Searched refs:key (Results 51 - 75 of 151) sorted by relevance

1234567

/net/dns_resolver/
H A DKconfig8 Saying Y here will include support for the DNS Resolver key type
19 helper "/sbin/dns.resolver" via /etc/request-key.conf.
/net/netfilter/
H A Dnft_meta.c36 switch (priv->key) {
187 switch (meta->key) {
217 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
218 switch (priv->key) {
268 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
269 switch (priv->key) {
292 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
308 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
/net/openvswitch/
H A Dactions.c42 struct sw_flow_key *key,
93 struct sw_flow_key *key,
104 da->pkt_key = *key;
484 struct sw_flow_key *key, const struct nlattr *attr)
491 upcall.key = key;
517 struct sw_flow_key *key, const struct nlattr *attr)
551 return output_userspace(dp, skb, key, a);
558 if (!add_deferred_actions(skb, key, a)) {
568 static void execute_hash(struct sk_buff *skb, struct sw_flow_key *key, argument
92 add_deferred_actions(struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument
483 output_userspace(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument
516 sample(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument
629 execute_recirc(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *a, int rem) argument
668 do_execute_actions(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr, int len) argument
758 struct sw_flow_key *key = &da->pkt_key; local
773 ovs_execute_actions(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key) argument
[all...]
H A Ddatapath.h113 * @key: Becomes %OVS_PACKET_ATTR_KEY. Must be nonnull.
122 const struct sw_flow_key *key; member in struct:dp_upcall_info
187 void ovs_dp_process_packet(struct sk_buff *skb, struct sw_flow_key *key);
H A Ddatapath.c241 void ovs_dp_process_packet(struct sk_buff *skb, struct sw_flow_key *key) argument
253 flow = ovs_flow_tbl_lookup_stats(&dp->table, key, &n_mask_hit);
259 upcall.key = key;
273 ovs_flow_stats_update(OVS_CB(skb)->flow, key->tp.flags, skb);
274 ovs_execute_actions(dp, skb, key);
338 /* The initial flow key extracted by ovs_flow_extract()
342 later_key = *upcall_info->key;
346 later_info.key = &later_key;
465 err = ovs_nla_put_flow(upcall_info->key, upcall_inf
941 get_flow_actions(const struct nlattr *a, const struct sw_flow_key *key, const struct sw_flow_mask *mask) argument
968 struct sw_flow_key key; local
1067 struct sw_flow_key key; local
1115 struct sw_flow_key key; local
[all...]
/net/tipc/
H A Dname_distr.c98 i->key = htonl(p->key);
265 publ->node, publ->ref, publ->key);
272 " (type=%u, lower=%u, node=0x%x, ref=%u, key=%u)\n",
274 publ->key);
295 ntohl(i->ref), ntohl(i->key));
305 ntohl(i->key));
352 pr_warn_ratelimited("Dropping name table update (%d) of {%u, %u, %u} from %s key=%u\n",
356 addr, ntohl(e->i.key));
H A Dname_table.c124 u32 key)
138 publ->key = key;
250 u32 scope, u32 node, u32 port, u32 key)
271 if ((publ->ref == port) && (publ->key == key) &&
328 publ = publ_create(type, lower, upper, scope, node, port, key);
370 u32 node, u32 ref, u32 key)
386 if ((publ->key == key)
122 publ_create(u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port_ref, u32 key) argument
248 tipc_nameseq_insert_publ(struct name_seq *nseq, u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port, u32 key) argument
369 tipc_nameseq_remove_publ(struct name_seq *nseq, u32 inst, u32 node, u32 ref, u32 key) argument
481 tipc_nametbl_insert_publ(u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port, u32 key) argument
502 tipc_nametbl_remove_publ(u32 type, u32 lower, u32 node, u32 ref, u32 key) argument
658 tipc_nametbl_publish(u32 type, u32 lower, u32 upper, u32 scope, u32 port_ref, u32 key) argument
689 tipc_nametbl_withdraw(u32 type, u32 lower, u32 ref, u32 key) argument
[all...]
/net/ipv4/
H A Dtcp_ipv4.c93 static int tcp_v4_md5_hash_hdr(char *md5_hash, const struct tcp_md5sig_key *key,
589 struct tcp_md5sig_key *key; local
631 * source port, and then find md5 key through listening socket.
