/net/sctp/ |
D | auth.c | 94 struct sctp_shared_key *sctp_auth_shkey_create(__u16 key_id, gfp_t gfp) in sctp_auth_shkey_create() argument 104 new->key_id = key_id; in sctp_auth_shkey_create() 367 new = sctp_auth_shkey_create(sh_key->key_id, gfp); in sctp_auth_asoc_copy_shkeys() 429 __u16 key_id) in sctp_auth_get_shkey() argument 435 if (key->key_id == key_id) in sctp_auth_get_shkey() 711 __u16 key_id, hmac_id; in sctp_auth_calculate_hmac() local 720 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 723 if (key_id == asoc->active_key_id) in sctp_auth_calculate_hmac() 728 ep_key = sctp_auth_get_shkey(asoc, key_id); in sctp_auth_calculate_hmac() 843 if (cur_key->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() [all …]
|
D | ulpevent.c | 793 const struct sctp_association *asoc, __u16 key_id, in sctp_ulpevent_make_authkey() argument 813 ak->auth_keynumber = key_id; in sctp_ulpevent_make_authkey()
|
D | sm_statefuns.c | 3993 __u16 key_id; in sctp_sf_authenticate() local 4011 key_id = ntohs(auth_hdr->shkey_id); in sctp_sf_authenticate() 4012 if (key_id != asoc->active_key_id && !sctp_auth_get_shkey(asoc, key_id)) in sctp_sf_authenticate()
|
/net/core/ |
D | flow_dissector.c | 25 enum flow_dissector_key_id key_id) in dissector_set_key() argument 27 flow_dissector->used_keys |= (1 << key_id); in dissector_set_key() 44 key->key_id)); in skb_flow_dissector_init() 46 dissector_set_key(flow_dissector, key->key_id); in skb_flow_dissector_init() 47 flow_dissector->offset[key->key_id] = key->offset; in skb_flow_dissector_init() 926 .key_id = FLOW_DISSECTOR_KEY_CONTROL, 930 .key_id = FLOW_DISSECTOR_KEY_BASIC, 934 .key_id = FLOW_DISSECTOR_KEY_IPV4_ADDRS, 938 .key_id = FLOW_DISSECTOR_KEY_IPV6_ADDRS, 942 .key_id = FLOW_DISSECTOR_KEY_TIPC_ADDRS, [all …]
|
/net/sched/ |
D | act_tunnel_key.c | 84 __be64 key_id; in tunnel_key_init() local 112 key_id = key32_to_tunnel_id(nla_get_be32(tb[TCA_TUNNEL_KEY_ENC_KEY_ID])); in tunnel_key_init() 123 TUNNEL_KEY, key_id, 0); in tunnel_key_init() 133 TUNNEL_KEY, key_id, 0); in tunnel_key_init() 259 __be32 key_id = tunnel_id_to_key32(key->tun_id); in tunnel_key_dump() local 261 if (nla_put_be32(skb, TCA_TUNNEL_KEY_ENC_KEY_ID, key_id) || in tunnel_key_dump()
|
D | cls_flower.c | 550 keys[cnt].key_id = id; \
|
/net/mac802154/ |
D | llsec.c | 417 if (!llsec_key_id_equal(key, &devkey->key_id)) in llsec_devkey_find() 439 if (llsec_devkey_find(dev, &key->key_id)) in mac802154_llsec_devkey_add() 463 devkey = llsec_devkey_find(dev, &key->key_id); in mac802154_llsec_devkey_del() 551 struct ieee802154_llsec_key_id *key_id) in llsec_lookup_key() argument 581 if (id->id != hdr->sec.key_id) in llsec_lookup_key() 597 if (key_id) in llsec_lookup_key() 598 *key_id = key_entry->id; in llsec_lookup_key() 921 next->devkey.key_id = *in_key; in llsec_update_devkey_record() 979 struct ieee802154_llsec_key_id key_id; in mac802154_llsec_decrypt() local 1002 key = llsec_lookup_key(sec, &hdr, &hdr.source, &key_id); in mac802154_llsec_decrypt() [all …]
|
D | rx.c | 177 pr_debug("key %02x\n", hdr->sec.key_id); in ieee802154_parse_frame_start() 184 hdr->sec.key_id); in ieee802154_parse_frame_start() 190 hdr->sec.key_id); in ieee802154_parse_frame_start()
|
D | iface.c | 365 hdr->sec.key_id = params.out_key.id; in mac802154_set_header_security()
|
/net/mac80211/ |
D | wpa.c | 376 static inline void ccmp_pn2hdr(u8 *hdr, u8 *pn, int key_id) in ccmp_pn2hdr() argument 381 hdr[3] = 0x20 | (key_id << 6); in ccmp_pn2hdr() 611 static inline void gcmp_pn2hdr(u8 *hdr, const u8 *pn, int key_id) in gcmp_pn2hdr() argument 616 hdr[3] = 0x20 | (key_id << 6); in gcmp_pn2hdr() 955 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_encrypt() 999 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_256_encrypt() 1144 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_gmac_encrypt()
|
D | rx.c | 792 return le16_to_cpu(mmie->key_id); in ieee80211_get_mmie_keyidx() 799 return le16_to_cpu(mmie16->key_id); in ieee80211_get_mmie_keyidx()
|
/net/ieee802154/ |
D | header_ops.c | 80 buf[pos++] = hdr->key_id; in ieee802154_hdr_push_sechdr() 194 hdr->key_id = buf[pos++]; in ieee802154_hdr_get_sechdr()
|
D | nl-mac.c | 1121 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_add_devkey() 1146 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_del_devkey() 1178 ieee802154_llsec_fill_key_id(msg, &devkey->key_id)) in ieee802154_nl_fill_devkey()
|
D | nl802154.c | 1840 if (ieee802154_llsec_send_key_id(msg, &devkey->key_id) < 0) in nl802154_send_devkey() 1937 &key.key_id) < 0) in nl802154_add_llsec_devkey() 1968 &key.key_id) < 0) in nl802154_del_llsec_devkey()
|
/net/wireless/ |
D | mlme.c | 184 enum nl80211_key_type key_type, int key_id, in cfg80211_michael_mic_failure() argument 195 "keyid=%d %scast addr=%pM)", key_id, in cfg80211_michael_mic_failure() 205 trace_cfg80211_michael_mic_failure(dev, addr, key_type, key_id, tsc); in cfg80211_michael_mic_failure() 206 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); in cfg80211_michael_mic_failure()
|
D | nl80211.h | 74 int key_id, const u8 *tsc, gfp_t gfp);
|
D | trace.h | 2354 enum nl80211_key_type key_type, int key_id, const u8 *tsc), 2355 TP_ARGS(netdev, addr, key_type, key_id, tsc), 2360 __field(int, key_id) 2367 __entry->key_id = key_id; 2373 __entry->key_id, __entry->tsc)
|
D | nl80211.c | 13290 enum nl80211_key_type key_type, int key_id, in nl80211_michael_mic_failure() argument 13310 (key_id != -1 && in nl80211_michael_mic_failure() 13311 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, key_id)) || in nl80211_michael_mic_failure()
|
/net/bluetooth/ |
D | smp.c | 346 const u8 key_id[4], u8 res[16]) in smp_h6() 350 SMP_DBG("w %16phN key_id %4phN", w, key_id); in smp_h6() 352 err = aes_cmac(tfm_cmac, w, key_id, 4, res); in smp_h6() 3656 const u8 key_id[4] = { 0x72, 0x62, 0x65, 0x6c }; in test_h6() local 3663 err = smp_h6(tfm_cmac, w, key_id, res); in test_h6()
|