/net/mac80211/ |
H A D | debugfs_key.h | 5 void ieee80211_debugfs_key_add(struct ieee80211_key *key); 6 void ieee80211_debugfs_key_remove(struct ieee80211_key *key); 12 void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, 15 static inline void ieee80211_debugfs_key_add(struct ieee80211_key *key) argument 17 static inline void ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument 28 static inline void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, argument
|
H A D | key.c | 34 * each station key also belongs to that interface. 37 * that are implemented in software, for each key the hardware is asked 38 * to enable that key for offloading but if it cannot do that the key is 41 * There is currently no way of knowing whether a key is handled in SW 44 * All key management is internally protected by a mutex. Within all 45 * other parts of mac80211, key references are, just as STA structure 47 * unprotected, namely the key->sta dereferences within the hardware 49 * remove the key which waits for an RCU grace period. 66 * 1. SKB resize was skipped because no key wa 89 ieee80211_key_enable_hw_accel(struct ieee80211_key *key) argument 163 ieee80211_key_disable_hw_accel(struct ieee80211_key *key) argument 200 struct ieee80211_key *key = NULL; local 229 struct ieee80211_key *key = NULL; local 322 struct ieee80211_key *key; local 419 ieee80211_key_free_common(struct ieee80211_key *key) argument 428 __ieee80211_key_destroy(struct ieee80211_key *key, bool delay_tailroom) argument 452 ieee80211_key_destroy(struct ieee80211_key *key, bool delay_tailroom) argument 467 ieee80211_key_free_unused(struct ieee80211_key *key) argument 473 ieee80211_key_link(struct ieee80211_key *key, struct ieee80211_sub_if_data *sdata, struct sta_info *sta) argument 517 ieee80211_key_free(struct ieee80211_key *key, bool delay_tailroom) argument 534 struct ieee80211_key *key; local 553 ieee80211_iter_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, void (*iter)(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *data), void *iter_data) argument 563 struct ieee80211_key *key, *tmp; local 590 struct ieee80211_key *key, *tmp; local 613 struct ieee80211_key *key, *tmp; local 646 struct ieee80211_key *key; local 717 struct ieee80211_key *key; local 757 struct ieee80211_key *key; local 791 struct ieee80211_key *key; local 829 struct ieee80211_key *key; local 865 struct ieee80211_key *key; local 892 struct ieee80211_key *key; local [all...] |
H A D | debugfs_key.c | 14 #include "key.h" 23 struct ieee80211_key *key = file->private_data; \ 25 format_string, key->prop); \ 69 struct ieee80211_key *key = file->private_data; local 70 u32 c = key->conf.cipher; 84 struct ieee80211_key *key = file->private_data; local 86 switch (key->conf.cipher) { 93 key->u.tkip.tx.iv32, 94 key->u.tkip.tx.iv16); 97 pn = atomic64_read(&key 118 struct ieee80211_key *key = file->private_data; local 164 struct ieee80211_key *key = file->private_data; local 186 struct ieee80211_key *key = file->private_data; local 205 struct ieee80211_key *key = file->private_data; local 221 struct ieee80211_key *key = file->private_data; local 237 KEY_OPS(key); variable 243 ieee80211_debugfs_key_add(struct ieee80211_key *key) argument 284 ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument 296 struct ieee80211_key *key; local 335 struct ieee80211_key *key; local 360 ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, struct sta_info *sta) argument [all...] |
H A D | tkip.c | 18 #include "key.h" 145 u8 *ieee80211_tkip_add_iv(u8 *pos, struct ieee80211_key *key) argument 147 lockdep_assert_held(&key->u.tkip.txlock); 149 pos = write_tkip_iv(pos, key->u.tkip.tx.iv16); 150 *pos++ = (key->conf.keyidx << 6) | (1 << 5) /* Ext IV */; 151 put_unaligned_le32(key->u.tkip.tx.iv32, pos); 155 static void ieee80211_compute_tkip_p1k(struct ieee80211_key *key, u32 iv32) argument 157 struct ieee80211_sub_if_data *sdata = key->sdata; 158 struct tkip_ctx *ctx = &key->u.tkip.tx; 159 const u8 *tk = &key 177 struct ieee80211_key *key = (struct ieee80211_key *) local 202 struct ieee80211_key *key = (struct ieee80211_key *) local 225 ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, struct sk_buff *skb, u8 *payload, size_t payload_len) argument 242 ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, u8 *payload, size_t payload_len, u8 *ta, u8 *ra, int only_iv, int queue, u32 *out_iv32, u16 *out_iv16) argument [all...] |
