/net/ipv4/ |
H A D | cipso_ipv4.c | 77 unsigned char *key; member in struct:cipso_v4_map_cache_entry 218 kfree(entry->key); 224 * @key: the hash key 225 * @key_len: the length of the key in bytes 231 static u32 cipso_v4_map_cache_hash(const unsigned char *key, u32 key_len) argument 233 return jhash(key, key_len, 0); 296 * @key: the buffer to check 302 * the given key. If there is a match then the cache is adjusted and the 316 static int cipso_v4_cache_check(const unsigned char *key, argument [all...] |
H A D | inet_fragment.c | 416 struct inet_frags *f, void *key, 431 if (q->net == nf && f->match(q, key)) { 441 return inet_frag_create(nf, f, key); 415 inet_frag_find(struct netns_frags *nf, struct inet_frags *f, void *key, unsigned int hash) argument
|
H A D | esp4.c | 547 char *key; local 583 key = kmalloc(keylen, GFP_KERNEL); 584 if (!key) 587 p = key; 622 err = crypto_aead_setkey(aead, key, keylen); 625 kfree(key);
|
H A D | ip_gre.c | 132 Moreover, Cisco "wise men" put GRE key to the third word 183 iph->daddr, iph->saddr, tpi->key); 217 iph->saddr, iph->daddr, tpi->key); 236 tpi.key = tunnel->parms.o_key;
|
/net/netfilter/ |
H A D | nf_conntrack_pptp.c | 187 t.src.u.gre.key = ct_pptp_info->pns_call_id; 188 t.dst.u.gre.key = ct_pptp_info->pac_call_id; 195 t.src.u.gre.key = ct_pptp_info->pac_call_id; 196 t.dst.u.gre.key = ct_pptp_info->pns_call_id;
|
/net/rxrpc/ |
H A D | ar-proc.c | 166 key_serial(conn->key),
|
/net/ipv6/ |
H A D | ip6_fib.c | 168 * Initialize table lock at a single place to give lockdep a key, 428 struct rt6key *key; local 439 key = (struct rt6key *)((u8 *)fn->leaf + offset); 445 !ipv6_prefix_equal(&key->addr, addr, fn->fn_bit)) { 538 bit = __ipv6_addr_diff(addr, &key->addr, sizeof(*addr)); 617 if (addr_bit_set(&key->addr, plen)) 988 int offset; /* key offset on rt6_info */ 989 const struct in6_addr *addr; /* search key */ 1023 struct rt6key *key; local 1025 key 1095 struct rt6key *key = (struct rt6key *)((u8 *)fn->leaf + offset); local [all...] |
/net/sched/ |
H A D | cls_flow.c | 224 static u32 flow_key_get(struct sk_buff *skb, int key, struct flow_keys *flow) argument 226 switch (key) { 286 unsigned int n, key; local 301 key = ffs(keymask) - 1; 302 keymask &= ~(1 << key); 303 keys[n] = flow_key_get(skb, key, &flow_keys);
|
/net/wireless/ |
H A D | nl80211.c | 42 .name = NL80211_GENL_NAME, /* have users key off the name instead */ 400 /* policy for the key attributes */ 412 /* policy for the key default flags */ 667 static int nl80211_parse_key_new(struct nlattr *key, struct key_parse *k) argument 670 int err = nla_parse_nested(tb, NL80211_KEY_MAX, key, 689 k->p.key = nla_data(tb[NL80211_KEY_DATA]); 725 k->p.key = nla_data(info->attrs[NL80211_ATTR_KEY_DATA]); 817 struct nlattr *key; local 828 nla_for_each_nested(key, keys, rem) { 832 err = nl80211_parse_key_new(key, 2732 struct nlattr *key; local 2853 struct key_parse key; local 2924 struct key_parse key; local 2974 struct key_parse key; local 6365 struct key_parse key; local [all...] |
H A D | mlme.c | 205 const u8 *key, int key_len, int key_idx, 215 .key = key, 224 if (!key || !key_len || key_idx < 0 || key_idx > 4) 198 cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, struct net_device *dev, struct ieee80211_channel *chan, enum nl80211_auth_type auth_type, const u8 *bssid, const u8 *ssid, int ssid_len, const u8 *ie, int ie_len, const u8 *key, int key_len, int key_idx, const u8 *sae_data, int sae_data_len) argument
|
H A D | wext-compat.c | 450 wdev->wext.keys->params[i].key = 474 * If removing the current TX key, we will need to 531 params->key, params->key_len); 532 wdev->wext.keys->params[idx].key = 541 * If we are getting a new TX key from not having 620 /* No key data - just set the default TX key index */ 633 params.key = keybuf; 721 params.key = ext->key; [all...] |
H A D | sme.c | 160 params->key, params->key_len, 934 /* If given a WEP key we may need it for shared key auth */ 938 connect->key = connkeys->params[idx].key;
|
/net/ceph/ |
