlipBits() 76 for (j = 0; j < keylen; j++) { in FlipBits() 78 c |= bit >> (keylen - j - 1); in FlipBits() 80 bit >>= keylen; in FlipBits()
|
/linux-4.4.14/drivers/net/wireless/orinoco/ |
D | hw.c | 858 int keylen; in __orinoco_hw_setup_wepkeys() local 862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys() 864 if (keylen > LARGE_KEY_SIZE) { in __orinoco_hw_setup_wepkeys() 866 priv->ndev->name, priv->tx_key, keylen); in __orinoco_hw_setup_wepkeys() 868 } else if (keylen > SMALL_KEY_SIZE) in __orinoco_hw_setup_wepkeys() 869 keylen = LARGE_KEY_SIZE; in __orinoco_hw_setup_wepkeys() 870 else if (keylen > 0) in __orinoco_hw_setup_wepkeys() 871 keylen = SMALL_KEY_SIZE; in __orinoco_hw_setup_wepkeys() 873 keylen = 0; in __orinoco_hw_setup_wepkeys() 884 HERMES_BYTES_TO_RECLEN(keylen), in __orinoco_hw_setup_wepkeys()
|
/linux-4.4.14/arch/s390/crypto/ |
D | ghash_s390.c | 42 const u8 *key, unsigned int keylen) in ghash_setkey() argument 46 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
|
/linux-4.4.14/drivers/net/wireless/ath/wcn36xx/ |
D | smd.h | 91 u8 keylen, 97 u8 keylen,
|
D | main.c | 398 key_conf->keylen, key_conf->flags); in wcn36xx_set_key() 401 key_conf->keylen); in wcn36xx_set_key() 437 memcpy(key, key_conf->key, key_conf->keylen); in wcn36xx_set_key() 453 key_conf->keylen, in wcn36xx_set_key() 460 key_conf->keylen, in wcn36xx_set_key() 468 key_conf->keylen, in wcn36xx_set_key()
|
D | smd.c | 1457 u8 keylen, in wcn36xx_smd_set_stakey() argument 1474 msg_body.set_sta_key_params.key[0].length = keylen; in wcn36xx_smd_set_stakey() 1475 memcpy(msg_body.set_sta_key_params.key[0].key, key, keylen); in wcn36xx_smd_set_stakey() 1498 u8 keylen, in wcn36xx_smd_set_bsskey() argument 1513 msg_body.keys[0].length = keylen; in wcn36xx_smd_set_bsskey() 1514 memcpy(msg_body.keys[0].key, key, keylen); in wcn36xx_smd_set_bsskey()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/dvm/ |
D | sta.c | 1042 if (keyconf->keylen != WEP_KEY_LEN_128 && in iwl_set_default_wep_key() 1043 keyconf->keylen != WEP_KEY_LEN_64) { in iwl_set_default_wep_key() 1045 "Bad WEP key length %d\n", keyconf->keylen); in iwl_set_default_wep_key() 1051 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; in iwl_set_default_wep_key() 1053 keyconf->keylen); in iwl_set_default_wep_key() 1057 keyconf->keylen, keyconf->keyidx, ret); in iwl_set_default_wep_key() 1116 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); in iwlagn_send_sta_key() 1123 memcpy(sta_cmd.key.key, keyconf->key, keyconf->keylen); in iwlagn_send_sta_key() 1130 memcpy(&sta_cmd.key.key[3], keyconf->key, keyconf->keylen); in iwlagn_send_sta_key() 1270 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_set_dynamic_key()
|
D | tx.c | 218 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); in iwlagn_tx_cmd_build_hwcrypto() 235 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in iwlagn_tx_cmd_build_hwcrypto()
|
/linux-4.4.14/drivers/hv/ |
D | hv_kvp.c | 472 int keylen = 0; in kvp_respond_to_host() local 548 keylen = utf8s_to_utf16s(key_name, strlen(key_name), UTF16_HOST_ENDIAN, in kvp_respond_to_host() 551 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host() 564 if ((keylen < 0) || (valuelen < 0)) in kvp_respond_to_host()
|
/linux-4.4.14/arch/cris/include/uapi/arch-v32/arch/ |
