Searched defs:keys (Results 1 - 14 of 14) sorted by relevance

/net/ceph/
H A Dauth_x_protocol.h45 __le32 keys; member in struct:ceph_x_service_ticket_request
/net/sctp/
H A Dobjcnt.c63 SCTP_DBG_OBJCNT(keys); variable
79 SCTP_DBG_OBJCNT_ENTRY(keys),
H A Dauth.c75 SCTP_DBG_OBJCNT_DEC(keys);
95 SCTP_DBG_OBJCNT_INC(keys);
128 void sctp_auth_destroy_keys(struct list_head *keys) argument
133 if (list_empty(keys))
136 key_for_each_safe(ep_key, tmp, keys) {
190 * computation of keys. Parameters which were not sent are simply
256 * From the endpoint pair shared keys and the key vectors the
257 * association shared keys are computed. This is performed by selecting
317 * computation of keys. Parameters which were not sent are simply
432 /* First search associations set of endpoint pair shared keys */
[all...]
/net/core/
H A Dflow_dissector.c174 struct flow_keys keys; local
177 if (!skb_flow_dissect(skb, &keys))
180 if (keys.ports)
184 if (((__force u32)keys.dst < (__force u32)keys.src) ||
185 (((__force u32)keys.dst == (__force u32)keys.src) &&
186 ((__force u16)keys.port16[1] < (__force u16)keys.port16[0]))) {
187 swap(keys
242 struct flow_keys keys; local
[all...]
/net/sched/
H A Dact_pedit.c50 struct tc_pedit_key *keys = NULL; local
76 keys = kmalloc(ksize, GFP_KERNEL);
77 if (keys == NULL) {
92 keys = kmalloc(ksize, GFP_KERNEL);
93 if (keys == NULL)
101 if (keys) {
103 p->tcfp_keys = keys;
106 memcpy(p->tcfp_keys, parm->keys, ksize);
118 struct tc_pedit_key *keys = p->tcfp_keys; local
120 kfree(keys);
[all...]
H A Dcls_flow.c292 u32 keys[FLOW_KEY_MAX + 1]; local
305 keys[n] = flow_key_get(skb, key, &flow_keys);
309 classid = jhash2(keys, f->nkeys, f->hashrnd);
311 classid = keys[0];
H A Dsch_choke.c146 struct flow_keys keys; member in struct:choke_skb_cb
178 skb_flow_dissect(skb1, &choke_skb_cb(skb1)->keys);
183 skb_flow_dissect(skb2, &choke_skb_cb(skb2)->keys);
186 return !memcmp(&choke_skb_cb(skb1)->keys,
187 &choke_skb_cb(skb2)->keys,
H A Dsch_fq_codel.c73 struct flow_keys keys; local
76 skb_flow_dissect(skb, &keys);
77 hash = jhash_3words((__force u32)keys.dst,
78 (__force u32)keys.src ^ keys.ip_proto,
79 (__force u32)keys.ports, q->perturbation);
H A Dsch_sfb.c289 struct flow_keys keys; local
313 keys.src = salt;
314 keys.dst = 0;
315 keys.ports = 0;
317 skb_flow_dissect(skb, &keys);
322 sfbhash = jhash_3words((__force u32)keys.dst,
323 (__force u32)keys.src,
324 (__force u32)keys.ports,
357 sfbhash = jhash_3words((__force u32)keys.dst,
358 (__force u32)keys
[all...]
H A Dsch_sfq.c164 struct flow_keys keys; member in struct:sfq_skb_cb
176 const struct flow_keys *keys = &sfq_skb_cb(skb)->keys; local
179 hash = jhash_3words((__force u32)keys->dst,
180 (__force u32)keys->src ^ keys->ip_proto,
181 (__force u32)keys->ports, q->perturbation);
198 skb_flow_dissect(skb, &sfq_skb_cb(skb)->keys);
/net/bluetooth/hidp/
H A Dcore.c180 unsigned char *keys = session->keys; local
191 * too many keys were pressed at the same time. */
196 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) {
197 if (hidp_keycode[keys[i]])
198 input_report_key(dev, hidp_keycode[keys[i]], 0);
200 BT_ERR("Unknown key (scancode %#x) released.", keys[i]);
203 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys
[all...]
H A Dhidp.h168 unsigned char keys[8]; member in struct:hidp_session
/net/mac80211/
H A Dieee80211_i.h680 /* keys */
683 /* count for keys needing tailroom space allocation */
709 struct ieee80211_key __rcu *keys[NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS]; member in struct:ieee80211_sub_if_data
1116 struct dentry *keys; member in struct:ieee80211_local::local_debugfsdentries
/net/wireless/
H A Dnl80211.c780 struct nlattr *keys, bool *no_ht)
794 nla_for_each_nested(key, keys, rem) {
779 nl80211_parse_connkeys(struct cfg80211_registered_device *rdev, struct nlattr *keys, bool *no_ht) argument

Completed in 191 milliseconds