H A D | tkip.h | 14 #include "key.h" 16 u8 *ieee80211_tkip_add_iv(u8 *pos, struct ieee80211_key *key); 19 struct ieee80211_key *key, 30 struct ieee80211_key *key,
|
H A D | wpa.c | 30 u8 *data, *key, *mic; local 39 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || 58 !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC)) { 74 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; 76 michael_mic(key, hdr, data, data_len, mic); 87 u8 *data, *key = NULL; local 104 * the IV with the key inde 185 struct ieee80211_key *key = tx->key; local 262 struct ieee80211_key *key = rx->key; local 401 struct ieee80211_key *key = tx->key; local 493 struct ieee80211_key *key = rx->key; local 558 struct ieee80211_key *key = tx->key; local 601 struct ieee80211_key *key = rx->key; local 698 struct ieee80211_key *key = tx->key; local 743 struct ieee80211_key *key = rx->key; local [all...] |
H A D | aes_cmac.h | 14 struct crypto_cipher *ieee80211_aes_cmac_key_setup(const u8 key[]);
|
H A D | michael.h | 22 void michael_mic(const u8 *key, struct ieee80211_hdr *hdr,
|
H A D | michael.c | 30 static void michael_mic_hdr(struct michael_mic_ctx *mctx, const u8 *key, argument 42 mctx->l = get_unaligned_le32(key); 43 mctx->r = get_unaligned_le32(key + 4); 56 void michael_mic(const u8 *key, struct ieee80211_hdr *hdr, argument 63 michael_mic_hdr(&mctx, key, hdr);
|
H A D | wep.c | 61 * key scheduling algorithm of RC4. At least IVs (KeyByte + 3, 123 struct ieee80211_key *key) 134 /* Perform WEP encryption using given key. data buffer must have tailroom 162 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data)) 166 const u8 *key, int keylen, int keyidx) 178 /* Prepend 24-bit IV to RC4 key */ 181 /* Copy rest of the WEP key (the secret part) */ 182 memcpy(rc4key + 3, key, keylen); 192 /* Perform WEP decryption using given key. data buffer includes encrypted 227 struct ieee80211_key *key) 121 ieee80211_wep_remove_iv(struct ieee80211_local *local, struct sk_buff *skb, struct ieee80211_key *key) argument 164 ieee80211_wep_encrypt(struct ieee80211_local *local, struct sk_buff *skb, const u8 *key, int keylen, int keyidx) argument 225 ieee80211_wep_decrypt(struct ieee80211_local *local, struct sk_buff *skb, struct ieee80211_key *key) argument [all...] |
/net/openvswitch/ |
H A D | flow.c | 243 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key) argument 261 key->ip.proto = NEXTHDR_NONE; 262 key->ip.tos = ipv6_get_dsfield(nh); 263 key->ip.ttl = nh->hop_limit; 264 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL); 265 key->ipv6.addr.src = nh->saddr; 266 key->ipv6.addr.dst = nh->daddr; 274 key->ip.frag = OVS_FRAG_TYPE_LATER; 276 key->ip.frag = OVS_FRAG_TYPE_FIRST; 278 key 293 parse_vlan(struct sk_buff *skb, struct sw_flow_key *key) argument 353 parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key, int nh_len) argument 449 key_extract(struct sk_buff *skb, struct sw_flow_key *key) argument 647 ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key) argument 652 ovs_flow_key_extract(struct ovs_tunnel_info *tun_info, struct sk_buff *skb, struct sw_flow_key *key) argument 683 ovs_flow_key_extract_userspace(const struct nlattr *attr, struct sk_buff *skb, struct sw_flow_key *key) argument [all...] |
/net/ceph/ |
H A D | crypto.h | 14 void *key; member in struct:ceph_crypto_key 17 static inline void ceph_crypto_key_destroy(struct ceph_crypto_key *key) argument 19 if (key) 20 kfree(key->key); 25 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end); 26 int ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end); 27 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *in);
|