D | cryptocop.h | 75 size_t keylen; member
|
/linux-4.4.14/Documentation/security/ |
D | keys-ecryptfs.txt | 39 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 45 keylen:= 64
|
D | keys-trusted-encrypted.txt | 24 keyctl add trusted name "new keylen [options]" ring 61 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
|
/linux-4.4.14/arch/cris/include/arch-v32/arch/ |
D | cryptocop.h | 37 unsigned int keylen; member
|
/linux-4.4.14/drivers/staging/lustre/lustre/mdc/ |
D | mdc_request.c | 1104 __u32 keylen, vallen; in mdc_ioc_fid2path() local 1114 keylen = cfs_size_round(sizeof(KEY_FID2PATH)) + sizeof(*gf); in mdc_ioc_fid2path() 1115 key = kzalloc(keylen, GFP_NOFS); in mdc_ioc_fid2path() 1132 rc = obd_get_info(NULL, exp, keylen, key, &vallen, gf, NULL); in mdc_ioc_fid2path() 1879 u32 keylen, void *key, in mdc_get_info_rpc() argument 1892 RCL_CLIENT, keylen); in mdc_get_info_rpc() 1903 memcpy(tmp, key, keylen); in mdc_get_info_rpc() 2051 u32 keylen, void *key, in mdc_set_info_async() argument 2075 keylen, key, vallen, val, set); in mdc_set_info_async() 2088 keylen, key, vallen, val, set); in mdc_set_info_async() [all …]
|
/linux-4.4.14/net/ipv6/ |
D | esp6.c | 534 unsigned int keylen; in esp_init_authenc() local 568 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 571 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 610 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|
/linux-4.4.14/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 455 get_aes_decrypt_key(tc->tctx->dec_key, tc->tctx->init.key, tc->tctx->init.keylen); in setup_key_dl_desc() 459 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc() 462 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc() 466 switch (tc->tctx->init.keylen) { in setup_key_dl_desc() 1463 if (tinit->keylen != 0) { in transform_ok() 1464 …_API(printk("transform_ok: non-zero keylength, %d, for a digest/csum algorithm\n", tinit->keylen)); in transform_ok() 1469 if (tinit->keylen != 64) { in transform_ok() 1470 DEBUG_API(printk("transform_ok: keylen %d invalid for DES\n", tinit->keylen)); in transform_ok() 1475 if (tinit->keylen != 192) { in transform_ok() 1476 DEBUG_API(printk("transform_ok: keylen %d invalid for 3DES\n", tinit->keylen)); in transform_ok() [all …]
|
/linux-4.4.14/drivers/staging/rtl8712/ |
D | rtl871x_mlme.c | 1238 u8 keylen; in r8712_set_key() local 1260 keylen = 5; in r8712_set_key() 1262 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key() 1265 keylen = 13; in r8712_set_key() 1267 psecuritypriv->DefKey[keyid].skey, keylen); in r8712_set_key() 1274 keylen = 16; in r8712_set_key() 1276 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key() 1284 keylen = 16; in r8712_set_key() 1286 &psecuritypriv->XGrpKey[keyid - 1], keylen); in r8712_set_key()
|
/linux-4.4.14/net/ipv4/ |
D | esp4.c | 592 unsigned int keylen; in esp_init_authenc() local 626 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 629 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 668 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|
D | tcp_ipv4.c | 925 key->keylen = newkeylen; in tcp_md5_do_add() 951 key->keylen = newkeylen; in tcp_md5_do_add() 1328 AF_INET, key->key, key->keylen, GFP_ATOMIC); in tcp_v4_syn_recv_sock()
|
/linux-4.4.14/drivers/net/wireless/ath/ |
