/net/sctp/ |
D | auth.c | 79 struct sctp_shared_key *sctp_auth_shkey_create(__u16 key_id, gfp_t gfp) in sctp_auth_shkey_create() argument 90 new->key_id = key_id; in sctp_auth_shkey_create() 363 new = sctp_auth_shkey_create(sh_key->key_id, gfp); in sctp_auth_asoc_copy_shkeys() 431 __u16 key_id) in sctp_auth_get_shkey() argument 437 if (key->key_id == key_id) { in sctp_auth_get_shkey() 712 __u16 key_id, hmac_id; in sctp_auth_calculate_hmac() local 721 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 724 if (key_id == asoc->active_key_id) in sctp_auth_calculate_hmac() 845 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() 876 __u16 key_id) in sctp_auth_set_active_key() argument [all …]
|
D | ulpevent.c | 768 const struct sctp_association *asoc, __u16 key_id, in sctp_ulpevent_make_authkey() argument 787 ak->auth_keynumber = key_id; in sctp_ulpevent_make_authkey()
|
D | output.c | 238 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth()
|
D | sm_make_chunk.c | 87 ev = sctp_ulpevent_make_authkey(asoc, shkey->key_id, in sctp_control_release_owner() 1278 __u16 key_id) in sctp_make_auth() argument 1296 auth_hdr.shkey_id = htons(key_id); in sctp_make_auth()
|
D | sm_statefuns.c | 4199 __u16 key_id; in sctp_sf_authenticate() local 4215 key_id = ntohs(auth_hdr->shkey_id); in sctp_sf_authenticate() 4216 if (key_id != asoc->active_key_id) { in sctp_sf_authenticate() 4217 sh_key = sctp_auth_get_shkey(asoc, key_id); in sctp_sf_authenticate()
|
D | socket.c | 8994 ev = sctp_ulpevent_make_authkey(asoc, shkey->key_id, in sctp_wfree()
|
/net/core/ |
D | flow_dissector.c | 38 enum flow_dissector_key_id key_id) in dissector_set_key() argument 40 flow_dissector->used_keys |= (1 << key_id); in dissector_set_key() 57 key->key_id)); in skb_flow_dissector_init() 59 dissector_set_key(flow_dissector, key->key_id); in skb_flow_dissector_init() 60 flow_dissector->offset[key->key_id] = key->offset; in skb_flow_dissector_init() 1667 .key_id = FLOW_DISSECTOR_KEY_CONTROL, 1671 .key_id = FLOW_DISSECTOR_KEY_BASIC, 1675 .key_id = FLOW_DISSECTOR_KEY_IPV4_ADDRS, 1679 .key_id = FLOW_DISSECTOR_KEY_IPV6_ADDRS, 1683 .key_id = FLOW_DISSECTOR_KEY_TIPC, [all …]
|
/net/mac802154/ |
D | llsec.c | 411 if (!llsec_key_id_equal(key, &devkey->key_id)) in llsec_devkey_find() 433 if (llsec_devkey_find(dev, &key->key_id)) in mac802154_llsec_devkey_add() 457 devkey = llsec_devkey_find(dev, &key->key_id); in mac802154_llsec_devkey_del() 545 struct ieee802154_llsec_key_id *key_id) in llsec_lookup_key() argument 575 if (id->id != hdr->sec.key_id) in llsec_lookup_key() 591 if (key_id) in llsec_lookup_key() 592 *key_id = key_entry->id; in llsec_lookup_key() 921 next->devkey.key_id = *in_key; in llsec_update_devkey_record() 979 struct ieee802154_llsec_key_id key_id; in mac802154_llsec_decrypt() local 1002 key = llsec_lookup_key(sec, &hdr, &hdr.source, &key_id); in mac802154_llsec_decrypt() [all …]
|
D | rx.c | 169 pr_debug("key %02x\n", hdr->sec.key_id); in ieee802154_parse_frame_start() 176 hdr->sec.key_id); in ieee802154_parse_frame_start() 182 hdr->sec.key_id); in ieee802154_parse_frame_start()
|
