Searched refs:payload (Results 1 - 25 of 38) sorted by relevance

12

/net/mac80211/
H A Dtkip.h21 u8 *payload, size_t payload_len);
31 u8 *payload, size_t payload_len, u8 *ta,
H A Dtkip.c144 * the packet payload). */
219 * Encrypt packet payload with TKIP using @key. @pos is a pointer to the
220 * beginning of the buffer containing payload. This payload must include
222 * @payload_len is the length of payload (_not_ including IV/ICV length).
228 u8 *payload, size_t payload_len)
235 payload, payload_len);
238 /* Decrypt packet payload with TKIP using @key. @pos is a pointer to the
239 * beginning of the buffer containing IEEE 802.11 header payload, i.e.,
241 * length of payload, includin
225 ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, struct sk_buff *skb, u8 *payload, size_t payload_len) argument
242 ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, u8 *payload, size_t payload_len, u8 *ta, u8 *ra, int only_iv, int queue, u32 *out_iv32, u16 *out_iv16) argument
[all...]
/net/ipv4/netfilter/
H A Dipt_CLUSTERIP.c479 static void arp_print(struct arp_payload *payload) argument
486 hbuffer[k++] = hex_asc_hi(payload->src_hw[j]);
487 hbuffer[k++] = hex_asc_lo(payload->src_hw[j]);
493 &payload->src_ip, hbuffer, &payload->dst_ip);
505 struct arp_payload *payload; local
520 payload = (void *)(arp+1);
524 c = clusterip_config_find_get(net, payload->src_ip, 0);
541 memcpy(payload->src_hw, c->clustermac, arp->ar_hln);
545 arp_print(payload);
[all...]
/net/atm/
H A Dbr2684.c88 enum br2684_payload payload; member in struct:br2684_dev
207 ((brdev->payload == p_bridged) ?
209 ((brdev->payload == p_bridged) ? BR2684_PAD_LEN : 0);
223 if (brdev->payload == p_bridged) {
227 } else if (brdev->payload == p_routed) {
246 if (brdev->payload == p_bridged) {
480 if (brdev->payload == p_routed) {
667 enum br2684_payload payload; local
675 payload = p_routed;
677 payload
[all...]
/net/bridge/netfilter/
H A Dnft_reject_bridge.c101 void *payload; local
135 payload = skb_put(nskb, len);
136 memcpy(payload, skb_network_header(oldskb), len);
208 void *payload; local
214 * packet exceeding the minimum IPv6 MTU" in the ICMP payload.
236 payload = skb_put(nskb, len);
237 memcpy(payload, skb_network_header(oldskb), len);
/net/nfc/hci/
H A Dhcp.c35 const u8 *payload, size_t payload_len,
41 const u8 *ptr = payload;
33 nfc_hci_hcp_message_tx(struct nfc_hci_dev *hdev, u8 pipe, u8 type, u8 instruction, const u8 *payload, size_t payload_len, data_exchange_cb_t cb, void *cb_context, unsigned long completion_delay) argument
H A Dhci.h76 const u8 *payload, size_t payload_len,
/net/ceph/
H A Dauth.c183 void *payload, *payload_end; local
196 payload = p;
208 payload_end = payload + payload_len;
239 ret = ac->ops->handle_reply(ac, result, payload, payload_end);
H A Dcrypto.c544 prep->payload[0] = ckey;
556 struct ceph_crypto_key *ckey = prep->payload[0];
563 struct ceph_crypto_key *ckey = key->payload.data;
/net/rxrpc/
H A Dar-key.c40 * arbitrary blob of data as the payload
55 * description and an 8-byte decryption key as the payload
154 for (pptoken = (struct rxrpc_key_token **)&prep->payload[0];
436 /* reserve some payload space for this subkey - the length of the token
524 /* attach the payload */
525 for (pptoken = (struct rxrpc_key_token **)&prep->payload[0];
698 /* determine if the XDR payload format is being used */
770 pp = (struct rxrpc_key_token **)&prep->payload[0];
817 rxrpc_free_token_list(prep->payload[0]);
845 prep->payload[
[all...]
H A Dar-security.c140 if (!key->payload.data)
142 token = key->payload.data;
H A Drxkad.c70 token = conn->key->payload.data;
128 token = conn->key->payload.data;
