| /net/mac80211/ |
| A D | fils_aead.c | 66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
|
| A D | aes_gcm.h | 32 ieee80211_aes_gcm_key_setup_encrypt(const u8 key[], size_t key_len) in ieee80211_aes_gcm_key_setup_encrypt() argument 35 key_len, IEEE80211_GCMP_MIC_LEN); in ieee80211_aes_gcm_key_setup_encrypt()
|
| A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) in ieee80211_aes_key_setup_encrypt() argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len); in ieee80211_aes_key_setup_encrypt()
|
| A D | aes_cmac.c | 72 size_t key_len) in ieee80211_aes_cmac_key_setup() argument 78 int err = crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup()
|
| A D | aes_gmac.c | 70 size_t key_len) in ieee80211_aes_gmac_key_setup() argument 79 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup()
|
| A D | key.c | 588 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 600 key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL); in ieee80211_key_alloc() 614 key->conf.keylen = key_len; in ieee80211_key_alloc() 648 key_data, key_len, IEEE80211_CCMP_MIC_LEN); in ieee80211_key_alloc() 666 key_data, key_len, IEEE80211_CCMP_256_MIC_LEN); in ieee80211_key_alloc() 689 ieee80211_aes_cmac_key_setup(key_data, key_len); in ieee80211_key_alloc() 708 ieee80211_aes_gmac_key_setup(key_data, key_len); in ieee80211_key_alloc() 727 key_len); in ieee80211_key_alloc() 735 memcpy(key->conf.key, key_data, key_len); in ieee80211_key_alloc() 1359 u8 idx, u8 *key_data, u8 key_len, in ieee80211_gtk_rekey_add() argument [all …]
|
| A D | aead_api.c | 87 size_t key_len, size_t mic_len) in aead_key_setup_encrypt() argument 96 err = crypto_aead_setkey(tfm, key, key_len); in aead_key_setup_encrypt()
|
| A D | aes_gmac.h | 16 size_t key_len);
|
| A D | aes_cmac.h | 13 size_t key_len);
|
| A D | aead_api.h | 11 size_t key_len, size_t mic_len);
|
| A D | key.h | 140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
| /net/ipv6/ |
| A D | calipso.c | 76 size_t key_len; member 118 static u32 calipso_map_cache_hash(const unsigned char *key, u32 key_len) in calipso_map_cache_hash() argument 120 return jhash(key, key_len, 0); in calipso_map_cache_hash() 200 u32 key_len, in calipso_cache_check() argument 211 hash = calipso_map_cache_hash(key, key_len); in calipso_cache_check() 216 entry->key_len == key_len && in calipso_cache_check() 217 memcmp(entry->key, key, key_len) == 0) { in calipso_cache_check() 286 entry->key_len = calipso_ptr_len; in calipso_cache_add()
|
| A D | seg6_hmac.c | 75 .key_len = sizeof(u32),
|
| A D | ioam6.c | 64 .key_len = sizeof(__be16), 72 .key_len = sizeof(u32),
|
| /net/core/ |
| A D | neighbour.c | 651 u32 hash_val, key_len = tbl->key_len; in ___neigh_create() local 663 memcpy(n->primary_key, pkey, key_len); in ___neigh_create() 763 unsigned int key_len; in pneigh_lookup() local 766 key_len = tbl->key_len; in pneigh_lookup() 789 unsigned int key_len; in pneigh_create() local 799 key_len = tbl->key_len; in pneigh_create() 807 memcpy(n->key, pkey, key_len); in pneigh_create() 842 unsigned int key_len; in pneigh_delete() local 845 key_len = tbl->key_len; in pneigh_delete() 1837 tbl->key_len, NEIGH_PRIV_ALIGN); in neigh_table_init() [all …]
|
| /net/ipv4/ |