H A D | crypto.c | 8 #include <linux/key-type.h> 19 dst->key = kmemdup(src->key, src->len, GFP_NOFS); 20 if (!dst->key) 25 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end) argument 27 if (*p + sizeof(u16) + sizeof(key->created) + 28 sizeof(u16) + key->len > end) 30 ceph_encode_16(p, key->type); 31 ceph_encode_copy(p, &key->created, sizeof(key 37 ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end) argument 55 ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument 163 ceph_aes_encrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument 222 ceph_aes_encrypt2(const void *key, int key_len, void *dst, size_t *dst_len, const void *src1, size_t src1_len, const void *src2, size_t src2_len) argument 285 ceph_aes_decrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument 349 ceph_aes_decrypt2(const void *key, int key_len, void *dst1, size_t *dst1_len, void *dst2, size_t *dst2_len, const void *src, size_t src_len) argument 561 ceph_key_destroy(struct key *key) argument [all...] |
H A D | ceph_common.c | 8 #include <linux/key.h> 142 if (opt1->key && !opt2->key) 144 if (!opt1->key && opt2->key) 146 if (opt1->key && opt2->key) { 147 if (opt1->key->type != opt2->key->type) 149 if (opt1->key [all...] |
/net/mac802154/ |
H A D | llsec.c | 26 static void llsec_key_put(struct mac802154_llsec_key *key); 50 struct ieee802154_llsec_key_entry *key, *kn; local 68 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { 71 mkey = container_of(key->key, struct mac802154_llsec_key, key); 72 list_del(&key->list); 74 kfree(key); 126 struct mac802154_llsec_key *key; local 129 key 173 struct mac802154_llsec_key *key; local 186 llsec_key_get(struct mac802154_llsec_key *key) argument 192 llsec_key_put(struct mac802154_llsec_key *key) argument 221 mac802154_llsec_key_add(struct mac802154_llsec *sec, const struct ieee802154_llsec_key_id *id, const struct ieee802154_llsec_key *key) argument 277 mac802154_llsec_key_del(struct mac802154_llsec *sec, const struct ieee802154_llsec_key_id *key) argument 320 u32 key = llsec_dev_hash_short(short_addr, pan_id); local 335 u64 key = llsec_dev_hash_long(hwaddr); local 417 llsec_devkey_find(struct mac802154_llsec_device *dev, const struct ieee802154_llsec_key_id *key) argument 433 mac802154_llsec_devkey_add(struct mac802154_llsec *sec, __le64 dev_addr, const struct ieee802154_llsec_device_key *key) argument 457 mac802154_llsec_devkey_del(struct mac802154_llsec *sec, __le64 dev_addr, const struct ieee802154_llsec_device_key *key) argument 566 struct mac802154_llsec_key *key; local 628 llsec_do_encrypt_unauth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 646 llsec_tfm_by_len(struct mac802154_llsec_key *key, int authlen) argument 658 llsec_do_encrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 707 llsec_do_encrypt(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 722 struct mac802154_llsec_key *key; local 803 u32 key = llsec_dev_hash_short(devaddr.short_addr, local 813 u64 key = llsec_dev_hash_long(devaddr.extended_addr); local 845 llsec_do_decrypt_unauth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 869 llsec_do_decrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 917 llsec_do_decrypt(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 999 struct mac802154_llsec_key *key; local [all...] |
H A D | llsec.h | 29 struct ieee802154_llsec_key key; member in struct:mac802154_llsec_key 84 const struct ieee802154_llsec_key *key); 86 const struct ieee802154_llsec_key_id *key); 95 const struct ieee802154_llsec_device_key *key); 98 const struct ieee802154_llsec_device_key *key);
|
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 197 /* loop encrypting the blocks until enough key bytes are generated */ 214 /* postprocess the key */ 250 static void mit_des_fixup_key_parity(u8 key[8]) argument 254 key[i] &= 0xfe; 255 key[i] |= 1^parity_char(key[i]); 260 * This is the des3 key derivation postprocess function 264 struct xdr_netobj *key) 269 if (key->len != 24) { 270 dprintk("%s: key 262 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument 302 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument [all...] |
/net/ipv4/netfilter/ |
