/net/sctp/ |
D | auth.c | 94 struct sctp_shared_key *sctp_auth_shkey_create(__u16 key_id, gfp_t gfp) in sctp_auth_shkey_create() argument 104 new->key_id = key_id; in sctp_auth_shkey_create() 367 new = sctp_auth_shkey_create(sh_key->key_id, gfp); in sctp_auth_asoc_copy_shkeys() 429 __u16 key_id) in sctp_auth_get_shkey() argument 435 if (key->key_id == key_id) in sctp_auth_get_shkey() 716 __u16 key_id, hmac_id; in sctp_auth_calculate_hmac() local 725 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 728 if (key_id == asoc->active_key_id) in sctp_auth_calculate_hmac() 733 ep_key = sctp_auth_get_shkey(asoc, key_id); in sctp_auth_calculate_hmac() 842 if (cur_key->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() [all …]
|
D | ulpevent.c | 784 const struct sctp_association *asoc, __u16 key_id, in sctp_ulpevent_make_authkey() argument 804 ak->auth_keynumber = key_id; in sctp_ulpevent_make_authkey()
|
D | sm_statefuns.c | 4021 __u16 key_id; in sctp_sf_authenticate() local 4039 key_id = ntohs(auth_hdr->shkey_id); in sctp_sf_authenticate() 4040 if (key_id != asoc->active_key_id && !sctp_auth_get_shkey(asoc, key_id)) in sctp_sf_authenticate()
|
/net/core/ |
D | flow_dissector.c | 23 enum flow_dissector_key_id key_id) in dissector_uses_key() argument 25 return flow_dissector->used_keys & (1 << key_id); in dissector_uses_key() 29 enum flow_dissector_key_id key_id) in dissector_set_key() argument 31 flow_dissector->used_keys |= (1 << key_id); in dissector_set_key() 35 enum flow_dissector_key_id key_id, in skb_flow_dissector_target() argument 38 return ((char *) target_container) + flow_dissector->offset[key_id]; in skb_flow_dissector_target() 55 key->key_id)); in skb_flow_dissector_init() 57 dissector_set_key(flow_dissector, key->key_id); in skb_flow_dissector_init() 58 flow_dissector->offset[key->key_id] = key->offset; in skb_flow_dissector_init() 854 .key_id = FLOW_DISSECTOR_KEY_CONTROL, [all …]
|
/net/mac802154/ |
D | llsec.c | 417 if (!llsec_key_id_equal(key, &devkey->key_id)) in llsec_devkey_find() 439 if (llsec_devkey_find(dev, &key->key_id)) in mac802154_llsec_devkey_add() 463 devkey = llsec_devkey_find(dev, &key->key_id); in mac802154_llsec_devkey_del() 551 struct ieee802154_llsec_key_id *key_id) in llsec_lookup_key() argument 581 if (id->id != hdr->sec.key_id) in llsec_lookup_key() 597 if (key_id) in llsec_lookup_key() 598 *key_id = key_entry->id; in llsec_lookup_key() 916 next->devkey.key_id = *in_key; in llsec_update_devkey_record() 974 struct ieee802154_llsec_key_id key_id; in mac802154_llsec_decrypt() local 997 key = llsec_lookup_key(sec, &hdr, &hdr.source, &key_id); in mac802154_llsec_decrypt() [all …]
|
D | rx.c | 172 pr_debug("key %02x\n", hdr->sec.key_id); in ieee802154_parse_frame_start() 179 hdr->sec.key_id); in ieee802154_parse_frame_start() 185 hdr->sec.key_id); in ieee802154_parse_frame_start()
|
D | iface.c | 365 hdr->sec.key_id = params.out_key.id; in mac802154_set_header_security()
|
/net/mac80211/ |
D | wpa.c | 379 static inline void ccmp_pn2hdr(u8 *hdr, u8 *pn, int key_id) in ccmp_pn2hdr() argument 384 hdr[3] = 0x20 | (key_id << 6); in ccmp_pn2hdr() 621 static inline void gcmp_pn2hdr(u8 *hdr, const u8 *pn, int key_id) in gcmp_pn2hdr() argument 626 hdr[3] = 0x20 | (key_id << 6); in gcmp_pn2hdr() 972 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_encrypt() 1016 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_256_encrypt() 1161 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_gmac_encrypt()
|
D | rx.c | 712 return le16_to_cpu(mmie->key_id); in ieee80211_get_mmie_keyidx() 719 return le16_to_cpu(mmie16->key_id); in ieee80211_get_mmie_keyidx()
|
/net/ieee802154/ |
D | header_ops.c | 80 buf[pos++] = hdr->key_id; in ieee802154_hdr_push_sechdr() 194 hdr->key_id = buf[pos++]; in ieee802154_hdr_get_sechdr()
|
D | nl-mac.c | 1120 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_add_devkey() 1145 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_del_devkey() 1176 ieee802154_llsec_fill_key_id(msg, &devkey->key_id)) in ieee802154_nl_fill_devkey()
|
D | nl802154.c | 1814 if (ieee802154_llsec_send_key_id(msg, &devkey->key_id) < 0) in nl802154_send_devkey() 1919 &key.key_id) < 0) in nl802154_add_llsec_devkey() 1951 &key.key_id) < 0) in nl802154_del_llsec_devkey()
|
/net/wireless/ |
D | mlme.c | 184 enum nl80211_key_type key_type, int key_id, in cfg80211_michael_mic_failure() argument 195 "keyid=%d %scast addr=%pM)", key_id, in cfg80211_michael_mic_failure() 205 trace_cfg80211_michael_mic_failure(dev, addr, key_type, key_id, tsc); in cfg80211_michael_mic_failure() 206 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); in cfg80211_michael_mic_failure()
|
D | nl80211.h | 71 int key_id, const u8 *tsc, gfp_t gfp);
|
D | trace.h | 2224 enum nl80211_key_type key_type, int key_id, const u8 *tsc), 2225 TP_ARGS(netdev, addr, key_type, key_id, tsc), 2230 __field(int, key_id) 2237 __entry->key_id = key_id; 2243 __entry->key_id, __entry->tsc)
|
D | nl80211.c | 12113 enum nl80211_key_type key_type, int key_id, in nl80211_michael_mic_failure() argument 12133 (key_id != -1 && in nl80211_michael_mic_failure() 12134 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, key_id)) || in nl80211_michael_mic_failure()
|
/net/bluetooth/ |
D | smp.c | 355 const u8 key_id[4], u8 res[16]) in smp_h6() 359 SMP_DBG("w %16phN key_id %4phN", w, key_id); in smp_h6() 361 err = aes_cmac(tfm_cmac, w, key_id, 4, res); in smp_h6() 3716 const u8 key_id[4] = { 0x72, 0x62, 0x65, 0x6c }; in test_h6() local 3723 err = smp_h6(tfm_cmac, w, key_id, res); in test_h6()
|
/net/sched/ |
D | cls_flower.c | 361 keys[cnt].key_id = id; \
|