D | key.c | 504 hk.kv_len = key->keylen; in ath_key_config() 505 if (key->keylen) in ath_key_config() 506 memcpy(hk.kv_val, key->key, key->keylen); in ath_key_config()
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
D | rtw_mlme.c | 1781 u8 keylen; in rtw_set_key23a() local 1831 keylen = 5; in rtw_set_key23a() 1833 &psecuritypriv->wep_key[keyid].key, keylen); in rtw_set_key23a() 1836 keylen = 13; in rtw_set_key23a() 1838 &psecuritypriv->wep_key[keyid].key, keylen); in rtw_set_key23a() 1841 keylen = 16; in rtw_set_key23a() 1843 &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key23a() 1847 keylen = 16; in rtw_set_key23a() 1849 &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key23a()
|
D | rtw_security.c | 175 keylength = psecuritypriv->wep_key[index].keylen; in rtw_wep_encrypt23a() 235 keylength = psecuritypriv->wep_key[keyindex].keylen; in rtw_wep_decrypt23a()
|
/linux-4.4.14/drivers/net/wireless/hostap/ |
D | hostap_main.c | 333 int i, keylen, len, idx; in hostap_set_encryption() local 388 keylen = 6; /* first 5 octets */ in hostap_set_encryption() 392 keylen = WEP_KEY_LEN + 1; /* first 13 octets */ in hostap_set_encryption() 403 keybuf, keylen)) { in hostap_set_encryption() 405 i, keylen); in hostap_set_encryption()
|
/linux-4.4.14/drivers/net/wireless/rt2x00/ |
D | rt2x00mac.c | 477 if (key->keylen > 32) in rt2x00mac_set_key() 499 memcpy_tkip(&crypto, &key->key[0], key->keylen); in rt2x00mac_set_key() 501 memcpy(crypto.key, &key->key[0], key->keylen); in rt2x00mac_set_key()
|
/linux-4.4.14/drivers/net/wireless/ath/carl9170/ |
D | mac.c | 476 const int keylen) in carl9170_upload_key() argument 489 memcpy(&key.key, keydata, keylen); in carl9170_upload_key()
|
D | carl9170.h | 566 const u8 ktype, const u8 keyidx, const u8 *keydata, const int keylen);
|
/linux-4.4.14/drivers/staging/lustre/lustre/lov/ |
D | lov_obd.c | 1714 static int lov_fiemap(struct lov_obd *lov, __u32 keylen, void *key, in lov_fiemap() argument 1868 keylen, key, vallen, fm_local, lsm); in lov_fiemap() 1952 __u32 keylen, void *key, __u32 *vallen, void *val, in lov_get_info() argument 2017 rc = obd_get_info(env, tgt->ltd_exp, keylen, key, in lov_get_info() 2028 rc = lov_fiemap(lov, keylen, key, vallen, val, lsm); in lov_get_info() 2060 u32 keylen, void *key, u32 vallen, in lov_set_info_async() argument 2126 keylen, key, sizeof(int), in lov_set_info_async() 2130 keylen, key, vallen, in lov_set_info_async() 2139 keylen, key, vallen, val, set); in lov_set_info_async()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_mlme.c | 1625 u8 keylen; in rtw_set_key() local 1666 keylen = 5; in rtw_set_key() 1667 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); in rtw_set_key() 1670 keylen = 13; in rtw_set_key() 1671 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); in rtw_set_key() 1674 keylen = 16; in rtw_set_key() 1675 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key() 1679 keylen = 16; in rtw_set_key() 1680 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); in rtw_set_key()
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_mech.c | 610 int keylen; in gss_import_v2_context() local 644 keylen = ctx->gk5e->keylength; in gss_import_v2_context() 646 p = simple_get_bytes(p, end, ctx->Ksess, keylen); in gss_import_v2_context()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/ |
