/net/mac80211/ |
D | wep.c | 31 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 40 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 48 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 51 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 66 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 87 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv() 133 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 142 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 152 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 157 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt() [all …]
|
D | debugfs_key.c | 62 KEY_CONF_FILE(keylen, D); 303 int i, bufsize = 2 * key->conf.keylen + 2; in key_key_read() 311 for (i = 0; i < key->conf.keylen; i++) in key_key_read() 350 DEBUGFS_ADD(keylen); in ieee80211_debugfs_key_add()
|
D | wep.h | 21 const u8 *key, int keylen, int keyidx);
|
D | key.c | 558 key->conf.keylen = key_len; in ieee80211_key_alloc() 772 if (!old || new->conf.keylen != old->conf.keylen) in ieee80211_key_identical() 785 new->conf.keylen == WLAN_KEY_LEN_TKIP && in ieee80211_key_identical() 795 return !crypto_memneq(tk_old, tk_new, new->conf.keylen); in ieee80211_key_identical() 1295 keyconf->keylen, keyconf->key, in ieee80211_gtk_rekey_add()
|
D | cfg.c | 672 params.key_len = key->conf.keylen; in ieee80211_get_key()
|
/net/netfilter/ |
D | nf_conncount.c | 59 unsigned int keylen; member 313 u8 keylen = data->keylen; in insert_tree() local 325 diff = key_diff(key, rbconn->key, keylen); in insert_tree() 370 memcpy(rbconn->key, key, sizeof(u32) * keylen); in insert_tree() 395 u8 keylen = data->keylen; in count_tree() local 397 hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; in count_tree() 406 diff = key_diff(key, rbconn->key, keylen); in count_tree() 517 unsigned int keylen) in nf_conncount_init() argument 522 if (keylen % sizeof(u32) || in nf_conncount_init() 523 keylen / sizeof(u32) > MAX_KEYLEN || in nf_conncount_init() [all …]
|
D | xt_connlimit.c | 88 unsigned int keylen; in connlimit_mt_check() local 90 keylen = sizeof(u32); in connlimit_mt_check() 92 keylen += sizeof(struct in6_addr); in connlimit_mt_check() 94 keylen += sizeof(struct in_addr); in connlimit_mt_check() 97 info->data = nf_conncount_init(par->net, par->family, keylen); in connlimit_mt_check()
|
/net/tipc/ |
D | crypto.c | 336 int keylen; in tipc_aead_key_validate() local 351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate() 352 if (unlikely(keylen != TIPC_AES_GCM_KEY_SIZE_128 && in tipc_aead_key_validate() 353 keylen != TIPC_AES_GCM_KEY_SIZE_192 && in tipc_aead_key_validate() 354 keylen != TIPC_AES_GCM_KEY_SIZE_256)) { in tipc_aead_key_validate() 376 skey->keylen); in tipc_aead_key_generate() 520 int keylen, err, cpu; in tipc_aead_init() local 532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init() 557 err |= crypto_aead_setkey(tfm, ukey->key, keylen); in tipc_aead_init() 592 bin2hex(tmp->hint, ukey->key + keylen - TIPC_AEAD_HINT_LEN, in tipc_aead_init() [all …]
|
D | node.c | 2928 if (key->keylen > TIPC_AEAD_KEYLEN_MAX || in tipc_nl_retrieve_key()
|
/net/ipv4/ |
D | tcp_diag.c | 43 info->tcpm_keylen = key->keylen; in tcp_diag_md5sig_fill() 44 memcpy(info->tcpm_key, key->key, key->keylen); in tcp_diag_md5sig_fill()
|
D | esp4.c | 1059 unsigned int keylen; in esp_init_authenc() local 1093 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1096 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 1135 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|
D | tcp.c | 4435 u8 keylen = READ_ONCE(key->keylen); /* paired with WRITE_ONCE() in tcp_md5_do_add */ in tcp_md5_hash_key() local 4438 sg_init_one(&sg, key->key, keylen); in tcp_md5_hash_key() 4439 ahash_request_set_crypt(hp->md5_req, &sg, NULL, keylen); in tcp_md5_hash_key()
|
D | tcp_ipv4.c | 1176 WRITE_ONCE(key->keylen, newkeylen); in tcp_md5_do_add() 1202 key->keylen = newkeylen; in tcp_md5_do_add() 1625 key->key, key->keylen, GFP_ATOMIC); in tcp_v4_syn_recv_sock()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_mech.c | 472 int keylen; in gss_import_v2_context() local 510 keylen = ctx->gk5e->keylength; in gss_import_v2_context() 512 p = simple_get_bytes(p, end, ctx->Ksess, keylen); in gss_import_v2_context()
|
/net/wireless/ |
D | lib80211_crypt_ccmp.c | 154 u8 *aeskey, int keylen, void *priv) in lib80211_ccmp_hdr() argument 163 if (aeskey != NULL && keylen >= CCMP_TK_LEN) in lib80211_ccmp_hdr()
|
D | lib80211_crypt_wep.c | 64 u8 *key, int keylen, void *priv) in lib80211_wep_build_iv() argument
|
D | lib80211_crypt_tkip.c | 284 u8 * rc4key, int keylen, void *priv) in lib80211_tkip_hdr() argument 295 if (rc4key == NULL || keylen < 16) in lib80211_tkip_hdr()
|
/net/ipv6/ |
D | esp6.c | 1101 unsigned int keylen; in esp_init_authenc() local 1135 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1138 key = kmalloc(keylen, GFP_KERNEL); in esp_init_authenc() 1177 err = crypto_aead_setkey(aead, key, keylen); in esp_init_authenc()
|
D | tcp_ipv6.c | 1416 AF_INET6, 128, l3index, key->flags, key->key, key->keylen, in tcp_v6_syn_recv_sock()
|