D | iface.c | 357 hdr->sec.key_id = params.out_key.id; in mac802154_set_header_security()
|
/net/sched/ |
D | act_tunnel_key.c | 227 __be64 key_id = 0; in tunnel_key_init() local 269 key_id = key32_to_tunnel_id(key32); in tunnel_key_init() 307 key_id, opts_len); in tunnel_key_init() 318 key_id, 0); in tunnel_key_init() 538 __be32 key_id = tunnel_id_to_key32(key->tun_id); in tunnel_key_dump() local 541 nla_put_be32(skb, TCA_TUNNEL_KEY_ENC_KEY_ID, key_id)) || in tunnel_key_dump()
|
D | cls_flower.c | 1303 keys[cnt].key_id = id; \
|
/net/mac80211/ |
D | wpa.c | 381 static inline void ccmp_pn2hdr(u8 *hdr, u8 *pn, int key_id) in ccmp_pn2hdr() argument 386 hdr[3] = 0x20 | (key_id << 6); in ccmp_pn2hdr() 615 static inline void gcmp_pn2hdr(u8 *hdr, const u8 *pn, int key_id) in gcmp_pn2hdr() argument 620 hdr[3] = 0x20 | (key_id << 6); in gcmp_pn2hdr() 959 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_encrypt() 1006 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_cmac_256_encrypt() 1151 mmie->key_id = cpu_to_le16(key->conf.keyidx); in ieee80211_crypto_aes_gmac_encrypt()
|
D | rx.c | 993 return le16_to_cpu(mmie->key_id); in ieee80211_get_mmie_keyidx() 1000 return le16_to_cpu(mmie16->key_id); in ieee80211_get_mmie_keyidx()
|
/net/ieee802154/ |
D | header_ops.c | 72 buf[pos++] = hdr->key_id; in ieee802154_hdr_push_sechdr() 186 hdr->key_id = buf[pos++]; in ieee802154_hdr_get_sechdr()
|
D | nl-mac.c | 1113 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_add_devkey() 1138 ieee802154_llsec_parse_key_id(info, &key.key_id)) in llsec_del_devkey() 1170 ieee802154_llsec_fill_key_id(msg, &devkey->key_id)) in ieee802154_nl_fill_devkey()
|
D | nl802154.c | 1816 if (ieee802154_llsec_send_key_id(msg, &devkey->key_id) < 0) in nl802154_send_devkey() 1911 &key.key_id) < 0) in nl802154_add_llsec_devkey() 1940 &key.key_id) < 0) in nl802154_del_llsec_devkey()
|
/net/wireless/ |
D | mlme.c | 194 enum nl80211_key_type key_type, int key_id, in cfg80211_michael_mic_failure() argument 205 "keyid=%d %scast addr=%pM)", key_id, in cfg80211_michael_mic_failure() 215 trace_cfg80211_michael_mic_failure(dev, addr, key_type, key_id, tsc); in cfg80211_michael_mic_failure() 216 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); in cfg80211_michael_mic_failure()
|
D | nl80211.h | 101 int key_id, const u8 *tsc, gfp_t gfp);
|
D | trace.h | 2694 enum nl80211_key_type key_type, int key_id, const u8 *tsc), 2695 TP_ARGS(netdev, addr, key_type, key_id, tsc), 2700 __field(int, key_id) 2707 __entry->key_id = key_id; 2713 __entry->key_id, __entry->tsc)
|
D | nl80211.c | 15473 enum nl80211_key_type key_type, int key_id, in nl80211_michael_mic_failure() argument 15493 (key_id != -1 && in nl80211_michael_mic_failure() 15494 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, key_id)) || in nl80211_michael_mic_failure()
|
/net/bluetooth/ |
D | smp.c | 344 const u8 key_id[4], u8 res[16]) in smp_h6() 348 SMP_DBG("w %16phN key_id %4phN", w, key_id); in smp_h6() 350 err = aes_cmac(tfm_cmac, w, key_id, 4, res); in smp_h6() 3769 const u8 key_id[4] = { 0x72, 0x62, 0x65, 0x6c }; in test_h6() local 3776 err = smp_h6(tfm_cmac, w, key_id, res); in test_h6()
|