Searched refs:key (Results 1 - 25 of 126) sorted by relevance

123456

/net/mac80211/
H A Dkey.c33 * each station key also belongs to that interface.
36 * that are implemented in software, for each key the hardware is asked
37 * to enable that key for offloading but if it cannot do that the key is
40 * There is currently no way of knowing whether a key is handled in SW
43 * All key management is internally protected by a mutex. Within all
44 * other parts of mac80211, key references are, just as STA structure
46 * unprotected, namely the key->sta dereferences within the hardware
48 * remove the key which waits for an RCU grace period.
65 * 1. SKB resize was skipped because no key wa
88 ieee80211_key_enable_hw_accel(struct ieee80211_key *key) argument
161 ieee80211_key_disable_hw_accel(struct ieee80211_key *key) argument
200 struct ieee80211_key *key = NULL; local
229 struct ieee80211_key *key = NULL; local
316 struct ieee80211_key *key; local
400 ieee80211_key_free_common(struct ieee80211_key *key) argument
409 __ieee80211_key_destroy(struct ieee80211_key *key, bool delay_tailroom) argument
433 ieee80211_key_destroy(struct ieee80211_key *key, bool delay_tailroom) argument
448 ieee80211_key_free_unused(struct ieee80211_key *key) argument
454 ieee80211_key_link(struct ieee80211_key *key, struct ieee80211_sub_if_data *sdata, struct sta_info *sta) argument
497 ieee80211_key_free(struct ieee80211_key *key, bool delay_tailroom) argument
514 struct ieee80211_key *key; local
533 ieee80211_iter_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, void (*iter)(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *data), void *iter_data) argument
543 struct ieee80211_key *key; local
568 struct ieee80211_key *key, *tmp; local
605 struct ieee80211_key *key, *tmp; local
684 struct ieee80211_key *key; local
724 struct ieee80211_key *key; local
[all...]
H A Ddebugfs_key.h5 void ieee80211_debugfs_key_add(struct ieee80211_key *key);
6 void ieee80211_debugfs_key_remove(struct ieee80211_key *key);
12 void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key,
15 static inline void ieee80211_debugfs_key_add(struct ieee80211_key *key) argument
17 static inline void ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument
28 static inline void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, argument
H A Ddebugfs_key.c14 #include "key.h"
23 struct ieee80211_key *key = file->private_data; \
25 format_string, key->prop); \
69 struct ieee80211_key *key = file->private_data; local
70 u32 c = key->conf.cipher;
84 struct ieee80211_key *key = file->private_data; local
86 switch (key->conf.cipher) {
93 key->u.tkip.tx.iv32,
94 key->u.tkip.tx.iv16);
97 pn = atomic64_read(&key
118 struct ieee80211_key *key = file->private_data; local
164 struct ieee80211_key *key = file->private_data; local
186 struct ieee80211_key *key = file->private_data; local
205 struct ieee80211_key *key = file->private_data; local
221 struct ieee80211_key *key = file->private_data; local
237 KEY_OPS(key); variable
243 ieee80211_debugfs_key_add(struct ieee80211_key *key) argument
284 ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument
296 struct ieee80211_key *key; local
335 struct ieee80211_key *key; local
360 ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, struct sta_info *sta) argument
[all...]
H A Dtkip.c18 #include "key.h"
145 u8 *ieee80211_tkip_add_iv(u8 *pos, struct ieee80211_key *key) argument
147 lockdep_assert_held(&key->u.tkip.txlock);
149 pos = write_tkip_iv(pos, key->u.tkip.tx.iv16);
150 *pos++ = (key->conf.keyidx << 6) | (1 << 5) /* Ext IV */;
151 put_unaligned_le32(key->u.tkip.tx.iv32, pos);
155 static void ieee80211_compute_tkip_p1k(struct ieee80211_key *key, u32 iv32) argument
157 struct ieee80211_sub_if_data *sdata = key->sdata;
158 struct tkip_ctx *ctx = &key->u.tkip.tx;
159 const u8 *tk = &key
177 struct ieee80211_key *key = (struct ieee80211_key *) local
202 struct ieee80211_key *key = (struct ieee80211_key *) local
225 ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, struct sk_buff *skb, u8 *payload, size_t payload_len) argument
242 ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, u8 *payload, size_t payload_len, u8 *ta, u8 *ra, int only_iv, int queue, u32 *out_iv32, u16 *out_iv16) argument
[all...]
