Searched refs:KeyLen (Results 1 - 17 of 17) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/
H A Dcmm_cfg.c174 int KeyLen; local
181 KeyLen = strlen(keyString);
182 switch (KeyLen) {
186 pSharedKey->KeyLen = KeyLen;
187 NdisMoveMemory(pSharedKey->Key, keyString, KeyLen);
192 for (i = 0; i < KeyLen; i++) {
197 pSharedKey->KeyLen = KeyLen / 2;
198 AtoH(keyString, pSharedKey->Key, pSharedKey->KeyLen);
[all...]
H A Dcrypt_hmac.c50 u32 KeyLen,
69 if (KeyLen <= SHA1_BLOCK_SIZE)
70 NdisMoveMemory(K0, Key, KeyLen);
72 RT_SHA1(Key, KeyLen, K0);
129 u32 KeyLen,
148 if (KeyLen <= MD5_BLOCK_SIZE) {
149 NdisMoveMemory(K0, Key, KeyLen);
151 RT_MD5(Key, KeyLen, K0);
49 HMAC_SHA1(IN const u8 Key[], u32 KeyLen, IN const u8 Message[], u32 MessageLen, u8 MAC[], u32 MACLen) argument
128 HMAC_MD5(IN const u8 Key[], u32 KeyLen, IN const u8 Message[], u32 MessageLen, u8 MAC[], u32 MACLen) argument
H A Dcmm_wep.c126 KeyLen the length of WEP KEY
140 u8 KeyId, u8 KeyLen, IN u8 *pDest)
154 NdisMoveMemory(WEPKEY + 3, pKey, KeyLen);
158 ARCFOUR_INIT(&pAd->PrivateInfo.WEPCONTEXT, WEPKEY, KeyLen + 3); /*INIT SBOX, KEYLEN+3(IV) */
234 if (pGroupKey[KeyIdx].KeyLen == 0)
238 pGroupKey[KeyIdx].KeyLen);
240 pGroupKey[KeyIdx].KeyLen + 3);
263 KeyLen Indicate the length fo the WEP KEY
274 void ARCFOUR_INIT(struct rt_arcfourcontext *Ctx, u8 *pKey, u32 KeyLen) argument
295 if (++keyindex >= KeyLen)
138 RTMPInitWepEngine(struct rt_rtmp_adapter *pAd, u8 *pKey, u8 KeyId, u8 KeyLen, IN u8 *pDest) argument
[all...]
H A Dcmm_wpa.c795 pSharedKey->KeyLen = LEN_TKIP_EK;
916 pEntry->PairwiseKey.KeyLen = LEN_TKIP_EK;
2206 ("GTK in KDE format ,DefaultKeyID=%d, KeyLen=%d \n",
2237 pSharedKey->KeyLen = LEN_TKIP_EK;
H A Dcmm_data.c1560 pEntry->PairwiseKey.KeyLen = 0;
1612 pEntry->PairwiseKey.KeyLen = 0;
H A Dcmm_tkip.c759 if (pWpaKey[KeyID].KeyLen == 0) {
H A Dcmm_aes.c466 if (pWpaKey[KeyID].KeyLen == 0) {
H A Drtmp_init.c2541 pAd->SharedKey[bss_index][key_index].KeyLen = 0;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/
H A Dcrypt_hmac.h52 u32 KeyLen,
60 u32 KeyLen,
H A Dsta_ioctl.c99 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
178 pAd->SharedKey[BSS0][pAd->StaCfg.DefaultKeyId].KeyLen =
281 pEntry->PairwiseKey.KeyLen =
316 pAd->SharedKey[BSS0][KeyIdx].KeyLen =
1397 pAdapter->SharedKey[BSS0][keyIdx].KeyLen =
1402 pAdapter->SharedKey[BSS0][keyIdx].KeyLen =
1408 pAdapter->SharedKey[BSS0][keyIdx].KeyLen = 0;
1434 ("==>rt_ioctl_siwencode::DefaultKeyId=%x, KeyLen = %d\n",
1437 KeyLen));
1470 if (erq->length > pAdapter->SharedKey[BSS0][kid - 1].KeyLen)
[all...]
H A Drtmp.h635 u8 KeyLen; member in struct:rt_cipher_key
2582 u8 KeyId, u8 KeyLen, u8 *pDest);
2593 void ARCFOUR_INIT(struct rt_arcfourcontext *Ctx, u8 *pKey, u32 KeyLen);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/
H A Dwpa.c291 pSharedKey->KeyLen = LEN_TKIP_EK;
341 pSharedKey->KeyLen = LEN_TKIP_EK;
H A Drtmp_data.c77 KeyLen > 0) {
125 DesireSharedKey[idx].KeyLen;
134 [idx].KeyLen);
140 KeyLen =
162 KeyLen =
164 DesireSharedKey[idx].KeyLen;
173 [idx].KeyLen);
1394 && (pAd->SharedKey[BSS0][0].KeyLen)) {
1404 else if (pAd->SharedKey[BSS0][0].KeyLen)
1413 || (pAd->SharedKey[BSS0][KeyIdx].KeyLen
[all...]
H A Dauth.c224 KeyLen,
H A Dconnect.c1418 if (pAd->SharedKey[BSS0][idx].KeyLen > 0) {
1443 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
1558 if (pAd->SharedKey[BSS0][idx].KeyLen > 0) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/hfs/
H A Dhfs.h146 #define HFS_BKEY(X) (((void)((X)->KeyLen)), ((struct hfs_bkey *)(X)))
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2870/common/
H A Drtusb_io.c1926 KeyLen =
1938 KeyLen ==
1957 PairwiseKey.KeyLen =
1960 [KeyIdx].KeyLen;

Completed in 152 milliseconds