/net/dns_resolver/ |
H A D | Kconfig | 8 Saying Y here will include support for the DNS Resolver key type 19 helper "/sbin/dns.resolver" via /etc/request-key.conf.
|
/net/netfilter/ |
H A D | nft_meta.c | 36 switch (priv->key) { 187 switch (meta->key) { 217 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY])); 218 switch (priv->key) { 268 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY])); 269 switch (priv->key) { 292 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key))) 308 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
|
/net/openvswitch/ |
H A D | actions.c | 42 struct sw_flow_key *key, 93 struct sw_flow_key *key, 104 da->pkt_key = *key; 484 struct sw_flow_key *key, const struct nlattr *attr) 491 upcall.key = key; 517 struct sw_flow_key *key, const struct nlattr *attr) 551 return output_userspace(dp, skb, key, a); 558 if (!add_deferred_actions(skb, key, a)) { 568 static void execute_hash(struct sk_buff *skb, struct sw_flow_key *key, argument 92 add_deferred_actions(struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument 483 output_userspace(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument 516 sample(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr) argument 629 execute_recirc(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *a, int rem) argument 668 do_execute_actions(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key, const struct nlattr *attr, int len) argument 758 struct sw_flow_key *key = &da->pkt_key; local 773 ovs_execute_actions(struct datapath *dp, struct sk_buff *skb, struct sw_flow_key *key) argument [all...] |
H A D | datapath.h | 113 * @key: Becomes %OVS_PACKET_ATTR_KEY. Must be nonnull. 122 const struct sw_flow_key *key; member in struct:dp_upcall_info 187 void ovs_dp_process_packet(struct sk_buff *skb, struct sw_flow_key *key);
|
H A D | datapath.c | 241 void ovs_dp_process_packet(struct sk_buff *skb, struct sw_flow_key *key) argument 253 flow = ovs_flow_tbl_lookup_stats(&dp->table, key, &n_mask_hit); 259 upcall.key = key; 273 ovs_flow_stats_update(OVS_CB(skb)->flow, key->tp.flags, skb); 274 ovs_execute_actions(dp, skb, key); 338 /* The initial flow key extracted by ovs_flow_extract() 342 later_key = *upcall_info->key; 346 later_info.key = &later_key; 465 err = ovs_nla_put_flow(upcall_info->key, upcall_inf 941 get_flow_actions(const struct nlattr *a, const struct sw_flow_key *key, const struct sw_flow_mask *mask) argument 968 struct sw_flow_key key; local 1067 struct sw_flow_key key; local 1115 struct sw_flow_key key; local [all...] |
/net/tipc/ |
H A D | name_distr.c | 98 i->key = htonl(p->key); 265 publ->node, publ->ref, publ->key); 272 " (type=%u, lower=%u, node=0x%x, ref=%u, key=%u)\n", 274 publ->key); 295 ntohl(i->ref), ntohl(i->key)); 305 ntohl(i->key)); 352 pr_warn_ratelimited("Dropping name table update (%d) of {%u, %u, %u} from %s key=%u\n", 356 addr, ntohl(e->i.key));
|
H A D | name_table.c | 124 u32 key) 138 publ->key = key; 250 u32 scope, u32 node, u32 port, u32 key) 271 if ((publ->ref == port) && (publ->key == key) && 328 publ = publ_create(type, lower, upper, scope, node, port, key); 370 u32 node, u32 ref, u32 key) 386 if ((publ->key == key) 122 publ_create(u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port_ref, u32 key) argument 248 tipc_nameseq_insert_publ(struct name_seq *nseq, u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port, u32 key) argument 369 tipc_nameseq_remove_publ(struct name_seq *nseq, u32 inst, u32 node, u32 ref, u32 key) argument 481 tipc_nametbl_insert_publ(u32 type, u32 lower, u32 upper, u32 scope, u32 node, u32 port, u32 key) argument 502 tipc_nametbl_remove_publ(u32 type, u32 lower, u32 node, u32 ref, u32 key) argument 658 tipc_nametbl_publish(u32 type, u32 lower, u32 upper, u32 scope, u32 port_ref, u32 key) argument 689 tipc_nametbl_withdraw(u32 type, u32 lower, u32 ref, u32 key) argument [all...] |
/net/ipv4/ |
