/net/mac80211/ |
H A D | tkip.h | 21 u8 *payload, size_t payload_len); 31 u8 *payload, size_t payload_len, u8 *ta,
|
H A D | tkip.c | 144 * the packet payload). */ 219 * Encrypt packet payload with TKIP using @key. @pos is a pointer to the 220 * beginning of the buffer containing payload. This payload must include 222 * @payload_len is the length of payload (_not_ including IV/ICV length). 228 u8 *payload, size_t payload_len) 235 payload, payload_len); 238 /* Decrypt packet payload with TKIP using @key. @pos is a pointer to the 239 * beginning of the buffer containing IEEE 802.11 header payload, i.e., 241 * length of payload, includin 225 ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, struct sk_buff *skb, u8 *payload, size_t payload_len) argument 242 ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, u8 *payload, size_t payload_len, u8 *ta, u8 *ra, int only_iv, int queue, u32 *out_iv32, u16 *out_iv16) argument [all...] |
/net/ipv4/netfilter/ |
H A D | ipt_CLUSTERIP.c | 479 static void arp_print(struct arp_payload *payload) argument 486 hbuffer[k++] = hex_asc_hi(payload->src_hw[j]); 487 hbuffer[k++] = hex_asc_lo(payload->src_hw[j]); 493 &payload->src_ip, hbuffer, &payload->dst_ip); 505 struct arp_payload *payload; local 520 payload = (void *)(arp+1); 524 c = clusterip_config_find_get(net, payload->src_ip, 0); 541 memcpy(payload->src_hw, c->clustermac, arp->ar_hln); 545 arp_print(payload); [all...] |
/net/atm/ |
H A D | br2684.c | 88 enum br2684_payload payload; member in struct:br2684_dev 207 ((brdev->payload == p_bridged) ? 209 ((brdev->payload == p_bridged) ? BR2684_PAD_LEN : 0); 223 if (brdev->payload == p_bridged) { 227 } else if (brdev->payload == p_routed) { 246 if (brdev->payload == p_bridged) { 480 if (brdev->payload == p_routed) { 667 enum br2684_payload payload; local 675 payload = p_routed; 677 payload [all...] |
/net/bridge/netfilter/ |
H A D | nft_reject_bridge.c | 101 void *payload; local 135 payload = skb_put(nskb, len); 136 memcpy(payload, skb_network_header(oldskb), len); 208 void *payload; local 214 * packet exceeding the minimum IPv6 MTU" in the ICMP payload. 236 payload = skb_put(nskb, len); 237 memcpy(payload, skb_network_header(oldskb), len);
|
/net/nfc/hci/ |
H A D | hcp.c | 35 const u8 *payload, size_t payload_len, 41 const u8 *ptr = payload; 33 nfc_hci_hcp_message_tx(struct nfc_hci_dev *hdev, u8 pipe, u8 type, u8 instruction, const u8 *payload, size_t payload_len, data_exchange_cb_t cb, void *cb_context, unsigned long completion_delay) argument
|
H A D | hci.h | 76 const u8 *payload, size_t payload_len,
|
/net/ceph/ |
H A D | auth.c | 183 void *payload, *payload_end; local 196 payload = p; 208 payload_end = payload + payload_len; 239 ret = ac->ops->handle_reply(ac, result, payload, payload_end);
|
H A D | crypto.c | 544 prep->payload[0] = ckey; 556 struct ceph_crypto_key *ckey = prep->payload[0]; 563 struct ceph_crypto_key *ckey = key->payload.data;
|
/net/rxrpc/ |
H A D | ar-key.c | 40 * arbitrary blob of data as the payload 55 * description and an 8-byte decryption key as the payload 154 for (pptoken = (struct rxrpc_key_token **)&prep->payload[0]; 436 /* reserve some payload space for this subkey - the length of the token 524 /* attach the payload */ 525 for (pptoken = (struct rxrpc_key_token **)&prep->payload[0]; 698 /* determine if the XDR payload format is being used */ 770 pp = (struct rxrpc_key_token **)&prep->payload[0]; 817 rxrpc_free_token_list(prep->payload[0]); 845 prep->payload[ [all...] |
H A D | ar-security.c | 140 if (!key->payload.data) 142 token = key->payload.data;
|