H A D | auth_x.c | 443 auth->key = 0; 445 auth->key ^= *(__le64 *)u; 446 dout(" server_challenge %llx client_challenge %llx key %llx\n", 448 le64_to_cpu(auth->key)); 513 /* verify auth key */ 695 if (!ac->key) { 700 ret = ceph_crypto_key_clone(&xi->secret, ac->key); 702 pr_err("cannot clone key: %d\n", ret);
|
/net/core/ |
H A D | datagram.c | 71 void *key) 73 unsigned long bits = (unsigned long)key; 80 return autoremove_wake_function(wait, mode, sync, key); 70 receiver_wake_function(wait_queue_t *wait, unsigned int mode, int sync, void *key) argument
|
/net/mac802154/ |
H A D | wpan.c | 541 u64 key; local 547 pr_debug("implicit key\n"); 551 pr_debug("key %02x\n", hdr->sec.key_id); 555 pr_debug("key %04x:%04x %02x\n", 562 key = swab64((__force u64) hdr->sec.extended_src); 563 pr_debug("key source %8phC %02x\n", &key,
|
/net/netlabel/ |
H A D | netlabel_domainhash.c | 115 static u32 netlbl_domhsh_hash(const char *key) argument 124 for (iter = 0, val = 0, len = strlen(key); iter < len; iter++) 125 val = (val << 4 | (val >> (8 * sizeof(u32) - 4))) ^ key[iter];
|
/net/sunrpc/xprtrdma/ |
H A D | svc_rdma_recvfrom.c | 245 u8 key; local 301 /* Bump the key */ 302 key = (u8)(frmr->mr->lkey & 0x000000FF); 303 ib_update_fast_reg_key(frmr->mr, ++key);
|
/net/bluetooth/ |
H A D | hci_event.c | 2428 /* P-256 authentication key implies FIPS */ 2461 * using a P-256 authenticated combination key. 3156 struct link_key *key; local 3165 key = hci_find_link_key(hdev, &ev->bdaddr); 3166 if (!key) { 3167 BT_DBG("%s link key not found for %pMR", hdev->name, 3172 BT_DBG("%s found key type %u for %pMR", hdev->name, key->type, 3177 if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 || 3178 key 3214 struct link_key *key; local [all...] |
H A D | smp.c | 98 /* The most significant octet of key corresponds to k[0] */ 465 /* Initialize key for JUST WORKS */ 657 /* When receiving an indentity resolving key for 659 * private address, just remove the key so that 664 * this key at this point. So it is safe to 803 /* Generate a new random key */ 1046 /* Update remote key distribution in case the remote cleared 1112 struct smp_ltk *key; local 1115 key = hci_find_ltk_by_addr(hcon->hdev, &hcon->dst, hcon->dst_type, 1117 if (!key) [all...] |
/net/bridge/netfilter/ |
H A D | Kconfig | 15 Add support for bridge dedicated meta key.
|
/net/batman-adv/ |
H A D | network-coding.c | 432 * batadv_nc_hash_key_gen - computes the nc_path hash key 433 * @key: buffer to hold the final hash key 434 * @src: source ethernet mac address going into the hash key 435 * @dst: destination ethernet mac address going into the hash key 437 static void batadv_nc_hash_key_gen(struct batadv_nc_path *key, const char *src, argument 440 memcpy(key->prev_hop, src, sizeof(key->prev_hop)); 441 memcpy(key->next_hop, dst, sizeof(key [all...] |
/net/mac80211/ |
H A D | trace.h | 516 struct ieee80211_key_conf *key), 518 TP_ARGS(local, cmd, sdata, sta, key), 534 __entry->cipher = key->cipher; 535 __entry->flags = key->flags; 536 __entry->keyidx = key->keyidx; 537 __entry->hw_key_idx = key->hw_key_idx;
|
H A D | ieee80211_i.h | 32 #include "key.h" 157 struct ieee80211_key *key; member in struct:ieee80211_tx_data 210 struct ieee80211_key *key; member in struct:ieee80211_rx_data 367 u8 key[WLAN_KEY_LEN_WEP104]; member in struct:ieee80211_mgd_auth_data 1173 * key pointers (write access, they're RCU.) 1802 const u8 *da, const u8 *key, u8 key_len, u8 key_idx,
|
/net/netfilter/ipvs/ |
H A D | ip_vs_conn.c | 97 static inline void ct_write_lock_bh(unsigned int key) argument 99 spin_lock_bh(&__ip_vs_conntbl_lock_array[key&CT_LOCKARRAY_MASK].l); 102 static inline void ct_write_unlock_bh(unsigned int key) argument 104 spin_unlock_bh(&__ip_vs_conntbl_lock_array[key&CT_LOCKARRAY_MASK].l);
|
/net/rds/ |
H A D | rdma.c | 66 static struct rds_mr *rds_mr_tree_walk(struct rb_root *root, u64 key, argument 77 if (key < mr->r_key) 79 else if (key > mr->r_key) 102 rdsdebug("RDS: destroy mr key is %x refcnt %u\n", 277 rdsdebug("RDS: get_mr put_user key is %x cookie_addr %p\n", 301 rdsdebug("RDS: get_mr key is %x\n", mr->r_key);
|