/net/ceph/ |
H A D | crypto.h | 14 void *key; member in struct:ceph_crypto_key 17 static inline void ceph_crypto_key_destroy(struct ceph_crypto_key *key) argument 19 if (key) 20 kfree(key->key); 25 extern int ceph_crypto_key_encode(struct ceph_crypto_key *key, 27 extern int ceph_crypto_key_decode(struct ceph_crypto_key *key, 29 extern int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *in);
|
H A D | auth_x_protocol.h | 39 __le64 key; member in struct:ceph_x_authenticate 60 * b - encrypted with session key
|
H A D | auth.c | 38 struct ceph_auth_client *ceph_auth_init(const char *name, const struct ceph_crypto_key *key) argument 57 ac->key = key;
|
H A D | crypto.c | 8 #include <linux/key-type.h> 18 dst->key = kmemdup(src->key, src->len, GFP_NOFS); 19 if (!dst->key) 24 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end) argument 26 if (*p + sizeof(u16) + sizeof(key->created) + 27 sizeof(u16) + key->len > end) 29 ceph_encode_16(p, key->type); 30 ceph_encode_copy(p, &key->created, sizeof(key 36 ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end) argument 54 ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument 92 ceph_aes_encrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument 142 ceph_aes_encrypt2(const void *key, int key_len, void *dst, size_t *dst_len, const void *src1, size_t src1_len, const void *src2, size_t src2_len) argument 196 ceph_aes_decrypt(const void *key, int key_len, void *dst, size_t *dst_len, const void *src, size_t src_len) argument 256 ceph_aes_decrypt2(const void *key, int key_len, void *dst1, size_t *dst1_len, void *dst2, size_t *dst2_len, const void *src, size_t src_len) argument 426 ceph_key_instantiate(struct key *key, struct key_preparsed_payload *prep) argument 462 ceph_key_match(const struct key *key, const void *description) argument 467 ceph_key_destroy(struct key *key) argument [all...] |
/net/batman-adv/ |
H A D | hash.c | 72 struct lock_class_key *key) 77 lockdep_set_class(&hash->list_locks[i], key); 71 batadv_hash_set_lock_class(struct batadv_hashtable *hash, struct lock_class_key *key) argument
|
H A D | originator.h | 50 const unsigned char *key = data; local 55 hash += key[i];
|
H A D | hash.h | 32 * based on the key in the data of the first 47 /* set class key for all locks */ 49 struct lock_class_key *key); 95 const unsigned char *key = data; local 99 hash += key[i]; 159 * structure you use with just the key filled, we just need the key for
|
/net/mac80211/ |
H A D | debugfs_key.h | 5 void ieee80211_debugfs_key_add(struct ieee80211_key *key); 6 void ieee80211_debugfs_key_remove(struct ieee80211_key *key); 12 void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, 15 static inline void ieee80211_debugfs_key_add(struct ieee80211_key *key) argument 17 static inline void ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument 28 static inline void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, argument
|
H A D | michael.c | 30 static void michael_mic_hdr(struct michael_mic_ctx *mctx, const u8 *key, argument 42 mctx->l = get_unaligned_le32(key); 43 mctx->r = get_unaligned_le32(key + 4); 56 void michael_mic(const u8 *key, struct ieee80211_hdr *hdr, argument 63 michael_mic_hdr(&mctx, key, hdr);
|
H A D | aes_ccm.c | 17 #include "key.h" 135 struct crypto_cipher *ieee80211_aes_key_setup_encrypt(const u8 key[]) argument 141 crypto_cipher_setkey(tfm, key, ALG_CCMP_KEY_LEN);
|
H A D | aes_cmac.c | 18 #include "key.h" 114 struct crypto_cipher * ieee80211_aes_cmac_key_setup(const u8 key[]) argument 120 crypto_cipher_setkey(tfm, key, AES_CMAC_KEY_LEN); 135 struct ieee80211_key *key = local 138 crypto_cipher_encrypt_one(key->u.aes_cmac.tfm, l, l);
|
/net/sched/ |
H A D | em_u32.c | 24 struct tc_u32_key *key = (struct tc_u32_key *) em->data; local 30 ptr += (info->nexthdr & key->offmask); 33 ptr += key->off; 38 return !(((*(__be32 *) ptr) ^ key->val) & key->mask);
|
/net/ipv4/ |
H A D | tcp_fastopen.c | 25 int tcp_fastopen_reset_cipher(void *key, unsigned int len) argument 41 err = crypto_cipher_setkey(ctx->tfm, key, len); 43 pr_err("TCP: TFO cipher key error: %d\n", err); 47 memcpy(ctx->key, key, len); 85 __u8 key[TCP_FASTOPEN_KEY_LENGTH]; local 87 get_random_bytes(key, sizeof(key)); 88 tcp_fastopen_reset_cipher(key, sizeof(key)); [all...] |
H A D | tcp_minisocks.c | 309 * The timewait bucket does not have the key DB from the 311 * md5 key being used (if indeed we are using one) 312 * so the timewait ack generating code has the key. 315 struct tcp_md5sig_key *key; local 317 key = tp->af_specific->md5_lookup(sk, sk); 318 if (key != NULL) { 319 tcptw->tw_md5_key = kmemdup(key, sizeof(*key), GFP_ATOMIC);
|
