/net/ceph/ |
H A D | auth_x_protocol.h | 45 __le32 keys; member in struct:ceph_x_service_ticket_request
|
/net/sctp/ |
H A D | objcnt.c | 63 SCTP_DBG_OBJCNT(keys); variable 79 SCTP_DBG_OBJCNT_ENTRY(keys),
|
H A D | auth.c | 75 SCTP_DBG_OBJCNT_DEC(keys); 95 SCTP_DBG_OBJCNT_INC(keys); 128 void sctp_auth_destroy_keys(struct list_head *keys) argument 133 if (list_empty(keys)) 136 key_for_each_safe(ep_key, tmp, keys) { 190 * computation of keys. Parameters which were not sent are simply 256 * From the endpoint pair shared keys and the key vectors the 257 * association shared keys are computed. This is performed by selecting 317 * computation of keys. Parameters which were not sent are simply 432 /* First search associations set of endpoint pair shared keys */ [all...] |
/net/core/ |
H A D | flow_dissector.c | 174 struct flow_keys keys; local 177 if (!skb_flow_dissect(skb, &keys)) 180 if (keys.ports) 184 if (((__force u32)keys.dst < (__force u32)keys.src) || 185 (((__force u32)keys.dst == (__force u32)keys.src) && 186 ((__force u16)keys.port16[1] < (__force u16)keys.port16[0]))) { 187 swap(keys 242 struct flow_keys keys; local [all...] |
/net/sched/ |
H A D | act_pedit.c | 50 struct tc_pedit_key *keys = NULL; local 76 keys = kmalloc(ksize, GFP_KERNEL); 77 if (keys == NULL) { 92 keys = kmalloc(ksize, GFP_KERNEL); 93 if (keys == NULL) 101 if (keys) { 103 p->tcfp_keys = keys; 106 memcpy(p->tcfp_keys, parm->keys, ksize); 118 struct tc_pedit_key *keys = p->tcfp_keys; local 120 kfree(keys); [all...] |
H A D | cls_flow.c | 292 u32 keys[FLOW_KEY_MAX + 1]; local 305 keys[n] = flow_key_get(skb, key, &flow_keys); 309 classid = jhash2(keys, f->nkeys, f->hashrnd); 311 classid = keys[0];
|
H A D | sch_choke.c | 146 struct flow_keys keys; member in struct:choke_skb_cb 178 skb_flow_dissect(skb1, &choke_skb_cb(skb1)->keys); 183 skb_flow_dissect(skb2, &choke_skb_cb(skb2)->keys); 186 return !memcmp(&choke_skb_cb(skb1)->keys, 187 &choke_skb_cb(skb2)->keys,
|
H A D | sch_fq_codel.c | 73 struct flow_keys keys; local 76 skb_flow_dissect(skb, &keys); 77 hash = jhash_3words((__force u32)keys.dst, 78 (__force u32)keys.src ^ keys.ip_proto, 79 (__force u32)keys.ports, q->perturbation);
|
H A D | sch_sfb.c | 289 struct flow_keys keys; local 313 keys.src = salt; 314 keys.dst = 0; 315 keys.ports = 0; 317 skb_flow_dissect(skb, &keys); 322 sfbhash = jhash_3words((__force u32)keys.dst, 323 (__force u32)keys.src, 324 (__force u32)keys.ports, 357 sfbhash = jhash_3words((__force u32)keys.dst, 358 (__force u32)keys [all...] |
H A D | sch_sfq.c | 164 struct flow_keys keys; member in struct:sfq_skb_cb 176 const struct flow_keys *keys = &sfq_skb_cb(skb)->keys; local 179 hash = jhash_3words((__force u32)keys->dst, 180 (__force u32)keys->src ^ keys->ip_proto, 181 (__force u32)keys->ports, q->perturbation); 198 skb_flow_dissect(skb, &sfq_skb_cb(skb)->keys);
|
/net/bluetooth/hidp/ |
H A D | core.c | 180 unsigned char *keys = session->keys; local 191 * too many keys were pressed at the same time. */ 196 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { 197 if (hidp_keycode[keys[i]]) 198 input_report_key(dev, hidp_keycode[keys[i]], 0); 200 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); 203 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys [all...] |
H A D | hidp.h | 168 unsigned char keys[8]; member in struct:hidp_session
|
/net/mac80211/ |
H A D | ieee80211_i.h | 680 /* keys */ 683 /* count for keys needing tailroom space allocation */ 709 struct ieee80211_key __rcu *keys[NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS]; member in struct:ieee80211_sub_if_data 1116 struct dentry *keys; member in struct:ieee80211_local::local_debugfsdentries
|
/net/wireless/ |
H A D | nl80211.c | 780 struct nlattr *keys, bool *no_ht) 794 nla_for_each_nested(key, keys, rem) { 779 nl80211_parse_connkeys(struct cfg80211_registered_device *rdev, struct nlattr *keys, bool *no_ht) argument
|