H A D | tcp_ipv4.c | 93 static int tcp_v4_md5_hash_hdr(char *md5_hash, const struct tcp_md5sig_key *key, 589 struct tcp_md5sig_key *key; local 631 * source port, and then find md5 key through listening socket. 633 * Incoming packet is checked with md5 hash with finding key, 640 /* don't send rst if it can't find key */ 644 key = tcp_md5_do_lookup(sk1, (union tcp_md5_addr *) 646 if (!key) 649 genhash = tcp_v4_md5_hash_skb(newhash, key, NULL, NULL, skb); 653 key = sk ? tcp_md5_do_lookup(sk, (union tcp_md5_addr *) 658 if (key) { 706 tcp_v4_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, struct tcp_md5sig_key *key, int reply_flags, u8 tos) argument 899 struct tcp_md5sig_key *key; local 947 struct tcp_md5sig_key *key; local 992 struct tcp_md5sig_key *key; local 1007 struct tcp_md5sig_key *key; local 1070 tcp_v4_md5_hash_hdr(char *md5_hash, const struct tcp_md5sig_key *key, __be32 daddr, __be32 saddr, const struct tcphdr *th) argument 1102 tcp_v4_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key, const struct sock *sk, const struct request_sock *req, const struct sk_buff *skb) argument 1302 struct tcp_md5sig_key *key; local [all...] |
H A D | fib_lookup.h | 33 void rtmsg_fib(int event, __be32 key, struct fib_alias *fa, int dst_len,
|
/net/sched/ |
H A D | cls_u32.c | 2 * net/sched/cls_u32.c Ugly (or Universal) 32bit key Packet Classifier. 11 * The filters are packed to hash tables of key nodes 12 * with a set of 32bit key/mask pairs at every node. 93 static inline unsigned int u32_hash_fold(__be32 key, argument 97 unsigned int h = ntohl(key & sel->hmask) >> fshift; 125 struct tc_u32_key *key = n->sel.keys; local 141 for (i = n->sel.nkeys; i > 0; i--, key++) { 142 int toff = off + key->off + (off2 & key->offmask); 151 if ((*data ^ key 386 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu); local 400 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu); local 405 u32_delete_key(struct tcf_proto *tp, struct tc_u_knode *key) argument [all...] |
H A D | cls_tcindex.c | 33 u16 key; member in struct:tcindex_filter 44 u16 mask; /* AND key with mask */ 45 u32 shift; /* shift ANDed key to the right */ 59 tcindex_lookup(struct tcindex_data *p, u16 key) argument 62 struct tcindex_filter_result *f = p->perfect + key; 69 fp = &p->h[key % p->hash]; 73 if (f->key == key) 86 int key = (skb->tc_index & p->mask) >> p->shift; local 91 f = tcindex_lookup(p, key); [all...] |
/net/bluetooth/ |
H A D | amp.c | 133 /* AMP crypto key generation interface */ 134 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) argument 148 ret = crypto_shash_setkey(tfm, key, ksize); 170 struct link_key *key; local 180 /* Legacy key */ 182 BT_ERR("Legacy key type %d", conn->key_type); 189 key = hci_find_link_key(hdev, &conn->dst); 190 if (!key) { 191 BT_DBG("No Link key for conn %p dst %pMR", conn, &conn->dst); 196 memcpy(&keybuf[0], key [all...] |
H A D | smp.h | 128 static inline u8 smp_ltk_sec_level(struct smp_ltk *key) argument 130 if (key->authenticated)
|
/net/rxrpc/ |
H A D | ar-call.c | 79 unsigned long key; local 84 key = (unsigned long)localptr; 88 key += (__force u32)epoch; 89 key += (__force u16)service_id; 90 key += (__force u32)call_id; 91 key += (hcid & RXRPC_CIDMASK) >> RXRPC_CIDSHIFT; 92 key += hcid & RXRPC_CHANNELMASK; 93 key += clientflag; 94 key += proto; 97 key 107 unsigned long key; local 160 unsigned long key; local [all...] |
H A D | ar-connection.c | 60 struct key *key, __be16 service_id) 63 ((unsigned long) bundle->key - (unsigned long) key); 71 struct key *key, 79 rx, key_serial(key), trans->debug_id, ntohs(service_id)); 94 if (rxrpc_cmp_bundle(bundle, key, service_id) < 0) 96 else if (rxrpc_cmp_bundle(bundle, key, service_id) > 0) 112 candidate->key 59 rxrpc_cmp_bundle(const struct rxrpc_conn_bundle *bundle, struct key *key, __be16 service_id) argument 69 rxrpc_get_bundle(struct rxrpc_sock *rx, struct rxrpc_transport *trans, struct key *key, __be16 service_id, gfp_t gfp) argument [all...] |
H A D | rxkad.c | 68 _enter("{%d},{%x}", conn->debug_id, key_serial(conn->key)); 70 token = conn->key->payload.data; 125 if (!conn->key) 128 token = conn->key->payload.data; 223 /* encrypt from the session key */ 224 token = call->conn->key->payload.data; 272 call->debug_id, key_serial(call->conn->key), ntohl(sp->hdr.seq), 278 ret = key_validate(call->conn->key); 435 /* decrypt from the session key */ 436 token = call->conn->key 826 struct rxrpc_crypt iv, key; local [all...] |
