Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 16 of 16) sorted by relevance

/net/mac80211/
A Dwep.c41 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv()
49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument
52 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv()
67 int keylen, int keyidx) in ieee80211_wep_add_iv() argument
134 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument
143 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt()
153 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt()
218 klen = 3 + key->conf.keylen; in ieee80211_wep_decrypt()
224 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); in ieee80211_wep_decrypt()
278 tx->key->conf.keylen, in wep_encrypt_skb()
[all …]
A Ddebugfs_key.c59 KEY_CONF_FILE(keylen, D);
300 int i, bufsize = 2 * key->conf.keylen + 2; in key_key_read()
308 for (i = 0; i < key->conf.keylen; i++) in key_key_read()
347 DEBUGFS_ADD(keylen); in ieee80211_debugfs_key_add()
A Dwep.h21 const u8 *key, int keylen, int keyidx);
A Dkey.c614 key->conf.keylen = key_len; in ieee80211_key_alloc()
817 if (!old || new->conf.keylen != old->conf.keylen) in ieee80211_key_identical()
830 new->conf.keylen == WLAN_KEY_LEN_TKIP && in ieee80211_key_identical()
840 return !crypto_memneq(tk_old, tk_new, new->conf.keylen); in ieee80211_key_identical()
1406 if (WARN_ON(key_len < prev_key->conf.keylen)) in ieee80211_gtk_rekey_add()
1410 prev_key->conf.keylen, key_data, in ieee80211_gtk_rekey_add()
/net/netfilter/
A Dnf_conncount.c59 unsigned int keylen; member
335 diff = key_diff(key, rbconn->key, data->keylen); in insert_tree()
382 memcpy(rbconn->key, key, sizeof(u32) * data->keylen); in insert_tree()
408 hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; in count_tree()
417 diff = key_diff(key, rbconn->key, data->keylen); in count_tree()
527 struct nf_conncount_data *nf_conncount_init(struct net *net, unsigned int keylen) in nf_conncount_init() argument
532 if (keylen % sizeof(u32) || in nf_conncount_init()
533 keylen / sizeof(u32) > MAX_KEYLEN || in nf_conncount_init()
534 keylen == 0) in nf_conncount_init()
546 data->keylen = keylen / sizeof(u32); in nf_conncount_init()
A Dxt_connlimit.c88 unsigned int keylen; in connlimit_mt_check() local
91 keylen = sizeof(u32); in connlimit_mt_check()
93 keylen += sizeof(struct in6_addr); in connlimit_mt_check()
95 keylen += sizeof(struct in_addr); in connlimit_mt_check()
105 info->data = nf_conncount_init(par->net, keylen); in connlimit_mt_check()
/net/rxrpc/
A Dkey.c174 u32 tktlen, keylen; in rxrpc_preparse_xdr_yfs_rxgk() local
184 keylen = ntohl(key[-1]); in rxrpc_preparse_xdr_yfs_rxgk()
185 _debug("keylen: %x", keylen); in rxrpc_preparse_xdr_yfs_rxgk()
186 keylen = round_up(keylen, 4); in rxrpc_preparse_xdr_yfs_rxgk()
187 if ((6 * 2 + 2) * 4 + keylen > toklen) in rxrpc_preparse_xdr_yfs_rxgk()
190 ticket = xdr + (6 * 2 + 1 + (keylen / 4) + 1); in rxrpc_preparse_xdr_yfs_rxgk()
194 if ((6 * 2 + 2) * 4 + keylen + tktlen != toklen) { in rxrpc_preparse_xdr_yfs_rxgk()
196 (6 * 2 + 2) * 4 + keylen + tktlen, toklen, in rxrpc_preparse_xdr_yfs_rxgk()
197 keylen, tktlen); in rxrpc_preparse_xdr_yfs_rxgk()
201 plen = sizeof(*token) + sizeof(*token->rxgk) + tktlen + keylen; in rxrpc_preparse_xdr_yfs_rxgk()
[all …]
/net/tipc/
A Dcrypto.c336 int keylen; in tipc_aead_key_validate() local
351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate()
353 keylen != TIPC_AES_GCM_KEY_SIZE_192 && in tipc_aead_key_validate()
354 keylen != TIPC_AES_GCM_KEY_SIZE_256)) { in tipc_aead_key_validate()
376 skey->keylen); in tipc_aead_key_generate()
520 int keylen, err, cpu; in tipc_aead_init() local
532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init()
2264 skey->keylen); in tipc_crypto_key_xmit()
2294 unsigned int keylen; in tipc_crypto_key_rcv() local
2326 skey->keylen = keylen; in tipc_crypto_key_rcv()
[all …]
A Dnode.c2927 if (key->keylen > TIPC_AEAD_KEYLEN_MAX || in tipc_nl_retrieve_key()
/net/ipv4/
A Dtcp_ao.c30 mkt->key, mkt->keylen)) in tcp_ao_calc_traffic_key()
1349 is_kdf_aes_128_cmac = (cmd->keylen != 16); in tcp_ao_parse_crypto()
1350 tmp_key = kmalloc(cmd->keylen, GFP_KERNEL); in tcp_ao_parse_crypto()
1394 key->keylen = cmd->keylen; in tcp_ao_parse_crypto()
1395 memcpy(key->key, cmd->key, cmd->keylen); in tcp_ao_parse_crypto()
1406 memcpy(tmp_key, cmd->key, cmd->keylen); in tcp_ao_parse_crypto()
1407 sg_init_one(&sg, tmp_key, cmd->keylen); in tcp_ao_parse_crypto()
1427 key->keylen = 16; in tcp_ao_parse_crypto()
1613 if (cmd.keylen > TCP_AO_MAXKEYLEN) in tcp_ao_add_cmd()
2280 opt_out.keylen = key->keylen; in tcp_ao_copy_mkts_to_user()
[all …]
A Dtcp_diag.c43 info->tcpm_keylen = key->keylen; in tcp_diag_md5sig_fill()
44 memcpy(info->tcpm_key, key->key, key->keylen); in tcp_diag_md5sig_fill()
A Desp4.c1017 unsigned int keylen; in esp_init_authenc() local
1053 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc()
1056 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc()
1094 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
A Dtcp.c4806 u8 keylen = READ_ONCE(key->keylen); /* paired with WRITE_ONCE() in tcp_md5_do_add */ in tcp_md5_hash_key() local
4809 sg_init_one(&sg, key->key, keylen); in tcp_md5_hash_key()
4810 ahash_request_set_crypt(hp->req, &sg, NULL, keylen); in tcp_md5_hash_key()
A Dtcp_ipv4.c1395 WRITE_ONCE(key->keylen, newkeylen);
1408 key->keylen = newkeylen;
1478 key->flags, key->key, key->keylen,
/net/sunrpc/auth_gss/
A Dgss_krb5_mech.c399 int keylen; in gss_import_v2_context() local
435 keylen = ctx->gk5e->keylength; in gss_import_v2_context()
437 p = simple_get_bytes(p, end, ctx->Ksess, keylen); in gss_import_v2_context()
/net/ipv6/
A Desp6.c1054 unsigned int keylen; in esp_init_authenc() local
1090 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc()
1093 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc()
1131 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()

Completed in 50 milliseconds