D | sta.c | 1266 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key() 1270 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key() 1277 memcpy(cmd.key + 3, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key() 1281 memcpy(cmd.key, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_key() 1333 memcpy(igtk_cmd.IGTK, keyconf->key, keyconf->keylen); in iwl_mvm_send_sta_igtk() 1531 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_mvm_set_sta_key()
|
D | d3.c | 177 .wep_key.key_size = key->keylen, in iwl_mvm_wowlan_program_keys() 188 memcpy(&wkc.wep_key.key[3], key->key, key->keylen); in iwl_mvm_wowlan_program_keys() 1526 conf.conf.keylen = WLAN_KEY_LEN_CCMP; in iwl_mvm_setup_connection_keep() 1531 conf.conf.keylen = WLAN_KEY_LEN_TKIP; in iwl_mvm_setup_connection_keep()
|
D | tx.c | 311 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in iwl_mvm_set_tx_cmd_crypto()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/ |
D | core.c | 1603 key->key, key->keylen); in rtl_op_set_key() 1604 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key() 1613 key->key, key->keylen); in rtl_op_set_key() 1614 rtlpriv->sec.key_len[key_idx] = key->keylen; in rtl_op_set_key() 1630 key->key, key->keylen); in rtl_op_set_key() 1631 rtlpriv->sec.key_len[PAIRWISE_KEYIDX] = key->keylen; in rtl_op_set_key() 1658 memset(rtlpriv->sec.key_buf[key_idx], 0, key->keylen); in rtl_op_set_key()
|
/linux-4.4.14/net/wireless/ |
D | lib80211_crypt_ccmp.c | 182 u8 *aeskey, int keylen, void *priv) in lib80211_ccmp_hdr() argument 191 if (aeskey != NULL && keylen >= CCMP_TK_LEN) in lib80211_ccmp_hdr()
|
D | lib80211_crypt_wep.c | 92 u8 *key, int keylen, void *priv) in lib80211_wep_build_iv() argument
|
D | lib80211_crypt_tkip.c | 310 u8 * rc4key, int keylen, void *priv) in lib80211_tkip_hdr() argument 321 if (rc4key == NULL || keylen < 16) in lib80211_tkip_hdr()
|
/linux-4.4.14/drivers/staging/lustre/lustre/obdclass/ |
D | obd_config.c | 977 int i, keylen, vallen; in class_process_proc_param() local 1003 keylen = sval - key; in class_process_proc_param() 1012 && keylen == strlen(var->name)) { in class_process_proc_param() 1031 if (strnchr(key, keylen, '.')) in class_process_proc_param()
|
/linux-4.4.14/drivers/net/wireless/cw1200/ |
D | sta.c | 714 if (key->keylen > 16) { in cw1200_set_key() 725 &key->key[0], key->keylen); in cw1200_set_key() 726 wsm_key->wep_pairwise.keylen = key->keylen; in cw1200_set_key() 730 &key->key[0], key->keylen); in cw1200_set_key() 731 wsm_key->wep_group.keylen = key->keylen; in cw1200_set_key()
|
D | wsm.h | 1020 u8 keylen; /* Key length in bytes */ member 1025 u8 keylen; /* Key length in bytes */ member
|
/linux-4.4.14/drivers/net/wireless/rsi/ |
D | rsi_91x_mac80211.c | 577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config() 583 key->keylen, in rsi_hal_key_config() 592 key->keylen, in rsi_hal_key_config()
|
/linux-4.4.14/drivers/net/wireless/mediatek/mt7601u/ |
D | mac.c | 495 if (key->keylen > 32) in mt76_mac_get_key_info() 498 memcpy(key_data, key->key, key->keylen); in mt76_mac_get_key_info()
|
/linux-4.4.14/drivers/net/wireless/ti/wl1251/ |