H A D | nf_nat_proto_gre.c | 9 * It has an optional key field, which may help us distinguishing two 15 * field called "CallID", which serves us for the same purpose as the key 48 static u_int16_t key; local 58 keyptr = &tuple->src.u.gre.key; 60 keyptr = &tuple->dst.u.gre.key; 67 min = ntohs(range->min_proto.gre.key); 68 range_size = ntohs(range->max_proto.gre.key) - min + 1; 73 for (i = 0; ; ++key) { 74 *keyptr = htons(min + key % range_size); 102 /* we only have destination manip of a packet, since 'source key' [all...] |
/net/sched/ |
H A D | em_u32.c | 24 struct tc_u32_key *key = (struct tc_u32_key *) em->data; local 30 ptr += (info->nexthdr & key->offmask); 33 ptr += key->off; 38 return !(((*(__be32 *) ptr) ^ key->val) & key->mask);
|
/net/tipc/ |
H A D | name_table.h | 58 * @key: publication key 75 u32 key; member in struct:publication 92 u32 scope, u32 port_ref, u32 key); 93 int tipc_nametbl_withdraw(u32 type, u32 lower, u32 ref, u32 key); 96 u32 key); 98 u32 ref, u32 key);
|
/net/wireless/ |
H A D | lib80211_crypt_wep.c | 35 u8 key[WEP_KEY_LEN + 1]; member in struct:lib80211_wep_data 90 /* Add WEP IV/key info to a frame that has at least 4 bytes of headroom */ 92 u8 *key, int keylen, void *priv) 109 /* Fluhrer, Mantin, and Shamir have reported weaknesses in the key 118 /* Prepend 24-bit IV to RC4 key and TX frame */ 131 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data)) 140 u8 key[WEP_KEY_LEN + 3]; local 150 /* Copy the IV into the first 3 bytes of the key */ 151 skb_copy_from_linear_data_offset(skb, hdr_len, key, 3); 153 /* Copy rest of the WEP key (th 91 lib80211_wep_build_iv(struct sk_buff *skb, int hdr_len, u8 *key, int keylen, void *priv) argument 185 u8 key[WEP_KEY_LEN + 3]; local 231 lib80211_wep_set_key(void *key, int len, u8 * seq, void *priv) argument 244 lib80211_wep_get_key(void *key, int len, u8 * seq, void *priv) argument [all...] |
H A D | lib80211_crypt_ccmp.c | 43 u8 key[CCMP_TK_LEN]; member in struct:lib80211_ccmp_data 184 struct lib80211_ccmp_data *key = priv; local 192 memcpy(aeskey, key->key, CCMP_TK_LEN); 200 key->tx_pn[i]++; 201 if (key->tx_pn[i] != 0) 206 *pos++ = key->tx_pn[5]; 207 *pos++ = key->tx_pn[4]; 209 *pos++ = (key->key_idx << 6) | (1 << 5) /* Ext IV included */ ; 210 *pos++ = key 220 struct lib80211_ccmp_data *key = priv; local 287 struct lib80211_ccmp_data *key = priv; local 380 lib80211_ccmp_set_key(void *key, int len, u8 * seq, void *priv) argument 410 lib80211_ccmp_get_key(void *key, int len, u8 * seq, void *priv) argument [all...] |
/net/sctp/ |
H A D | auth.c | 61 void sctp_auth_key_put(struct sctp_auth_bytes *key) argument 63 if (!key) 66 if (atomic_dec_and_test(&key->refcnt)) { 67 kzfree(key); 72 /* Create a new key structure of a given length */ 75 struct sctp_auth_bytes *key; local 81 /* Allocate the shared key */ 82 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp); 83 if (!key) 86 key 422 struct sctp_shared_key *key; local 819 struct sctp_auth_bytes *key; local 877 struct sctp_shared_key *key; local 910 struct sctp_shared_key *key; local [all...] |
/net/dns_resolver/ |
H A D | dns_key.c | 49 * Preparse instantiation data for a dns_resolver key. 55 * one to be an option of the form 'key=value'. The actual data of interest is 96 "Empty option to dns_resolver key\n"); 110 * that's to be recorded as the result in this key */ 131 "Option '%*.*s' to dns_resolver key:" 179 static bool dns_resolver_cmp(const struct key *key, argument 183 const char *src = key->description, *dsp = match_data->raw_data; 222 * Describe a DNS key 224 static void dns_resolver_describe(const struct key *ke argument 241 dns_resolver_read(const struct key *key, char __user *buffer, size_t buflen) argument [all...] |
/net/netfilter/ |
H A D | nft_hash.c | 28 struct nft_data key; member in struct:nft_hash_elem 33 const struct nft_data *key, 39 he = rhashtable_lookup(priv, key); 64 nft_data_copy(&he->key, &elem->key); 76 nft_data_uninit(&he->key, NFT_DATA_VALUE); 105 h = rhashtable_hashfn(priv, &elem->key, set->klen); 108 if (nft_data_cmp(&he->key, &elem->key, set->klen)) { 137 memcpy(&elem.key, 32 nft_hash_lookup(const struct nft_set *set, const struct nft_data *key, struct nft_data *data) argument [all...] |