633 * Incoming packet is checked with md5 hash with finding key,
640 /* don't send rst if it can't find key */
644 key = tcp_md5_do_lookup(sk1, (union tcp_md5_addr *)
646 if (!key)
649 genhash = tcp_v4_md5_hash_skb(newhash, key, NULL, NULL, skb);
653 key = sk ? tcp_md5_do_lookup(sk, (union tcp_md5_addr *)
658 if (key) {
706 tcp_v4_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, struct tcp_md5sig_key *key, int reply_flags, u8 tos) argument
899 struct tcp_md5sig_key *key; local
947 struct tcp_md5sig_key *key; local
992 struct tcp_md5sig_key *key; local
1007 struct tcp_md5sig_key *key; local
1070 tcp_v4_md5_hash_hdr(char *md5_hash, const struct tcp_md5sig_key *key, __be32 daddr, __be32 saddr, const struct tcphdr *th) argument
1102 tcp_v4_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key, const struct sock *sk, const struct request_sock *req, const struct sk_buff *skb) argument
1302 struct tcp_md5sig_key *key; local
[all...]
H A Dfib_lookup.h33 void rtmsg_fib(int event, __be32 key, struct fib_alias *fa, int dst_len,
/net/sched/
H A Dcls_u32.c2 * net/sched/cls_u32.c Ugly (or Universal) 32bit key Packet Classifier.
11 * The filters are packed to hash tables of key nodes
12 * with a set of 32bit key/mask pairs at every node.
93 static inline unsigned int u32_hash_fold(__be32 key, argument
97 unsigned int h = ntohl(key & sel->hmask) >> fshift;
125 struct tc_u32_key *key = n->sel.keys; local
141 for (i = n->sel.nkeys; i > 0; i--, key++) {
142 int toff = off + key->off + (off2 & key->offmask);
151 if ((*data ^ key
386 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu); local
400 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu); local
405 u32_delete_key(struct tcf_proto *tp, struct tc_u_knode *key) argument
[all...]
H A Dcls_tcindex.c33 u16 key; member in struct:tcindex_filter
44 u16 mask; /* AND key with mask */
45 u32 shift; /* shift ANDed key to the right */
59 tcindex_lookup(struct tcindex_data *p, u16 key) argument
62 struct tcindex_filter_result *f = p->perfect + key;
69 fp = &p->h[key % p->hash];
73 if (f->key == key)
86 int key = (skb->tc_index & p->mask) >> p->shift; local
91 f = tcindex_lookup(p, key);
[all...]
/net/bluetooth/
H A Damp.c133 /* AMP crypto key generation interface */
134 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) argument
148 ret = crypto_shash_setkey(tfm, key, ksize);
170 struct link_key *key; local
180 /* Legacy key */
182 BT_ERR("Legacy key type %d", conn->key_type);
189 key = hci_find_link_key(hdev, &conn->dst);
190 if (!key) {
191 BT_DBG("No Link key for conn %p dst %pMR", conn, &conn->dst);
196 memcpy(&keybuf[0], key
[all...]
H A Dsmp.h128 static inline u8 smp_ltk_sec_level(struct smp_ltk *key) argument
130 if (key->authenticated)
/net/rxrpc/
H A Dar-call.c79 unsigned long key; local
84 key = (unsigned long)localptr;
88 key += (__force u32)epoch;
89 key += (__force u16)service_id;
90 key += (__force u32)call_id;
91 key += (hcid & RXRPC_CIDMASK) >> RXRPC_CIDSHIFT;
92 key += hcid & RXRPC_CHANNELMASK;
93 key += clientflag;
94 key += proto;
97 key
107 unsigned long key; local
160 unsigned long key; local
[all...]
H A Dar-connection.c60 struct key *key, __be16 service_id)
63 ((unsigned long) bundle->key - (unsigned long) key);
71 struct key *key,
79 rx, key_serial(key), trans->debug_id, ntohs(service_id));
94 if (rxrpc_cmp_bundle(bundle, key, service_id) < 0)
96 else if (rxrpc_cmp_bundle(bundle, key, service_id) > 0)
112 candidate->key
59 rxrpc_cmp_bundle(const struct rxrpc_conn_bundle *bundle, struct key *key, __be16 service_id) argument
69 rxrpc_get_bundle(struct rxrpc_sock *rx, struct rxrpc_transport *trans, struct key *key, __be16 service_id, gfp_t gfp) argument
[all...]
H A Drxkad.c68 _enter("{%d},{%x}", conn->debug_id, key_serial(conn->key));
70 token = conn->key->payload.data;
125 if (!conn->key)
128 token = conn->key->payload.data;
223 /* encrypt from the session key */
224 token = call->conn->key->payload.data;
272 call->debug_id, key_serial(call->conn->key), ntohl(sp->hdr.seq),
278 ret = key_validate(call->conn->key);
435 /* decrypt from the session key */
436 token = call->conn->key
826 struct rxrpc_crypt iv, key; local
[all...]