H A Dtkip.h14 #include "key.h"
16 u8 *ieee80211_tkip_add_iv(u8 *pos, struct ieee80211_key *key);
19 struct ieee80211_key *key,
30 struct ieee80211_key *key,
H A Dwpa.c30 u8 *data, *key, *mic; local
39 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP ||
58 !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC)) {
71 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY];
73 michael_mic(key, hdr, data, data_len, mic);
84 u8 *data, *key = NULL; local
101 * the IV with the key inde
182 struct ieee80211_key *key = tx->key; local
258 struct ieee80211_key *key = rx->key; local
403 struct ieee80211_key *key = tx->key; local
490 struct ieee80211_key *key = rx->key; local
593 struct ieee80211_key *key = tx->key; local
638 struct ieee80211_key *key = rx->key; local
[all...]
H A Dwep.c61 * key scheduling algorithm of RC4. At least IVs (KeyByte + 3,
122 struct ieee80211_key *key)
133 /* Perform WEP encryption using given key. data buffer must have tailroom
161 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data))
165 const u8 *key, int keylen, int keyidx)
177 /* Prepend 24-bit IV to RC4 key */
180 /* Copy rest of the WEP key (the secret part) */
181 memcpy(rc4key + 3, key, keylen);
191 /* Perform WEP decryption using given key. data buffer includes encrypted
226 struct ieee80211_key *key)
120 ieee80211_wep_remove_iv(struct ieee80211_local *local, struct sk_buff *skb, struct ieee80211_key *key) argument
163 ieee80211_wep_encrypt(struct ieee80211_local *local, struct sk_buff *skb, const u8 *key, int keylen, int keyidx) argument
224 ieee80211_wep_decrypt(struct ieee80211_local *local, struct sk_buff *skb, struct ieee80211_key *key) argument
274 ieee80211_wep_is_weak_iv(struct sk_buff *skb, struct ieee80211_key *key) argument
[all...]
H A Daes_cmac.h14 struct crypto_cipher * ieee80211_aes_cmac_key_setup(const u8 key[]);
H A Dmichael.h21 void michael_mic(const u8 *key, struct ieee80211_hdr *hdr,
H A Dmichael.c30 static void michael_mic_hdr(struct michael_mic_ctx *mctx, const u8 *key, argument
42 mctx->l = get_unaligned_le32(key);
43 mctx->r = get_unaligned_le32(key + 4);
56 void michael_mic(const u8 *key, struct ieee80211_hdr *hdr, argument
63 michael_mic_hdr(&mctx, key, hdr);
H A Daes_ccm.h15 struct crypto_cipher *ieee80211_aes_key_setup_encrypt(const u8 key[]);
/net/ceph/
H A Dcrypto.h14 void *key; member in struct:ceph_crypto_key
17 static inline void ceph_crypto_key_destroy(struct ceph_crypto_key *key) argument
19 if (key)
20 kfree(key->key);
25 extern int ceph_crypto_key_encode(struct ceph_crypto_key *key,
27 extern int ceph_crypto_key_decode(struct ceph_crypto_key *key,
29 extern int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *in);
H A Dcrypto.c8 #include <linux/key-type.h>
18 dst->key = kmemdup(src->key, src->len, GFP_NOFS);
19 if (!dst->key)
24 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end) argument
26 if (*p + sizeof(u16) + sizeof(key->created) +
27 sizeof(u16) + key->len > end)
29 ceph_encode_16(p, key->type);
30 ceph_encode_copy(p, &key->created, sizeof(key
36 ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end) argument
54 ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument
92 ceph_aes_encrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument
142 ceph_aes_encrypt2(const void *key, int key_len, void *dst, size_t *dst_len, const void *src1, size_t src1_len, const void *src2, size_t src2_len) argument
196 ceph_aes_decrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument
256 ceph_aes_decrypt2(const void *key, int key_len, void *dst1, size_t *dst1_len, void *dst2, size_t *dst2_len, const void *src, size_t src_len) argument
426 ceph_key_instantiate(struct key *key, struct key_preparsed_payload *prep) argument
462 ceph_key_match(const struct key *key, const void *description) argument
467 ceph_key_destroy(struct key *key) argument
[all...]