H A D | rxkad.c | 70 token = conn->key->payload.data; 128 token = conn->key->payload.data; 224 token = call->conn->key->payload.data; 436 token = call->conn->key->payload.data; 783 token = conn->key->payload.data; 851 ASSERT(conn->server_key->payload.data != NULL); 856 desc.tfm = conn->server_key->payload.data;
|
/net/wireless/ |
H A D | util.c | 367 u8 *payload; local 453 payload = skb->data + hdrlen; 454 ethertype = (payload[6] << 8) | payload[7]; 456 if (likely((ether_addr_equal(payload, rfc1042_header) && 458 ether_addr_equal(payload, bridge_tunnel_header))) { 603 u8 *payload; local 642 * Allocate and reserve two bytes more for payload 665 payload = frame->data; 666 ethertype = (payload[ [all...] |
/net/dns_resolver/ |
H A D | dns_query.c | 144 upayload = rcu_dereference_protected(rkey->payload.data,
|
H A D | dns_key.c | 158 prep->payload[0] = upayload; 170 kfree(prep->payload[0]);
|
/net/dccp/ccids/ |
H A D | ccid3.c | 167 * @len: DCCP packet payload size in bytes 720 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local 723 hc->rx_s = payload; 737 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local 739 * Update moving-average of s and the sum of received payload bytes 741 hc->rx_s = tfrc_ewma(hc->rx_s, payload, 9); 742 hc->rx_bytes_recv += payload;
|
/net/sctp/ |
H A D | sm_make_chunk.c | 712 * parameters. However, do not populate the data payload. 973 __be32 payload; local 982 payload = htonl(tsn); 983 sctp_init_cause(retval, SCTP_ERROR_NO_DATA, sizeof(payload)); 984 sctp_addto_chunk(retval, sizeof(payload), (const void *)&payload); 1008 void *payload = NULL; local 1016 /* Put the msg_iov together into payload. */ 1017 payload = kmalloc(paylen, GFP_KERNEL); 1018 if (!payload) 1067 sctp_make_abort_violation( const struct sctp_association *asoc, const struct sctp_chunk *chunk, const __u8 *payload, const size_t paylen) argument 1164 sctp_make_heartbeat_ack(const struct sctp_association *asoc, const struct sctp_chunk *chunk, const void *payload, const size_t paylen) argument 1241 sctp_make_op_error(const struct sctp_association *asoc, const struct sctp_chunk *chunk, __be16 cause_code, const void *payload, size_t paylen, size_t reserve_tail) argument [all...] |
/net/batman-adv/ |
H A D | network-coding.c | 1478 u8 *payload; local 1485 payload = skb_network_header(skb); 1486 packet = (struct batadv_unicast_packet *)payload; 1504 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); 1531 u8 *payload; local 1538 payload = skb_network_header(skb); 1539 packet = (struct batadv_unicast_packet *)payload; 1564 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet));
|
/net/decnet/ |
H A D | dn_table.c | 273 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local 279 payload += nla_total_size((RTAX_MAX * nla_total_size(4))); 291 payload += nla_total_size(fi->fib_nhs * nhsize); 294 return payload;
|
/net/ipv6/ |
H A D | ping.c | 73 __be16 port, u32 info, u8 *payload) {} 72 dummy_ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
|
H A D | raw.c | 346 u8 *payload = skb->data; local 348 payload += offset; 349 ipv6_icmp_error(sk, skb, err, 0, ntohl(info), payload);
|
H A D | datagram.c | 221 __be16 port, u32 info, u8 *payload) 248 __skb_pull(skb, payload - skb->data); 220 ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
|
/net/ipv4/ |
H A D | fib_semantics.c | 359 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local 366 payload += nla_total_size((RTAX_MAX * nla_total_size(4))); 378 payload += nla_total_size(fi->fib_nhs * nhsize); 381 return payload;
|
H A D | raw.c | 262 u8 *payload = skb->data + (iph->ihl << 2); local 265 payload = skb->data; 266 ip_icmp_error(sk, skb, err, 0, info, payload);
|
/net/core/ |
H A D | fib_rules.c | 580 size_t payload = NLMSG_ALIGN(sizeof(struct fib_rule_hdr)) local 593 payload += ops->nlmsg_payload(rule); 595 return payload;
|