D | main.c | 908 key->cipher, key->keyidx, key->keylen, key->flags); in wl1251_op_set_key() 909 wl1251_dump(DEBUG_CRYPT, "KEY: ", key->key, key->keylen); in wl1251_op_set_key() 961 memcpy(wl_cmd->key, key->key, key->keylen); in wl1251_op_set_key() 963 wl_cmd->key_size = key->keylen; in wl1251_op_set_key()
|
/linux-4.4.14/drivers/staging/lustre/lustre/osc/ |
D | osc_request.c | 861 u32 keylen, void *key, u32 vallen, 2683 u32 keylen, void *key, __u32 *vallen, void *val, in osc_get_info() argument 2706 RCL_CLIENT, keylen); in osc_get_info() 2714 memcpy(tmp, key, keylen); in osc_get_info() 2782 RCL_CLIENT, keylen); in osc_get_info() 2795 memcpy(tmp, key, keylen); in osc_get_info() 2823 u32 keylen, void *key, u32 vallen, in osc_set_info_async() argument 2895 RCL_CLIENT, keylen); in osc_set_info_async() 2906 memcpy(tmp, key, keylen); in osc_set_info_async()
|
/linux-4.4.14/drivers/net/wireless/iwlegacy/ |
D | 4965-mac.c | 1622 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); in il4965_tx_cmd_build_hwcrypto() 1642 memcpy(&tx_cmd->key[3], keyconf->key, keyconf->keylen); in il4965_tx_cmd_build_hwcrypto() 3221 int len = keyconf->keylen; in il4965_set_default_wep_key() 3227 D_WEP("Bad WEP key length %d\n", keyconf->keylen); in il4965_set_default_wep_key() 3260 if (keyconf->keylen == WEP_KEY_LEN_128) in il4965_set_wep_dynamic_key_info() 3269 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il4965_set_wep_dynamic_key_info() 3272 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il4965_set_wep_dynamic_key_info() 3275 keyconf->keylen); in il4965_set_wep_dynamic_key_info() 3319 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il4965_set_ccmp_dynamic_key_info() 3321 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il4965_set_ccmp_dynamic_key_info() [all …]
|
D | 3945-mac.c | 152 il->stations[sta_id].keyinfo.keylen = keyconf->keylen; in il3945_set_ccmp_dynamic_key_info() 153 memcpy(il->stations[sta_id].keyinfo.key, keyconf->key, keyconf->keylen); in il3945_set_ccmp_dynamic_key_info() 155 memcpy(il->stations[sta_id].sta.key.key, keyconf->key, keyconf->keylen); in il3945_set_ccmp_dynamic_key_info() 239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il3945_set_dynamic_key() 377 memcpy(tx_cmd->key, keyinfo->key, keyinfo->keylen); in il3945_build_tx_cmd_hwcrypto() 393 memcpy(&tx_cmd->key[3], keyinfo->key, keyinfo->keylen); in il3945_build_tx_cmd_hwcrypto()
|
/linux-4.4.14/drivers/staging/lustre/lustre/include/ |
D | obd_support.h | 518 (keylen >= (sizeof(str)-1) && memcmp(key, str, (sizeof(str)-1)) == 0)
|
D | obd_class.h | 413 struct obd_export *exp, __u32 keylen, in obd_get_info() argument 422 rc = OBP(exp->exp_obd, get_info)(env, exp, keylen, key, vallen, val, in obd_get_info() 428 struct obd_export *exp, u32 keylen, in obd_set_info_async() argument 437 rc = OBP(exp->exp_obd, set_info_async)(env, exp, keylen, key, vallen, in obd_set_info_async()
|
D | obd.h | 970 __u32 keylen, void *key, __u32 *vallen, void *val, 973 __u32 keylen, void *key,
|
D | lustre_lib.h | 77 u32 keylen, void *key,
|
/linux-4.4.14/drivers/staging/rtl8723au/include/ |
D | rtw_security.h | 88 u16 keylen; member
|
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/ |