| A D | cipso_ipv4.c | 65 size_t key_len; member 149 static u32 cipso_v4_map_cache_hash(const unsigned char *key, u32 key_len) in cipso_v4_map_cache_hash() argument 151 return jhash(key, key_len, 0); in cipso_v4_map_cache_hash() 234 u32 key_len, in cipso_v4_cache_check() argument 245 hash = cipso_v4_map_cache_hash(key, key_len); in cipso_v4_cache_check() 250 entry->key_len == key_len && in cipso_v4_cache_check() 251 memcmp(entry->key, key, key_len) == 0) { in cipso_v4_cache_check() 319 entry->key_len = cipso_ptr_len; in cipso_v4_cache_add()
|
| /net/wireless/ |
| A D | wext-compat.c | 475 wdev->wext.keys->params[idx].key_len = 0; in cfg80211_set_encryption() 516 params->key, params->key_len); in cfg80211_set_encryption() 616 params.key_len = erq->length; in cfg80211_wext_siwencode() 662 if (ext->key_len == 5) in cfg80211_wext_siwencodeext() 664 else if (ext->key_len == 13) in cfg80211_wext_siwencodeext() 708 params.key_len = ext->key_len; in cfg80211_wext_siwencodeext() 756 wdev->wext.keys->params[idx].key_len); in cfg80211_wext_giwencode()
|
| A D | util.c | 376 if (params->key_len != WLAN_KEY_LEN_WEP40) in cfg80211_validate_key_settings() 380 if (params->key_len != WLAN_KEY_LEN_TKIP) in cfg80211_validate_key_settings() 384 if (params->key_len != WLAN_KEY_LEN_CCMP) in cfg80211_validate_key_settings() 388 if (params->key_len != WLAN_KEY_LEN_CCMP_256) in cfg80211_validate_key_settings() 392 if (params->key_len != WLAN_KEY_LEN_GCMP) in cfg80211_validate_key_settings() 396 if (params->key_len != WLAN_KEY_LEN_GCMP_256) in cfg80211_validate_key_settings() 400 if (params->key_len != WLAN_KEY_LEN_WEP104) in cfg80211_validate_key_settings() 404 if (params->key_len != WLAN_KEY_LEN_AES_CMAC) in cfg80211_validate_key_settings() 408 if (params->key_len != WLAN_KEY_LEN_BIP_CMAC_256) in cfg80211_validate_key_settings() 412 if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_128) in cfg80211_validate_key_settings() [all …]
|
| A D | sme.c | 173 auth_req.key_len = params->key_len; in cfg80211_conn_do_work() 1490 connect->key_len = connkeys->params[idx].key_len; in cfg80211_connect() 1512 connect->key_len = 0; in cfg80211_connect()
|
| /net/sctp/ |
| A D | auth.c | 58 static struct sctp_auth_bytes *sctp_auth_create_key(__u32 key_len, gfp_t gfp) in sctp_auth_create_key() argument 63 if (key_len > (INT_MAX - sizeof(struct sctp_auth_bytes))) in sctp_auth_create_key() 67 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp); in sctp_auth_create_key() 71 key->len = key_len; in sctp_auth_create_key()
|
| /net/rxrpc/ |
| A D | rxperf.c | 594 if (!krb5 || krb5->key_len > sizeof(key)) in rxperf_add_yfs_rxgk_key() 598 for (int i = 0; i < krb5->key_len; i++) in rxperf_add_yfs_rxgk_key() 605 key, krb5->key_len, in rxperf_add_yfs_rxgk_key()
|
| /net/openvswitch/ |
| A D | flow_netlink.c | 2876 size_t key_len; in validate_set() local 2883 key_len = nla_len(ovs_key); in validate_set() 2885 key_len /= 2; in validate_set() 2888 !check_attr_len(key_len, ovs_key_lens[key_type].len)) in validate_set() 2891 if (masked && !validate_masked(nla_data(ovs_key), key_len)) in validate_set() 3013 int start, len = key_len * 2; in validate_set() 3028 memcpy(nla_data(at), nla_data(ovs_key), key_len); /* Key. */ in validate_set() 3029 memset(nla_data(at) + key_len, 0xff, key_len); /* Mask. */ in validate_set() 3032 struct ovs_key_ipv6 *mask = nla_data(at) + key_len; in validate_set() 3767 size_t key_len = nla_len(ovs_key) / 2; in masked_set_action_to_set_action_attr() local [all …]
|
| /net/bridge/ |
| A D | br_vlan_tunnel.c | 31 .key_len = sizeof(__be64),
|
| /net/rds/ |
| A D | bind.c | 46 .key_len = RDS_BOUND_KEY_LEN,
|
| /net/handshake/ |
| A D | request.c | 43 .key_len = sizeof_field(struct handshake_req, hr_sk),
|