224 token = call->conn->key->payload.data;
436 token = call->conn->key->payload.data;
783 token = conn->key->payload.data;
851 ASSERT(conn->server_key->payload.data != NULL);
856 desc.tfm = conn->server_key->payload.data;
/net/wireless/
H A Dutil.c367 u8 *payload; local
453 payload = skb->data + hdrlen;
454 ethertype = (payload[6] << 8) | payload[7];
456 if (likely((ether_addr_equal(payload, rfc1042_header) &&
458 ether_addr_equal(payload, bridge_tunnel_header))) {
603 u8 *payload; local
642 * Allocate and reserve two bytes more for payload
665 payload = frame->data;
666 ethertype = (payload[
[all...]
/net/dns_resolver/
H A Ddns_query.c144 upayload = rcu_dereference_protected(rkey->payload.data,
H A Ddns_key.c158 prep->payload[0] = upayload;
170 kfree(prep->payload[0]);
/net/dccp/ccids/
H A Dccid3.c167 * @len: DCCP packet payload size in bytes
720 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local
723 hc->rx_s = payload;
737 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local
739 * Update moving-average of s and the sum of received payload bytes
741 hc->rx_s = tfrc_ewma(hc->rx_s, payload, 9);
742 hc->rx_bytes_recv += payload;
/net/sctp/
H A Dsm_make_chunk.c712 * parameters. However, do not populate the data payload.
973 __be32 payload; local
982 payload = htonl(tsn);
983 sctp_init_cause(retval, SCTP_ERROR_NO_DATA, sizeof(payload));
984 sctp_addto_chunk(retval, sizeof(payload), (const void *)&payload);
1008 void *payload = NULL; local
1016 /* Put the msg_iov together into payload. */
1017 payload = kmalloc(paylen, GFP_KERNEL);
1018 if (!payload)
1067 sctp_make_abort_violation( const struct sctp_association *asoc, const struct sctp_chunk *chunk, const __u8 *payload, const size_t paylen) argument
1164 sctp_make_heartbeat_ack(const struct sctp_association *asoc, const struct sctp_chunk *chunk, const void *payload, const size_t paylen) argument
1241 sctp_make_op_error(const struct sctp_association *asoc, const struct sctp_chunk *chunk, __be16 cause_code, const void *payload, size_t paylen, size_t reserve_tail) argument
[all...]
/net/batman-adv/
H A Dnetwork-coding.c1478 u8 *payload; local
1485 payload = skb_network_header(skb);
1486 packet = (struct batadv_unicast_packet *)payload;
1504 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet));
1531 u8 *payload; local
1538 payload = skb_network_header(skb);
1539 packet = (struct batadv_unicast_packet *)payload;
1564 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet));
/net/decnet/
H A Ddn_table.c273 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local
279 payload += nla_total_size((RTAX_MAX * nla_total_size(4)));
291 payload += nla_total_size(fi->fib_nhs * nhsize);
294 return payload;
/net/ipv6/
H A Dping.c73 __be16 port, u32 info, u8 *payload) {}
72 dummy_ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
H A Draw.c346 u8 *payload = skb->data; local
348 payload += offset;
349 ipv6_icmp_error(sk, skb, err, 0, ntohl(info), payload);
H A Ddatagram.c221 __be16 port, u32 info, u8 *payload)
248 __skb_pull(skb, payload - skb->data);
220 ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
/net/ipv4/
H A Dfib_semantics.c359 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local
366 payload += nla_total_size((RTAX_MAX * nla_total_size(4)));
378 payload += nla_total_size(fi->fib_nhs * nhsize);
381 return payload;
H A Draw.c262 u8 *payload = skb->data + (iph->ihl << 2); local
265 payload = skb->data;
266 ip_icmp_error(sk, skb, err, 0, info, payload);
/net/core/
H A Dfib_rules.c580 size_t payload = NLMSG_ALIGN(sizeof(struct fib_rule_hdr)) local
593 payload += ops->nlmsg_payload(rule);
595 return payload;

Completed in 613 milliseconds

12