Searched refs:key (Results 101 - 125 of 151) sorted by relevance

1234567

/net/ipv4/
H A Dcipso_ipv4.c77 unsigned char *key; member in struct:cipso_v4_map_cache_entry
218 kfree(entry->key);
224 * @key: the hash key
225 * @key_len: the length of the key in bytes
231 static u32 cipso_v4_map_cache_hash(const unsigned char *key, u32 key_len) argument
233 return jhash(key, key_len, 0);
296 * @key: the buffer to check
302 * the given key. If there is a match then the cache is adjusted and the
316 static int cipso_v4_cache_check(const unsigned char *key, argument
[all...]
H A Dinet_fragment.c416 struct inet_frags *f, void *key,
431 if (q->net == nf && f->match(q, key)) {
441 return inet_frag_create(nf, f, key);
415 inet_frag_find(struct netns_frags *nf, struct inet_frags *f, void *key, unsigned int hash) argument
H A Desp4.c547 char *key; local
583 key = kmalloc(keylen, GFP_KERNEL);
584 if (!key)
587 p = key;
622 err = crypto_aead_setkey(aead, key, keylen);
625 kfree(key);
H A Dip_gre.c132 Moreover, Cisco "wise men" put GRE key to the third word
183 iph->daddr, iph->saddr, tpi->key);
217 iph->saddr, iph->daddr, tpi->key);
236 tpi.key = tunnel->parms.o_key;
/net/netfilter/
H A Dnf_conntrack_pptp.c187 t.src.u.gre.key = ct_pptp_info->pns_call_id;
188 t.dst.u.gre.key = ct_pptp_info->pac_call_id;
195 t.src.u.gre.key = ct_pptp_info->pac_call_id;
196 t.dst.u.gre.key = ct_pptp_info->pns_call_id;
/net/rxrpc/
H A Dar-proc.c166 key_serial(conn->key),
/net/ipv6/
H A Dip6_fib.c168 * Initialize table lock at a single place to give lockdep a key,
428 struct rt6key *key; local
439 key = (struct rt6key *)((u8 *)fn->leaf + offset);
445 !ipv6_prefix_equal(&key->addr, addr, fn->fn_bit)) {
538 bit = __ipv6_addr_diff(addr, &key->addr, sizeof(*addr));
617 if (addr_bit_set(&key->addr, plen))
988 int offset; /* key offset on rt6_info */
989 const struct in6_addr *addr; /* search key */
1023 struct rt6key *key; local
1025 key
1095 struct rt6key *key = (struct rt6key *)((u8 *)fn->leaf + offset); local
[all...]
/net/sched/
H A Dcls_flow.c224 static u32 flow_key_get(struct sk_buff *skb, int key, struct flow_keys *flow) argument
226 switch (key) {
286 unsigned int n, key; local
301 key = ffs(keymask) - 1;
302 keymask &= ~(1 << key);
303 keys[n] = flow_key_get(skb, key, &flow_keys);
/net/wireless/
H A Dnl80211.c42 .name = NL80211_GENL_NAME, /* have users key off the name instead */
400 /* policy for the key attributes */
412 /* policy for the key default flags */
667 static int nl80211_parse_key_new(struct nlattr *key, struct key_parse *k) argument
670 int err = nla_parse_nested(tb, NL80211_KEY_MAX, key,
689 k->p.key = nla_data(tb[NL80211_KEY_DATA]);
725 k->p.key = nla_data(info->attrs[NL80211_ATTR_KEY_DATA]);
817 struct nlattr *key; local
828 nla_for_each_nested(key, keys, rem) {
832 err = nl80211_parse_key_new(key,
2732 struct nlattr *key; local
2853 struct key_parse key; local
2924 struct key_parse key; local
2974 struct key_parse key; local
6365 struct key_parse key; local
[all...]
H A Dmlme.c205 const u8 *key, int key_len, int key_idx,
215 .key = key,
224 if (!key || !key_len || key_idx < 0 || key_idx > 4)
198 cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, struct net_device *dev, struct ieee80211_channel *chan, enum nl80211_auth_type auth_type, const u8 *bssid, const u8 *ssid, int ssid_len, const u8 *ie, int ie_len, const u8 *key, int key_len, int key_idx, const u8 *sae_data, int sae_data_len) argument
H A Dwext-compat.c450 wdev->wext.keys->params[i].key =
474 * If removing the current TX key, we will need to
531 params->key, params->key_len);
532 wdev->wext.keys->params[idx].key =
541 * If we are getting a new TX key from not having
620 /* No key data - just set the default TX key index */
633 params.key = keybuf;
721 params.key = ext->key;
[all...]
H A Dsme.c160 params->key, params->key_len,
934 /* If given a WEP key we may need it for shared key auth */
938 connect->key = connkeys->params[idx].key;
/net/ceph/
H A Dauth_x.c443 auth->key = 0;