D | ioctl_cfg80211.c | 517 psecuritypriv->wep_key[key_index].keylen = key_len; in rtw_cfg80211_ap_set_encryption() 750 psecuritypriv->wep_key[key_index].keylen = key_len; in rtw_cfg80211_set_encryption() 983 if (psecuritypriv->wep_key[key_index].keylen == 13) { in cfg80211_rtw_set_default_key() 1748 switch (wep->keylen) { in rtw_cfg80211_add_wep() 1769 __func__, wep->keylen, keyid); in rtw_cfg80211_add_wep() 2103 wep_key.keylen = wep_key_len; in cfg80211_rtw_connect() 2117 memcpy(wep_key.key, (void *)sme->key, wep_key.keylen); in cfg80211_rtw_connect()
|
/linux-4.4.14/drivers/staging/lustre/lustre/lmv/ |
D | lmv_obd.c | 2286 __u32 keylen, void *key, __u32 *vallen, void *val, in lmv_get_info() argument 2301 if (keylen >= strlen("remote_flag") && !strcmp(key, "remote_flag")) { in lmv_get_info() 2318 if (!obd_get_info(env, tgt->ltd_exp, keylen, key, in lmv_get_info() 2334 rc = obd_get_info(env, lmv->tgts[0]->ltd_exp, keylen, key, in lmv_get_info() 2349 u32 keylen, void *key, u32 vallen, in lmv_set_info_async() argument 2375 keylen, key, vallen, val, set); in lmv_set_info_async()
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | encrypted.c | 338 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument 350 ret = crypto_shash_setkey(hmacalg, key, keylen); in calc_hmac()
|
/linux-4.4.14/drivers/staging/rtl8188eu/os_dep/ |
D | ioctl_linux.c | 2152 u8 keylen; in set_group_key() local 2182 keylen = 5; in set_group_key() 2185 keylen = 13; in set_group_key() 2191 keylen = 16; in set_group_key() 2194 memcpy(&(psetkeyparm->key[0]), key, keylen); in set_group_key() 2211 static int set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid) in set_wep_key() argument 2215 switch (keylen) { in set_wep_key()
|
/linux-4.4.14/drivers/staging/lustre/lustre/ldlm/ |
D | ldlm_lockd.c | 465 int keylen, vallen; in ldlm_handle_setinfo() local 477 keylen = req_capsule_get_size(&req->rq_pill, &RMF_SETINFO_KEY, in ldlm_handle_setinfo()
|
/linux-4.4.14/drivers/net/wireless/libertas/ |
D | host.h | 819 __le16 keylen; member
|
/linux-4.4.14/drivers/staging/lustre/lustre/mgc/ |
D | mgc_request.c | 953 u32 keylen, void *key, u32 vallen, in mgc_set_info_async() argument 1031 __u32 keylen, void *key, __u32 *vallen, void *val, in mgc_get_info() argument
|
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/ |
D | pack_generic.c | 1421 u32 keylen, void *key, in do_set_info_async() argument 1434 RCL_CLIENT, keylen); in do_set_info_async() 1444 memcpy(tmp, key, keylen); in do_set_info_async()
|
/linux-4.4.14/drivers/net/wireless/ |
D | at76c50x-usb.c | 2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); in at76_set_key() 2156 memcpy(priv->wep_keys[key->keyidx], key->key, key->keylen); in at76_set_key() 2157 priv->wep_keys_len[key->keyidx] = key->keylen; in at76_set_key()
|
/linux-4.4.14/drivers/net/wireless/p54/ |
D | main.c | 595 key->keylen, addr, key->key); in p54_set_key()
|
D | txrx.c | 903 txhdr->key_len = min((u8)16, info->control.hw_key->keylen); in p54_tx_80211()
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | ipw2100.c | 5389 int keylen = len ? (len <= 5 ? 5 : 13) : 0; in ipw2100_set_key() local 5399 idx, keylen, len); in ipw2100_set_key() 5406 wep_key->len = keylen; in ipw2100_set_key() 5408 if (keylen) { in ipw2100_set_key() 5410 memset(wep_key->key + len, 0, keylen - len); in ipw2100_set_key() 5414 if (keylen == 0) in ipw2100_set_key() 5417 else if (keylen == 5) in ipw2100_set_key()
|