H A Dceph_common.c8 #include <linux/key.h>
139 if (opt1->key && !opt2->key)
141 if (!opt1->key && opt2->key)
143 if (opt1->key && opt2->key) {
144 if (opt1->key->type != opt2->key->type)
146 if (opt1->key
[all...]
/net/ipv4/
H A Dtcp_fastopen.c25 int tcp_fastopen_reset_cipher(void *key, unsigned int len) argument
41 err = crypto_cipher_setkey(ctx->tfm, key, len);
43 pr_err("TCP: TFO cipher key error: %d\n", err);
47 memcpy(ctx->key, key, len);
85 __u8 key[TCP_FASTOPEN_KEY_LENGTH]; local
87 get_random_bytes(key, sizeof(key));
88 tcp_fastopen_reset_cipher(key, sizeof(key));
[all...]
/net/dns_resolver/
H A Ddns_key.c50 * Instantiate a user defined key for dns_resolver.
56 * one to be an option of the form 'key=value'. The actual data of interest is
62 dns_resolver_instantiate(struct key *key, struct key_preparsed_payload *prep) argument
71 key->serial, key->description,
99 "Empty option to dns_resolver key %d\n",
100 key->serial);
114 * that's to be recorded as the result in this key */
129 key
176 dns_resolver_match(const struct key *key, const void *description) argument
210 dns_resolver_describe(const struct key *key, struct seq_file *m) argument
227 dns_resolver_read(const struct key *key, char __user *buffer, size_t buflen) argument
[all...]
/net/sunrpc/auth_gss/
H A Dgss_krb5_keys.c206 /* loop encrypting the blocks until enough key bytes are generated */
223 /* postprocess the key */
259 static void mit_des_fixup_key_parity(u8 key[8]) argument
263 key[i] &= 0xfe;
264 key[i] |= 1^parity_char(key[i]);
269 * This is the des3 key derivation postprocess function
273 struct xdr_netobj *key)
278 if (key->len != 24) {
279 dprintk("%s: key
271 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument
311 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument
[all...]
/net/ipv4/netfilter/
H A Dnf_nat_proto_gre.c9 * It has an optional key field, which may help us distinguishing two
15 * field called "CallID", which serves us for the same purpose as the key
48 static u_int16_t key; local
58 keyptr = &tuple->src.u.gre.key;
60 keyptr = &tuple->dst.u.gre.key;
67 min = ntohs(range->min_proto.gre.key);
68 range_size = ntohs(range->max_proto.gre.key) - min + 1;
73 for (i = 0; ; ++key) {
74 *keyptr = htons(min + key % range_size);
102 /* we only have destination manip of a packet, since 'source key'
[all...]
/net/sched/
H A Dem_u32.c24 struct tc_u32_key *key = (struct tc_u32_key *) em->data; local
30 ptr += (info->nexthdr & key->offmask);
33 ptr += key->off;
38 return !(((*(__be32 *) ptr) ^ key->val) & key->mask);
/net/tipc/
H A Dname_table.h58 * @key: publication key
75 u32 key; member in struct:publication
92 u32 scope, u32 port_ref, u32 key);
93 int tipc_nametbl_withdraw(u32 type, u32 lower, u32 ref, u32 key);
95 u32 scope, u32 node, u32 ref, u32 key);
97 u32 node, u32 ref, u32 key);
/net/wireless/
H A Dlib80211_crypt_wep.c35 u8 key[WEP_KEY_LEN + 1]; member in struct:lib80211_wep_data
90 /* Add WEP IV/key info to a frame that has at least 4 bytes of headroom */
92 u8 *key, int keylen, void *priv)
109 /* Fluhrer, Mantin, and Shamir have reported weaknesses in the key
118 /* Prepend 24-bit IV to RC4 key and TX frame */
131 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data))
140 u8 key[WEP_KEY_LEN + 3]; local
150 /* Copy the IV into the first 3 bytes of the key */
151 skb_copy_from_linear_data_offset(skb, hdr_len, key, 3);
153 /* Copy rest of the WEP key (th
91 lib80211_wep_build_iv(struct sk_buff *skb, int hdr_len, u8 *key, int keylen, void *priv) argument
185 u8 key[WEP_KEY_LEN + 3]; local
231 lib80211_wep_set_key(void *key, int len, u8 * seq, void *priv) argument
244 lib80211_wep_get_key(void *key, int len, u8 * seq, void *priv) argument
[all...]
