/linux-master/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 31 struct key *tkey; local 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); 34 if (IS_ERR(tkey)) 37 down_read(&tkey->sem); 38 tpayload = tkey->payload.data[0]; 42 return tkey;
|
/linux-master/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_tkip.c | 255 struct rtllib_tkip_data *tkey = priv; local 272 if (!tkey->tx_phase1_done) { 273 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, 274 tkey->tx_iv32); 275 tkey->tx_phase1_done = 1; 277 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, 278 tkey->tx_iv16); 280 tkey 329 struct rtllib_tkip_data *tkey = priv; local 502 struct rtllib_tkip_data *tkey = priv; local 551 struct rtllib_tkip_data *tkey = priv; local 598 struct rtllib_tkip_data *tkey = priv; local 629 struct rtllib_tkip_data *tkey = priv; local [all...] |
/linux-master/net/wireless/ |
H A D | lib80211_crypt_tkip.c | 286 struct lib80211_tkip_data *tkey = priv; local 298 if (!tkey->tx_phase1_done) { 299 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, 300 tkey->tx_iv32); 301 tkey->tx_phase1_done = 1; 303 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); 312 *pos++ = (tkey 329 struct lib80211_tkip_data *tkey = priv; local 378 struct lib80211_tkip_data *tkey = priv; local 544 struct lib80211_tkip_data *tkey = priv; local 587 struct lib80211_tkip_data *tkey = priv; local 622 struct lib80211_tkip_data *tkey = priv; local 655 struct lib80211_tkip_data *tkey = priv; local [all...] |
/linux-master/samples/bpf/ |
H A D | tc_l2_redirect_kern.c | 61 struct bpf_tunnel_key tkey = {}; local 112 struct bpf_tunnel_key tkey = {}; local 143 tkey.tunnel_id = 10000; 144 tkey.tunnel_ttl = 64; 145 tkey.remote_ipv4 = 0x0a020166; /* 10.2.1.102 */ 146 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0); 153 struct bpf_tunnel_key tkey = {}; local 194 tkey.tunnel_id = 10000; 195 tkey 208 struct bpf_tunnel_key tkey = {}; local [all...] |
/linux-master/net/sched/ |
H A D | act_pedit.c | 395 struct tc_pedit_key *tkey; local 411 tkey = parms->tcfp_keys; 414 for (i = parms->tcfp_nkeys; i > 0; i--, tkey++) { 415 int offset = tkey->off; 434 if (tkey->offmask) { 437 if (!offset_valid(skb, hoffset + tkey->at)) { 439 hoffset + tkey->at); 442 d = skb_header_pointer(skb, hoffset + tkey->at, 447 offset += (*d & tkey->offmask) >> tkey [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_l4lb.c | 328 struct bpf_tunnel_key tkey = {}; local 346 tkey.tunnel_ttl = 64; 431 memcpy(tkey.remote_ipv6, dst->dstv6, 16); 438 tkey.remote_ipv4 = dst->dst; 446 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); 447 *(u32 *)eth->eth_dest = tkey.remote_ipv4;
|
H A D | test_l4lb_noinline.c | 327 struct bpf_tunnel_key tkey = {}; local 345 tkey.tunnel_ttl = 64; 430 memcpy(tkey.remote_ipv6, dst->dstv6, 16); 437 tkey.remote_ipv4 = dst->dst; 445 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); 446 *(u32 *)eth->eth_dest = tkey.remote_ipv4;
|
H A D | test_l4lb_noinline_dynptr.c | 332 struct bpf_tunnel_key tkey = {}; local 350 tkey.tunnel_ttl = 64; 437 memcpy(tkey.remote_ipv6, dst->dstv6, 16); 444 tkey.remote_ipv4 = dst->dst; 452 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); 453 *(u32 *)eth->eth_dest = tkey.remote_ipv4;
|
/linux-master/include/net/ |
H A D | tcp_ao.h | 214 const u8 *tkey, int hash_offset, u32 sne); 240 struct tcp_ao_key *key, const u8 *tkey, 266 const u8 *tkey, int hash_offset, u32 sne); 285 const u8 *tkey, int hash_offset, u32 sne);
|
H A D | tcp.h | 2257 const u8 *tkey, int hash_offset, u32 sne);
|
/linux-master/net/ipv6/ |
H A D | tcp_ao.c | 136 const u8 *tkey, int hash_offset, u32 sne) 138 return tcp_ao_hash_skb(AF_INET6, ao_hash, key, sk, skb, tkey, 134 tcp_v6_ao_hash_skb(char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument
|
/linux-master/net/ipv4/ |
H A D | tcp_ao.c | 542 struct tcp_ao_key *key, const u8 *tkey, 559 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) 605 const u8 *tkey, int hash_offset, u32 sne) 619 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) 655 const u8 *tkey, int hash_offset, u32 sne) 658 tkey, hash_offset, sne); 541 tcp_ao_hash_hdr(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const u8 *tkey, const union tcp_ao_addr *daddr, const union tcp_ao_addr *saddr, const struct tcphdr *th, u32 sne) argument 602 tcp_ao_hash_skb(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument 653 tcp_v4_ao_hash_skb(char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument
|