445 auth->key ^= *(__le64 *)u;
446 dout(" server_challenge %llx client_challenge %llx key %llx\n",
448 le64_to_cpu(auth->key));
513 /* verify auth key */
695 if (!ac->key) {
700 ret = ceph_crypto_key_clone(&xi->secret, ac->key);
702 pr_err("cannot clone key: %d\n", ret);
/net/core/
H A Ddatagram.c71 void *key)
73 unsigned long bits = (unsigned long)key;
80 return autoremove_wake_function(wait, mode, sync, key);
70 receiver_wake_function(wait_queue_t *wait, unsigned int mode, int sync, void *key) argument
/net/mac802154/
H A Dwpan.c541 u64 key; local
547 pr_debug("implicit key\n");
551 pr_debug("key %02x\n", hdr->sec.key_id);
555 pr_debug("key %04x:%04x %02x\n",
562 key = swab64((__force u64) hdr->sec.extended_src);
563 pr_debug("key source %8phC %02x\n", &key,
/net/netlabel/
H A Dnetlabel_domainhash.c115 static u32 netlbl_domhsh_hash(const char *key) argument
124 for (iter = 0, val = 0, len = strlen(key); iter < len; iter++)
125 val = (val << 4 | (val >> (8 * sizeof(u32) - 4))) ^ key[iter];
/net/sunrpc/xprtrdma/
H A Dsvc_rdma_recvfrom.c245 u8 key; local
301 /* Bump the key */
302 key = (u8)(frmr->mr->lkey & 0x000000FF);
303 ib_update_fast_reg_key(frmr->mr, ++key);
/net/bluetooth/
H A Dhci_event.c2428 /* P-256 authentication key implies FIPS */
2461 * using a P-256 authenticated combination key.
3156 struct link_key *key; local
3165 key = hci_find_link_key(hdev, &ev->bdaddr);
3166 if (!key) {
3167 BT_DBG("%s link key not found for %pMR", hdev->name,
3172 BT_DBG("%s found key type %u for %pMR", hdev->name, key->type,
3177 if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 ||
3178 key
3214 struct link_key *key; local
[all...]
H A Dsmp.c98 /* The most significant octet of key corresponds to k[0] */
465 /* Initialize key for JUST WORKS */
657 /* When receiving an indentity resolving key for
659 * private address, just remove the key so that
664 * this key at this point. So it is safe to
803 /* Generate a new random key */
1046 /* Update remote key distribution in case the remote cleared
1112 struct smp_ltk *key; local
1115 key = hci_find_ltk_by_addr(hcon->hdev, &hcon->dst, hcon->dst_type,
1117 if (!key)
[all...]
/net/bridge/netfilter/
H A DKconfig15 Add support for bridge dedicated meta key.
/net/batman-adv/
H A Dnetwork-coding.c432 * batadv_nc_hash_key_gen - computes the nc_path hash key
433 * @key: buffer to hold the final hash key
434 * @src: source ethernet mac address going into the hash key
435 * @dst: destination ethernet mac address going into the hash key
437 static void batadv_nc_hash_key_gen(struct batadv_nc_path *key, const char *src, argument
440 memcpy(key->prev_hop, src, sizeof(key->prev_hop));
441 memcpy(key->next_hop, dst, sizeof(key
[all...]
/net/mac80211/
H A Dtrace.h516 struct ieee80211_key_conf *key),
518 TP_ARGS(local, cmd, sdata, sta, key),
534 __entry->cipher = key->cipher;
535 __entry->flags = key->flags;
536 __entry->keyidx = key->keyidx;
537 __entry->hw_key_idx = key->hw_key_idx;
H A Dieee80211_i.h32 #include "key.h"
157 struct ieee80211_key *key; member in struct:ieee80211_tx_data
210 struct ieee80211_key *key; member in struct:ieee80211_rx_data
367 u8 key[WLAN_KEY_LEN_WEP104]; member in struct:ieee80211_mgd_auth_data
1173 * key pointers (write access, they're RCU.)
1802 const u8 *da, const u8 *key, u8 key_len, u8 key_idx,
/net/netfilter/ipvs/
H A Dip_vs_conn.c97 static inline void ct_write_lock_bh(unsigned int key) argument
99 spin_lock_bh(&__ip_vs_conntbl_lock_array[key&CT_LOCKARRAY_MASK].l);
102 static inline void ct_write_unlock_bh(unsigned int key) argument
104 spin_unlock_bh(&__ip_vs_conntbl_lock_array[key&CT_LOCKARRAY_MASK].l);
/net/rds/
H A Drdma.c66 static struct rds_mr *rds_mr_tree_walk(struct rb_root *root, u64 key, argument
77 if (key < mr->r_key)
79 else if (key > mr->r_key)
102 rdsdebug("RDS: destroy mr key is %x refcnt %u\n",
277 rdsdebug("RDS: get_mr put_user key is %x cookie_addr %p\n",
301 rdsdebug("RDS: get_mr key is %x\n", mr->r_key);

Completed in 1111 milliseconds

1234567