/net/ceph/ |
H A D | auth_x_protocol.h | 45 __le32 keys; member in struct:ceph_x_service_ticket_request
|
/net/ethernet/ |
H A D | eth.c | 159 struct flow_keys keys; local 166 if (!__skb_flow_dissect(NULL, &keys, data, 168 return max_t(u32, keys.thoff, sizeof(*eth)); 171 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len);
|
/net/sched/ |
H A D | act_pedit.c | 40 struct tc_pedit_key *keys = NULL; local 64 keys = kmalloc(ksize, GFP_KERNEL); 65 if (keys == NULL) { 79 keys = kmalloc(ksize, GFP_KERNEL); 80 if (keys == NULL) 88 if (keys) { 90 p->tcfp_keys = keys; 93 memcpy(p->tcfp_keys, parm->keys, ksize); 103 struct tc_pedit_key *keys = p->tcfp_keys; local 104 kfree(keys); [all...] |
H A D | cls_flow.c | 290 u32 keys[FLOW_KEY_MAX + 1]; local 303 keys[n] = flow_key_get(skb, key, &flow_keys); 307 classid = jhash2(keys, f->nkeys, f->hashrnd); 309 classid = keys[0];
|
H A D | sch_choke.c | 145 u8 keys[QDISC_CB_PRIV_LEN - 3]; member in struct:choke_skb_cb 180 memcpy(&choke_skb_cb(skb1)->keys, &temp, CHOKE_K_LEN); 186 memcpy(&choke_skb_cb(skb2)->keys, &temp, CHOKE_K_LEN); 189 return !memcmp(&choke_skb_cb(skb1)->keys, 190 &choke_skb_cb(skb2)->keys,
|
H A D | sch_fq_codel.c | 73 struct flow_keys keys; local 76 skb_flow_dissect(skb, &keys); 77 hash = jhash_3words((__force u32)keys.dst, 78 (__force u32)keys.src ^ keys.ip_proto, 79 (__force u32)keys.ports, q->perturbation);
|
H A D | sch_hhf.c | 182 struct flow_keys keys; local 188 skb_flow_dissect(skb, &keys); 189 hash = jhash_3words((__force u32)keys.dst, 190 (__force u32)keys.src ^ keys.ip_proto, 191 (__force u32)keys.ports, q->perturbation);
|
H A D | sch_sfb.c | 290 struct flow_keys keys; local 315 keys.src = salt; 316 keys.dst = 0; 317 keys.ports = 0; 319 skb_flow_dissect(skb, &keys); 324 sfbhash = jhash_3words((__force u32)keys.dst, 325 (__force u32)keys.src, 326 (__force u32)keys.ports, 359 sfbhash = jhash_3words((__force u32)keys.dst, 360 (__force u32)keys [all...] |
H A D | sch_sfq.c | 164 struct flow_keys keys; member in struct:sfq_skb_cb 176 const struct flow_keys *keys = &sfq_skb_cb(skb)->keys; local 179 hash = jhash_3words((__force u32)keys->dst, 180 (__force u32)keys->src ^ keys->ip_proto, 181 (__force u32)keys->ports, q->perturbation); 200 skb_flow_dissect(skb, &sfq_skb_cb(skb)->keys);
|
/net/sctp/ |
H A D | objcnt.c | 56 SCTP_DBG_OBJCNT(keys); variable 72 SCTP_DBG_OBJCNT_ENTRY(keys),
|
H A D | auth.c | 68 SCTP_DBG_OBJCNT_DEC(keys); 88 SCTP_DBG_OBJCNT_INC(keys); 121 void sctp_auth_destroy_keys(struct list_head *keys) argument 126 if (list_empty(keys)) 129 key_for_each_safe(ep_key, tmp, keys) { 183 * computation of keys. Parameters which were not sent are simply 249 * From the endpoint pair shared keys and the key vectors the 250 * association shared keys are computed. This is performed by selecting 310 * computation of keys. Parameters which were not sent are simply 424 /* First search associations set of endpoint pair shared keys */ [all...] |
/net/core/ |
H A D | flow_dissector.c | 262 static inline u32 __flow_hash_from_keys(struct flow_keys *keys) argument 267 if (((__force u32)keys->dst < (__force u32)keys->src) || 268 (((__force u32)keys->dst == (__force u32)keys->src) && 269 ((__force u16)keys->port16[1] < (__force u16)keys->port16[0]))) { 270 swap(keys->dst, keys->src); 271 swap(keys 283 flow_hash_from_keys(struct flow_keys *keys) argument 297 struct flow_keys keys; local 339 __skb_get_poff(const struct sk_buff *skb, void *data, const struct flow_keys *keys, int hlen) argument 392 struct flow_keys keys; local [all...] |
/net/mac80211/ |
H A D | key.c | 33 * keys and per-station keys. Since each station belongs to an interface, 69 * 2. SKB resize was skipped because all the keys were hw planted but 205 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); 235 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); 300 rcu_assign_pointer(sdata->keys[idx], new); 495 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); 588 struct list_head *keys) 602 list_add_tail(&key->list, keys); 614 LIST_HEAD(keys); 587 ieee80211_free_keys_iface(struct ieee80211_sub_if_data *sdata, struct list_head *keys) argument [all...] |
H A D | ieee80211_i.h | 752 /* keys */ 755 /* count for keys needing tailroom space allocation */ 781 struct ieee80211_key __rcu *keys[NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS]; member in struct:ieee80211_sub_if_data 1288 struct dentry *keys; member in struct:ieee80211_local::local_debugfsdentries
|
/net/bluetooth/hidp/ |
H A D | hidp.h | 171 unsigned char keys[8]; member in struct:hidp_session
|
H A D | core.c | 174 unsigned char *keys = session->keys; local 185 * too many keys were pressed at the same time. */ 190 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { 191 if (hidp_keycode[keys[i]]) 192 input_report_key(dev, hidp_keycode[keys[i]], 0); 194 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); 197 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys [all...] |
/net/wireless/ |
H A D | nl80211.c | 814 struct nlattr *keys, bool *no_ht) 828 nla_for_each_nested(key, keys, rem) { 813 nl80211_parse_connkeys(struct cfg80211_registered_device *rdev, struct nlattr *keys, bool *no_ht) argument
|