H A Daf_rxrpc.c19 #include <linux/key-type.h>
259 * @key: The security context to use (defaults to socket setting)
267 * supplying @srx and @key.
271 struct key *key,
281 _enter(",,%x,%lx", key_serial(key), user_call_ID);
306 if (!key)
307 key = rx->key;
308 if (key
269 rxrpc_kernel_begin_call(struct socket *sock, struct sockaddr_rxrpc *srx, struct key *key, unsigned long user_call_ID, gfp_t gfp) argument
[all...]
H A Dar-internal.h63 struct key *key; /* security for this socket */ member in struct:rxrpc_sock
64 struct key *securities; /* list of server security descriptors */
219 * - matched by { transport, service_id, key }
226 struct key *key; /* security for this bundle */ member in struct:rxrpc_conn_bundle
237 * - matched by { transport, service_id, conn_id, direction, key }
251 struct key *key; /* security for this connection (client) */ member in struct:rxrpc_connection
252 struct key *server_ke
[all...]
/net/core/
H A Dutils.c342 struct static_key *key; member in struct:__net_random_once_work
349 BUG_ON(!static_key_enabled(work->key));
350 static_key_slow_dec(work->key);
354 static void __net_random_once_disable_jump(struct static_key *key) argument
363 w->key = key;
H A Dflow.c38 struct flowi key; member in struct:flow_cache_entry
160 const struct flowi *key,
163 const u32 *k = (const u32 *) key;
192 flow_cache_lookup(struct net *net, const struct flowi *key, u16 family, u8 dir, argument
220 hash = flow_hash_code(fc, fcp, key, keysize);
225 flow_key_compare(key, &tfle->key, keysize) == 0) {
240 memcpy(&fle->key, key, keysize * sizeof(flow_compare_t));
264 flo = resolver(net, key, famil
158 flow_hash_code(struct flow_cache *fc, struct flow_cache_percpu *fcp, const struct flowi *key, size_t keysize) argument
[all...]
/net/batman-adv/
H A Doriginator.h79 const unsigned char *key = data; local
84 hash += key[i];
/net/mac80211/
H A Daes_ccm.c19 #include "key.h"
75 struct crypto_aead *ieee80211_aes_key_setup_encrypt(const u8 key[]) argument
84 err = crypto_aead_setkey(tfm, key, WLAN_KEY_LEN_CCMP);
/net/ceph/
H A Dauth_x_protocol.h39 __le64 key; member in struct:ceph_x_authenticate
60 * b - encrypted with session key
/net/ieee802154/
H A Dnl-mac.c1019 struct ieee802154_llsec_key *key)
1024 memset(key, 0, sizeof(*key));
1045 key->cmd_frame_ids = commands[7];
1048 key->frame_types = frames;
1050 nla_memcpy(key->key, info->attrs[IEEE802154_ATTR_LLSEC_KEY_BYTES],
1059 struct ieee802154_llsec_key key; local
1062 if (ieee802154_llsec_parse_key(info, &key) ||
1066 return ops->llsec->add_key(dev, &id, &key);
1018 ieee802154_llsec_parse_key(struct genl_info *info, struct ieee802154_llsec_key *key) argument
1095 ieee802154_nl_fill_key(struct sk_buff *msg, u32 portid, u32 seq, const struct ieee802154_llsec_key_entry *key, const struct net_device *dev) argument
1298 struct ieee802154_llsec_device_key key; local
1324 struct ieee802154_llsec_device_key key; local
[all...]
/net/wireless/
H A Dlib80211_crypt_tkip.c45 u8 key[TKIP_KEY_LEN]; member in struct:lib80211_tkip_data
325 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2,
329 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16);
442 net_dbg_ratelimited("TKIP: received packet from %pM with keyid=%d that does not have a configured key\n",
461 tkip_mixing_phase1(tkey->rx_ttak, tkey->key, hdr->addr2, iv32);
464 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16);
508 static int michael_mic(struct crypto_hash *tfm_michael, u8 * key, u8 * hdr, argument
522 if (crypto_hash_setkey(tfm_michael, key, 8))
580 if (michael_mic(tkey->tx_tfm_michael, &tkey->key[16], tkey->tx_hdr,
594 /* TODO: needed parameters: count, keyid, key typ
644 lib80211_tkip_set_key(void *key, int len, u8 * seq, void *priv) argument
677 lib80211_tkip_get_key(void *key, int len, u8 * seq, void *priv) argument
[all...]

Completed in 361 milliseconds

1234567