| /net/mac80211/ |
| A D | wep.c | 41 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 52 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 67 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 134 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 143 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 153 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 218 klen = 3 + key->conf.keylen; in ieee80211_wep_decrypt() 224 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); in ieee80211_wep_decrypt() 278 tx->key->conf.keylen, in wep_encrypt_skb() [all …]
|
| A D | debugfs_key.c | 59 KEY_CONF_FILE(keylen, D); 300 int i, bufsize = 2 * key->conf.keylen + 2; in key_key_read() 308 for (i = 0; i < key->conf.keylen; i++) in key_key_read() 347 DEBUGFS_ADD(keylen); in ieee80211_debugfs_key_add()
|
| A D | wep.h | 21 const u8 *key, int keylen, int keyidx);
|
| A D | key.c | 614 key->conf.keylen = key_len; in ieee80211_key_alloc() 817 if (!old || new->conf.keylen != old->conf.keylen) in ieee80211_key_identical() 830 new->conf.keylen == WLAN_KEY_LEN_TKIP && in ieee80211_key_identical() 840 return !crypto_memneq(tk_old, tk_new, new->conf.keylen); in ieee80211_key_identical() 1406 if (WARN_ON(key_len < prev_key->conf.keylen)) in ieee80211_gtk_rekey_add() 1410 prev_key->conf.keylen, key_data, in ieee80211_gtk_rekey_add()
|
| /net/netfilter/ |
| A D | nf_conncount.c | 59 unsigned int keylen; member 335 diff = key_diff(key, rbconn->key, data->keylen); in insert_tree() 382 memcpy(rbconn->key, key, sizeof(u32) * data->keylen); in insert_tree() 408 hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; in count_tree() 417 diff = key_diff(key, rbconn->key, data->keylen); in count_tree() 527 struct nf_conncount_data *nf_conncount_init(struct net *net, unsigned int keylen) in nf_conncount_init() argument 532 if (keylen % sizeof(u32) || in nf_conncount_init() 533 keylen / sizeof(u32) > MAX_KEYLEN || in nf_conncount_init() 534 keylen == 0) in nf_conncount_init() 546 data->keylen = keylen / sizeof(u32); in nf_conncount_init()
|
| A D | xt_connlimit.c | 88 unsigned int keylen; in connlimit_mt_check() local 91 keylen = sizeof(u32); in connlimit_mt_check() 93 keylen += sizeof(struct in6_addr); in connlimit_mt_check() 95 keylen += sizeof(struct in_addr); in connlimit_mt_check() 105 info->data = nf_conncount_init(par->net, keylen); in connlimit_mt_check()
|
| /net/rxrpc/ |
| A D | key.c | 174 u32 tktlen, keylen; in rxrpc_preparse_xdr_yfs_rxgk() local 184 keylen = ntohl(key[-1]); in rxrpc_preparse_xdr_yfs_rxgk() 185 _debug("keylen: %x", keylen); in rxrpc_preparse_xdr_yfs_rxgk() 186 keylen = round_up(keylen, 4); in rxrpc_preparse_xdr_yfs_rxgk() 187 if ((6 * 2 + 2) * 4 + keylen > toklen) in rxrpc_preparse_xdr_yfs_rxgk() 190 ticket = xdr + (6 * 2 + 1 + (keylen / 4) + 1); in rxrpc_preparse_xdr_yfs_rxgk() 194 if ((6 * 2 + 2) * 4 + keylen + tktlen != toklen) { in rxrpc_preparse_xdr_yfs_rxgk() 196 (6 * 2 + 2) * 4 + keylen + tktlen, toklen, in rxrpc_preparse_xdr_yfs_rxgk() 197 keylen, tktlen); in rxrpc_preparse_xdr_yfs_rxgk() 201 plen = sizeof(*token) + sizeof(*token->rxgk) + tktlen + keylen; in rxrpc_preparse_xdr_yfs_rxgk() [all …]
|
| /net/tipc/ |
| A D | crypto.c | 336 int keylen; in tipc_aead_key_validate() local 351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate() 353 keylen != TIPC_AES_GCM_KEY_SIZE_192 && in tipc_aead_key_validate() 354 keylen != TIPC_AES_GCM_KEY_SIZE_256)) { in tipc_aead_key_validate() 376 skey->keylen); in tipc_aead_key_generate() 520 int keylen, err, cpu; in tipc_aead_init() local 532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init() 2264 skey->keylen); in tipc_crypto_key_xmit() 2294 unsigned int keylen; in tipc_crypto_key_rcv() local 2326 skey->keylen = keylen; in tipc_crypto_key_rcv() [all …]
|
| A D | node.c | 2927 if (key->keylen > TIPC_AEAD_KEYLEN_MAX || in tipc_nl_retrieve_key()
|
| /net/ipv4/ |
| A D | tcp_ao.c | 30 mkt->key, mkt->keylen)) in tcp_ao_calc_traffic_key() 1349 is_kdf_aes_128_cmac = (cmd->keylen != 16); in tcp_ao_parse_crypto() 1350 tmp_key = kmalloc(cmd->keylen, GFP_KERNEL); in tcp_ao_parse_crypto() 1394 key->keylen = cmd->keylen; in tcp_ao_parse_crypto() 1395 memcpy(key->key, cmd->key, cmd->keylen); in tcp_ao_parse_crypto() 1406 memcpy(tmp_key, cmd->key, cmd->keylen); in tcp_ao_parse_crypto() 1407 sg_init_one(&sg, tmp_key, cmd->keylen); in tcp_ao_parse_crypto() 1427 key->keylen = 16; in tcp_ao_parse_crypto() 1613 if (cmd.keylen > TCP_AO_MAXKEYLEN) in tcp_ao_add_cmd() 2280 opt_out.keylen = key->keylen; in tcp_ao_copy_mkts_to_user() [all …]
|
| A D | tcp_diag.c | 43 info->tcpm_keylen = key->keylen; in tcp_diag_md5sig_fill() 44 memcpy(info->tcpm_key, key->key, key->keylen); in tcp_diag_md5sig_fill()
|
| A D | esp4.c | 1017 unsigned int keylen; in esp_init_authenc() local 1053 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1056 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 1094 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|
| A D | tcp.c | 4806 u8 keylen = READ_ONCE(key->keylen); /* paired with WRITE_ONCE() in tcp_md5_do_add */ in tcp_md5_hash_key() local 4809 sg_init_one(&sg, key->key, keylen); in tcp_md5_hash_key() 4810 ahash_request_set_crypt(hp->req, &sg, NULL, keylen); in tcp_md5_hash_key()
|
| A D | tcp_ipv4.c | 1395 WRITE_ONCE(key->keylen, newkeylen); 1408 key->keylen = newkeylen; 1478 key->flags, key->key, key->keylen,
|
| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_mech.c | 399 int keylen; in gss_import_v2_context() local 435 keylen = ctx->gk5e->keylength; in gss_import_v2_context() 437 p = simple_get_bytes(p, end, ctx->Ksess, keylen); in gss_import_v2_context()
|
| /net/ipv6/ |
| A D | esp6.c | 1054 unsigned int keylen; in esp_init_authenc() local 1090 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1093 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 1131 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|