/net/core/ |
D | flow_dissector.c | 1516 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1520 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1522 if ((__force u32)keys->addrs.v4addrs.dst < in __flow_hash_consistentify() 1523 (__force u32)keys->addrs.v4addrs.src) in __flow_hash_consistentify() 1524 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1526 if ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1527 (__force u16)keys->ports.src) { in __flow_hash_consistentify() 1528 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1532 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 1533 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
/net/wireless/ |
D | wext-compat.c | 428 if (!wdev->wext.keys) { in __cfg80211_set_encryption() 429 wdev->wext.keys = kzalloc(sizeof(*wdev->wext.keys), in __cfg80211_set_encryption() 431 if (!wdev->wext.keys) in __cfg80211_set_encryption() 434 wdev->wext.keys->params[i].key = in __cfg80211_set_encryption() 435 wdev->wext.keys->data[i]; in __cfg80211_set_encryption() 485 memset(wdev->wext.keys->data[idx], 0, in __cfg80211_set_encryption() 486 sizeof(wdev->wext.keys->data[idx])); in __cfg80211_set_encryption() 487 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 488 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 526 wdev->wext.keys->params[idx] = *params; in __cfg80211_set_encryption() [all …]
|
D | wext-sme.c | 37 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect() 38 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_mgd_wext_connect() 46 if (wdev->wext.keys && wdev->wext.keys->def != -1) { in cfg80211_mgd_wext_connect() 47 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_mgd_wext_connect()
|
D | ibss.c | 288 if (wdev->wext.keys) in cfg80211_ibss_wext_join() 289 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_ibss_wext_join() 293 if (wdev->wext.keys && wdev->wext.keys->def != -1) { in cfg80211_ibss_wext_join() 294 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_ibss_wext_join()
|
D | Kconfig | 100 keys in the certs/ directory. 103 bool "allow regdb keys shipped with the kernel" if CFG80211_CERTIFICATION_ONUS 107 Allow the regulatory database to be signed by one of the keys for
|
/net/ipv4/ |
D | route.c | 1935 struct flow_keys keys, hash_keys; in fib_multipath_custom_hash_outer() local 1941 skb_flow_dissect_flow_keys(skb, &keys, FLOW_DISSECTOR_F_STOP_AT_ENCAP); in fib_multipath_custom_hash_outer() 1945 hash_keys.addrs.v4addrs.src = keys.addrs.v4addrs.src; in fib_multipath_custom_hash_outer() 1947 hash_keys.addrs.v4addrs.dst = keys.addrs.v4addrs.dst; in fib_multipath_custom_hash_outer() 1949 hash_keys.basic.ip_proto = keys.basic.ip_proto; in fib_multipath_custom_hash_outer() 1951 hash_keys.ports.src = keys.ports.src; in fib_multipath_custom_hash_outer() 1953 hash_keys.ports.dst = keys.ports.dst; in fib_multipath_custom_hash_outer() 1955 *p_has_inner = !!(keys.control.flags & FLOW_DIS_ENCAPSULATION); in fib_multipath_custom_hash_outer() 1964 struct flow_keys keys, hash_keys; in fib_multipath_custom_hash_inner() local 1977 skb_flow_dissect_flow_keys(skb, &keys, 0); in fib_multipath_custom_hash_inner() [all …]
|
/net/mac802154/ |
D | llsec.c | 35 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init() 63 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy() 223 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_add() 259 list_add_rcu(&new->list, &sec->table.keys); in mac802154_llsec_key_add() 273 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_del() 339 list_for_each_entry_safe(pos, pn, &dev->dev.keys, list) { in llsec_dev_free() 370 INIT_LIST_HEAD(&entry->dev.keys); in mac802154_llsec_dev_add() 410 list_for_each_entry_rcu(devkey, &dev->dev.keys, list) { in llsec_devkey_find() 441 list_add_tail_rcu(&devkey->devkey.list, &dev->dev.keys); in mac802154_llsec_devkey_add() 562 list_for_each_entry_rcu(key_entry, &sec->table.keys, list) { in llsec_lookup_key() [all …]
|
/net/sched/ |
D | sch_choke.c | 135 struct flow_keys_digest keys; member 160 make_flow_keys_digest(&choke_skb_cb(skb1)->keys, &temp); in choke_match_flow() 166 make_flow_keys_digest(&choke_skb_cb(skb2)->keys, &temp); in choke_match_flow() 169 return !memcmp(&choke_skb_cb(skb1)->keys, in choke_match_flow() 170 &choke_skb_cb(skb2)->keys, in choke_match_flow() 171 sizeof(choke_skb_cb(skb1)->keys)); in choke_match_flow()
|
D | cls_flower.c | 1771 #define FL_KEY_SET(keys, cnt, id, member) \ argument 1773 keys[cnt].key_id = id; \ 1774 keys[cnt].offset = FL_KEY_MEMBER_OFFSET(member); \ 1778 #define FL_KEY_SET_IF_MASKED(mask, keys, cnt, id, member) \ argument 1781 FL_KEY_SET(keys, cnt, id, member); \ 1787 struct flow_dissector_key keys[FLOW_DISSECTOR_KEY_MAX]; in fl_init_dissector() local 1790 FL_KEY_SET_IF_MASKED(mask, keys, cnt, in fl_init_dissector() 1792 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_CONTROL, control); in fl_init_dissector() 1793 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_BASIC, basic); in fl_init_dissector() 1794 FL_KEY_SET_IF_MASKED(mask, keys, cnt, in fl_init_dissector() [all …]