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_seqnum.c | 76 struct crypto_blkcipher *key, 97 return krb5_encrypt(key, cksum, plain, buf, 8); 145 struct crypto_blkcipher *key = kctx->seq; local 153 if ((code = krb5_decrypt(key, cksum, buf, plain, 8))) 75 krb5_make_seq_num(struct krb5_ctx *kctx, struct crypto_blkcipher *key, int direction, u32 seqnum, unsigned char *cksum, unsigned char *buf) argument
|
H A D | gss_krb5_keys.c | 206 /* loop encrypting the blocks until enough key bytes are generated */ 223 /* postprocess the key */ 259 static void mit_des_fixup_key_parity(u8 key[8]) argument 263 key[i] &= 0xfe; 264 key[i] |= 1^parity_char(key[i]); 269 * This is the des3 key derivation postprocess function 273 struct xdr_netobj *key) 278 if (key->len != 24) { 279 dprintk("%s: key 271 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument 311 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument [all...] |
/net/tipc/ |
H A D | name_table.h | 58 * @key: publication key 75 u32 key; member in struct:publication 92 u32 scope, u32 port_ref, u32 key); 93 int tipc_nametbl_withdraw(u32 type, u32 lower, u32 ref, u32 key); 95 u32 scope, u32 node, u32 ref, u32 key); 97 u32 node, u32 ref, u32 key);
|
/net/ipv4/netfilter/ |
H A D | nf_nat_proto_gre.c | 9 * It has an optional key field, which may help us distinguishing two 15 * field called "CallID", which serves us for the same purpose as the key 48 static u_int16_t key; local 58 keyptr = &tuple->src.u.gre.key; 60 keyptr = &tuple->dst.u.gre.key; 67 min = ntohs(range->min_proto.gre.key); 68 range_size = ntohs(range->max_proto.gre.key) - min + 1; 73 for (i = 0; ; ++key) { 74 *keyptr = htons(min + key % range_size); 102 /* we only have destination manip of a packet, since 'source key' [all...] |
/net/rxrpc/ |
H A D | ar-security.c | 128 struct key *key = conn->key; local 131 _enter("{%d},{%x}", conn->debug_id, key_serial(key)); 133 if (!key) 136 ret = key_validate(key); 140 if (!key->payload.data) 142 token = key->payload.data; 168 struct key *key; local [all...] |
/net/bridge/netfilter/ |
H A D | ebt_among.c | 29 int key = ((const unsigned char *)mac)[5]; local 32 start = wh->table[key]; 33 limit = wh->table[key + 1];
|
/net/dns_resolver/ |
H A D | dns_key.c | 50 * Instantiate a user defined key for dns_resolver. 56 * one to be an option of the form 'key=value'. The actual data of interest is 62 dns_resolver_instantiate(struct key *key, struct key_preparsed_payload *prep) argument 71 key->serial, key->description, 99 "Empty option to dns_resolver key %d\n", 100 key->serial); 114 * that's to be recorded as the result in this key */ 129 key 176 dns_resolver_match(const struct key *key, const void *description) argument 210 dns_resolver_describe(const struct key *key, struct seq_file *m) argument 227 dns_resolver_read(const struct key *key, char __user *buffer, size_t buflen) argument [all...] |
/net/openvswitch/ |
H A D | datapath.h | 100 * @key: Becomes %OVS_PACKET_ATTR_KEY. Must be nonnull. 109 const struct sw_flow_key *key; member in struct:dp_upcall_info
|
/net/wireless/ |
H A D | lib80211_crypt_wep.c | 35 u8 key[WEP_KEY_LEN + 1]; member in struct:lib80211_wep_data 90 /* Add WEP IV/key info to a frame that has at least 4 bytes of headroom */ 92 u8 *key, int keylen, void *priv) 109 /* Fluhrer, Mantin, and Shamir have reported weaknesses in the key 118 /* Prepend 24-bit IV to RC4 key and TX frame */ 131 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data)) 140 u8 key[WEP_KEY_LEN + 3]; local 150 /* Copy the IV into the first 3 bytes of the key */ 151 skb_copy_from_linear_data_offset(skb, hdr_len, key, 3); 153 /* Copy rest of the WEP key (th 91 lib80211_wep_build_iv(struct sk_buff *skb, int hdr_len, u8 *key, int keylen, void *priv) argument 185 u8 key[WEP_KEY_LEN + 3]; local 231 lib80211_wep_set_key(void *key, int len, u8 * seq, void *priv) argument 244 lib80211_wep_get_key(void *key, int len, u8 * seq, void *priv) argument [all...] |
/net/bluetooth/ |
H A D | amp.c | 132 /* AMP crypto key generation interface */ 133 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) argument 147 ret = crypto_shash_setkey(tfm, key, ksize); 170 struct link_key *key; local 180 /* Legacy key */ 182 BT_ERR("Legacy key type %d", conn->key_type); 189 key = hci_find_link_key(hdev, &conn->dst); 190 if (!key) { 191 BT_DBG("No Link key for conn %p dst %pMR", conn, &conn->dst); 196 memcpy(&keybuf[0], key [all...] |
/net/core/ |
H A D | datagram.c | 69 void *key) 71 unsigned long bits = (unsigned long)key; 78 return autoremove_wake_function(wait, mode, sync, key); 68 receiver_wake_function(wait_queue_t *wait, unsigned int mode, int sync, void *key) argument
|