H A D | af_rxrpc.c | 19 #include <linux/key-type.h> 259 * @key: The security context to use (defaults to socket setting) 267 * supplying @srx and @key. 271 struct key *key, 281 _enter(",,%x,%lx", key_serial(key), user_call_ID); 306 if (!key) 307 key = rx->key; 308 if (key 269 rxrpc_kernel_begin_call(struct socket *sock, struct sockaddr_rxrpc *srx, struct key *key, unsigned long user_call_ID, gfp_t gfp) argument [all...] |
H A D | ar-internal.h | 63 struct key *key; /* security for this socket */ member in struct:rxrpc_sock 64 struct key *securities; /* list of server security descriptors */ 219 * - matched by { transport, service_id, key } 226 struct key *key; /* security for this bundle */ member in struct:rxrpc_conn_bundle 237 * - matched by { transport, service_id, conn_id, direction, key } 251 struct key *key; /* security for this connection (client) */ member in struct:rxrpc_connection 252 struct key *server_ke [all...] |
/net/core/ |
H A D | utils.c | 342 struct static_key *key; member in struct:__net_random_once_work 349 BUG_ON(!static_key_enabled(work->key)); 350 static_key_slow_dec(work->key); 354 static void __net_random_once_disable_jump(struct static_key *key) argument 363 w->key = key;
|
H A D | flow.c | 38 struct flowi key; member in struct:flow_cache_entry 160 const struct flowi *key, 163 const u32 *k = (const u32 *) key; 192 flow_cache_lookup(struct net *net, const struct flowi *key, u16 family, u8 dir, argument 220 hash = flow_hash_code(fc, fcp, key, keysize); 225 flow_key_compare(key, &tfle->key, keysize) == 0) { 240 memcpy(&fle->key, key, keysize * sizeof(flow_compare_t)); 264 flo = resolver(net, key, famil 158 flow_hash_code(struct flow_cache *fc, struct flow_cache_percpu *fcp, const struct flowi *key, size_t keysize) argument [all...] |
/net/batman-adv/ |
H A D | originator.h | 79 const unsigned char *key = data; local 84 hash += key[i];
|
/net/mac80211/ |
H A D | aes_ccm.c | 19 #include "key.h" 75 struct crypto_aead *ieee80211_aes_key_setup_encrypt(const u8 key[]) argument 84 err = crypto_aead_setkey(tfm, key, WLAN_KEY_LEN_CCMP);
|
/net/ceph/ |
H A D | auth_x_protocol.h | 39 __le64 key; member in struct:ceph_x_authenticate 60 * b - encrypted with session key
|
/net/ieee802154/ |
H A D | nl-mac.c | 1019 struct ieee802154_llsec_key *key) 1024 memset(key, 0, sizeof(*key)); 1045 key->cmd_frame_ids = commands[7]; 1048 key->frame_types = frames; 1050 nla_memcpy(key->key, info->attrs[IEEE802154_ATTR_LLSEC_KEY_BYTES], 1059 struct ieee802154_llsec_key key; local 1062 if (ieee802154_llsec_parse_key(info, &key) || 1066 return ops->llsec->add_key(dev, &id, &key); 1018 ieee802154_llsec_parse_key(struct genl_info *info, struct ieee802154_llsec_key *key) argument 1095 ieee802154_nl_fill_key(struct sk_buff *msg, u32 portid, u32 seq, const struct ieee802154_llsec_key_entry *key, const struct net_device *dev) argument 1298 struct ieee802154_llsec_device_key key; local 1324 struct ieee802154_llsec_device_key key; local [all...] |
/net/wireless/ |
H A D | lib80211_crypt_tkip.c | 45 u8 key[TKIP_KEY_LEN]; member in struct:lib80211_tkip_data 325 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, 329 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); 442 net_dbg_ratelimited("TKIP: received packet from %pM with keyid=%d that does not have a configured key\n", 461 tkip_mixing_phase1(tkey->rx_ttak, tkey->key, hdr->addr2, iv32); 464 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16); 508 static int michael_mic(struct crypto_hash *tfm_michael, u8 * key, u8 * hdr, argument 522 if (crypto_hash_setkey(tfm_michael, key, 8)) 580 if (michael_mic(tkey->tx_tfm_michael, &tkey->key[16], tkey->tx_hdr, 594 /* TODO: needed parameters: count, keyid, key typ 644 lib80211_tkip_set_key(void *key, int len, u8 * seq, void *priv) argument 677 lib80211_tkip_get_key(void *key, int len, u8 * seq, void *priv) argument [all...] |