H A Dlib80211_crypt_ccmp.c43 u8 key[CCMP_TK_LEN]; member in struct:lib80211_ccmp_data
184 struct lib80211_ccmp_data *key = priv; local
192 memcpy(aeskey, key->key, CCMP_TK_LEN);
200 key->tx_pn[i]++;
201 if (key->tx_pn[i] != 0)
206 *pos++ = key->tx_pn[5];
207 *pos++ = key->tx_pn[4];
209 *pos++ = (key->key_idx << 6) | (1 << 5) /* Ext IV included */ ;
210 *pos++ = key
220 struct lib80211_ccmp_data *key = priv; local
287 struct lib80211_ccmp_data *key = priv; local
380 lib80211_ccmp_set_key(void *key, int len, u8 * seq, void *priv) argument
410 lib80211_ccmp_get_key(void *key, int len, u8 * seq, void *priv) argument
[all...]
/net/rxrpc/
H A Dar-key.c1 /* RxRPC key management
18 #include <linux/key-type.h>
29 static int rxrpc_instantiate(struct key *, struct key_preparsed_payload *);
30 static int rxrpc_instantiate_s(struct key *, struct key_preparsed_payload *);
31 static void rxrpc_destroy(struct key *);
32 static void rxrpc_destroy_s(struct key *);
33 static void rxrpc_describe(const struct key *, struct seq_file *);
34 static long rxrpc_read(const struct key *, char __user *, size_t);
52 * description and an 8-byte decryption key as the payload
64 * Vet the description for an RxRPC server key
84 rxrpc_instantiate_xdr_rxkad(struct key *key, const __be32 *xdr, unsigned int toklen) argument
421 rxrpc_instantiate_xdr_rxk5(struct key *key, const __be32 *xdr, unsigned int toklen) argument
548 rxrpc_instantiate_xdr(struct key *key, const void *data, size_t datalen) argument
681 rxrpc_instantiate(struct key *key, struct key_preparsed_payload *prep) argument
787 rxrpc_instantiate_s(struct key *key, struct key_preparsed_payload *prep) argument
816 rxrpc_destroy(struct key *key) argument
843 rxrpc_destroy_s(struct key *key) argument
854 rxrpc_describe(const struct key *key, struct seq_file *m) argument
864 struct key *key; local
901 struct key *key; local
941 struct key *key; local
995 struct key *key; local
1019 rxrpc_read(const struct key *key, char __user *buffer, size_t buflen) argument
[all...]
H A Dar-security.c128 struct key *key = conn->key; local
131 _enter("{%d},{%x}", conn->debug_id, key_serial(key));
133 if (!key)
136 ret = key_validate(key);
140 if (!key->payload.data)
142 token = key->payload.data;
168 struct key *key; local
[all...]
/net/sctp/
H A Dauth.c68 void sctp_auth_key_put(struct sctp_auth_bytes *key) argument
70 if (!key)
73 if (atomic_dec_and_test(&key->refcnt)) {
74 kzfree(key);
79 /* Create a new key structure of a given length */
82 struct sctp_auth_bytes *key; local
88 /* Allocate the shared key */
89 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp);
90 if (!key)
93 key
430 struct sctp_shared_key *key; local
836 struct sctp_auth_bytes *key; local
896 struct sctp_shared_key *key; local
929 struct sctp_shared_key *key; local
[all...]

Completed in 253 milliseconds

123456