/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/ |
H A D | cmm_cfg.c | 174 int KeyLen; local 181 KeyLen = strlen(keyString); 182 switch (KeyLen) { 186 pSharedKey->KeyLen = KeyLen; 187 NdisMoveMemory(pSharedKey->Key, keyString, KeyLen); 192 for (i = 0; i < KeyLen; i++) { 197 pSharedKey->KeyLen = KeyLen / 2; 198 AtoH(keyString, pSharedKey->Key, pSharedKey->KeyLen); [all...] |
H A D | crypt_hmac.c | 50 u32 KeyLen, 69 if (KeyLen <= SHA1_BLOCK_SIZE) 70 NdisMoveMemory(K0, Key, KeyLen); 72 RT_SHA1(Key, KeyLen, K0); 129 u32 KeyLen, 148 if (KeyLen <= MD5_BLOCK_SIZE) { 149 NdisMoveMemory(K0, Key, KeyLen); 151 RT_MD5(Key, KeyLen, K0); 49 HMAC_SHA1(IN const u8 Key[], u32 KeyLen, IN const u8 Message[], u32 MessageLen, u8 MAC[], u32 MACLen) argument 128 HMAC_MD5(IN const u8 Key[], u32 KeyLen, IN const u8 Message[], u32 MessageLen, u8 MAC[], u32 MACLen) argument
|
H A D | cmm_wep.c | 126 KeyLen the length of WEP KEY 140 u8 KeyId, u8 KeyLen, IN u8 *pDest) 154 NdisMoveMemory(WEPKEY + 3, pKey, KeyLen); 158 ARCFOUR_INIT(&pAd->PrivateInfo.WEPCONTEXT, WEPKEY, KeyLen + 3); /*INIT SBOX, KEYLEN+3(IV) */ 234 if (pGroupKey[KeyIdx].KeyLen == 0) 238 pGroupKey[KeyIdx].KeyLen); 240 pGroupKey[KeyIdx].KeyLen + 3); 263 KeyLen Indicate the length fo the WEP KEY 274 void ARCFOUR_INIT(struct rt_arcfourcontext *Ctx, u8 *pKey, u32 KeyLen) argument 295 if (++keyindex >= KeyLen) 138 RTMPInitWepEngine(struct rt_rtmp_adapter *pAd, u8 *pKey, u8 KeyId, u8 KeyLen, IN u8 *pDest) argument [all...] |
H A D | cmm_wpa.c | 795 pSharedKey->KeyLen = LEN_TKIP_EK; 916 pEntry->PairwiseKey.KeyLen = LEN_TKIP_EK; 2206 ("GTK in KDE format ,DefaultKeyID=%d, KeyLen=%d \n", 2237 pSharedKey->KeyLen = LEN_TKIP_EK;
|
H A D | cmm_data.c | 1560 pEntry->PairwiseKey.KeyLen = 0; 1612 pEntry->PairwiseKey.KeyLen = 0;
|
H A D | cmm_tkip.c | 759 if (pWpaKey[KeyID].KeyLen == 0) {
|
H A D | cmm_aes.c | 466 if (pWpaKey[KeyID].KeyLen == 0) {
|
H A D | rtmp_init.c | 2541 pAd->SharedKey[bss_index][key_index].KeyLen = 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/ |
H A D | crypt_hmac.h | 52 u32 KeyLen, 60 u32 KeyLen,
|
H A D | sta_ioctl.c | 99 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK; 178 pAd->SharedKey[BSS0][pAd->StaCfg.DefaultKeyId].KeyLen = 281 pEntry->PairwiseKey.KeyLen = 316 pAd->SharedKey[BSS0][KeyIdx].KeyLen = 1397 pAdapter->SharedKey[BSS0][keyIdx].KeyLen = 1402 pAdapter->SharedKey[BSS0][keyIdx].KeyLen = 1408 pAdapter->SharedKey[BSS0][keyIdx].KeyLen = 0; 1434 ("==>rt_ioctl_siwencode::DefaultKeyId=%x, KeyLen = %d\n", 1437 KeyLen)); 1470 if (erq->length > pAdapter->SharedKey[BSS0][kid - 1].KeyLen) [all...] |
H A D | rtmp.h | 635 u8 KeyLen; member in struct:rt_cipher_key 2582 u8 KeyId, u8 KeyLen, u8 *pDest); 2593 void ARCFOUR_INIT(struct rt_arcfourcontext *Ctx, u8 *pKey, u32 KeyLen);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/ |
H A D | wpa.c | 291 pSharedKey->KeyLen = LEN_TKIP_EK; 341 pSharedKey->KeyLen = LEN_TKIP_EK;
|
H A D | rtmp_data.c | 77 KeyLen > 0) { 125 DesireSharedKey[idx].KeyLen; 134 [idx].KeyLen); 140 KeyLen = 162 KeyLen = 164 DesireSharedKey[idx].KeyLen; 173 [idx].KeyLen); 1394 && (pAd->SharedKey[BSS0][0].KeyLen)) { 1404 else if (pAd->SharedKey[BSS0][0].KeyLen) 1413 || (pAd->SharedKey[BSS0][KeyIdx].KeyLen [all...] |
H A D | auth.c | 224 KeyLen,
|
H A D | connect.c | 1418 if (pAd->SharedKey[BSS0][idx].KeyLen > 0) { 1443 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK; 1558 if (pAd->SharedKey[BSS0][idx].KeyLen > 0) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/hfs/ |
H A D | hfs.h | 146 #define HFS_BKEY(X) (((void)((X)->KeyLen)), ((struct hfs_bkey *)(X)))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2870/common/ |
H A D | rtusb_io.c | 1926 KeyLen = 1938 KeyLen == 1957 PairwiseKey.KeyLen = 1960 [KeyIdx].KeyLen;
|