|
D | sch_cake.c | 587 static bool cake_update_flowkeys(struct flow_keys *keys, in cake_update_flowkeys() argument 602 if (ip != keys->addrs.v4addrs.src) { in cake_update_flowkeys() 603 keys->addrs.v4addrs.src = ip; in cake_update_flowkeys() 607 if (ip != keys->addrs.v4addrs.dst) { in cake_update_flowkeys() 608 keys->addrs.v4addrs.dst = ip; in cake_update_flowkeys() 612 if (keys->ports.ports) { in cake_update_flowkeys() 616 if (port != keys->ports.src) { in cake_update_flowkeys() 617 keys->ports.src = port; in cake_update_flowkeys() 621 if (port != keys->ports.dst) { in cake_update_flowkeys() 622 port = keys->ports.dst; in cake_update_flowkeys() [all …]
|
D | act_pedit.c | 251 memcpy(nparms->tcfp_keys, parm->keys, ksize); in tcf_pedit_init() 502 s = struct_size(opt, keys, parms->tcfp_nkeys); in tcf_pedit_dump() 510 memcpy(opt->keys, parms->tcfp_keys, in tcf_pedit_dump() 511 flex_array_size(opt, keys, parms->tcfp_nkeys)); in tcf_pedit_dump()
|
D | cls_flow.c | 306 u32 keys[FLOW_KEY_MAX + 1]; in flow_classify() local 319 keys[n] = flow_key_get(skb, key, &flow_keys); in flow_classify() 323 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify() 325 classid = keys[0]; in flow_classify()
|
D | cls_u32.c | 127 struct tc_u32_key *key = n->sel.keys; in u32_classify() 805 new = kzalloc(struct_size(new, sel.keys, s->nkeys), GFP_KERNEL); in u32_init_knode() 832 memcpy(&new->sel, s, struct_size(s, keys, s->nkeys)); in u32_init_knode() 1065 sel_size = struct_size(s, keys, s->nkeys); in u32_change() 1071 n = kzalloc(struct_size(n, sel.keys, s->nkeys), GFP_KERNEL); in u32_change() 1338 if (nla_put(skb, TCA_U32_SEL, struct_size(&n->sel, keys, n->sel.nkeys), in u32_dump()
|
/net/mac80211/ |
D | key.c | 355 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_key() 387 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_mgmt_key() 412 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_beacon_key() 510 rcu_assign_pointer(sdata->keys[idx], new); in ieee80211_key_replace() 832 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in ieee80211_key_link() 1004 struct list_head *keys) in ieee80211_free_keys_iface() argument 1019 list_add_tail(&key->list, keys); in ieee80211_free_keys_iface() 1032 LIST_HEAD(keys); in ieee80211_free_keys() 1038 ieee80211_free_keys_iface(sdata, &keys); in ieee80211_free_keys() 1042 ieee80211_free_keys_iface(vlan, &keys); in ieee80211_free_keys() [all …]
|
D | debugfs_key.c | 333 if (!key->local->debugfs.keys) in ieee80211_debugfs_key_add() 340 key->local->debugfs.keys); in ieee80211_debugfs_key_add()
|
/net/sctp/ |
D | objcnt.c | 40 SCTP_DBG_OBJCNT(keys); 55 SCTP_DBG_OBJCNT_ENTRY(keys),
|
D | auth.c | 53 SCTP_DBG_OBJCNT_DEC(keys); in sctp_auth_key_put() 73 SCTP_DBG_OBJCNT_INC(keys); in sctp_auth_create_key() 118 void sctp_auth_destroy_keys(struct list_head *keys) in sctp_auth_destroy_keys() argument 123 if (list_empty(keys)) in sctp_auth_destroy_keys() 126 key_for_each_safe(ep_key, tmp, keys) { in sctp_auth_destroy_keys()
|
/net/ethernet/ |
D | eth.c | 128 struct flow_keys_basic keys; in eth_get_headlen() local 135 if (!skb_flow_dissect_flow_keys_basic(dev_net(dev), NULL, &keys, data, in eth_get_headlen() 138 return max_t(u32, keys.control.thoff, sizeof(*eth)); in eth_get_headlen() 141 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len); in eth_get_headlen()
|
/net/bluetooth/hidp/ |
D | core.c | 181 unsigned char *keys = session->keys; in hidp_input_report() local 197 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { in hidp_input_report() 198 if (hidp_keycode[keys[i]]) in hidp_input_report() 199 input_report_key(dev, hidp_keycode[keys[i]], 0); in hidp_input_report() 201 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); in hidp_input_report() 204 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) { in hidp_input_report() 212 memcpy(keys, udata, 8); in hidp_input_report()
|
D | hidp.h | 171 unsigned char keys[8]; member
|
/net/mctp/ |
D | route.c | 100 hlist_for_each_entry_rcu(key, &net->mctp.keys, hlist) { in mctp_lookup_key() 143 hlist_for_each_entry(tmp, &net->mctp.keys, hlist) { in mctp_key_add() 152 hlist_add_head(&key->hlist, &net->mctp.keys); in mctp_key_add() 153 hlist_add_head(&key->sklist, &msk->keys); in mctp_key_add() 466 hlist_add_head_rcu(&key->hlist, &mns->keys); in mctp_reserve_tag() 467 hlist_add_head_rcu(&key->sklist, &msk->keys); in mctp_reserve_tag() 500 hlist_for_each_entry(tmp, &mns->keys, hlist) { in mctp_alloc_local_tag() 1116 INIT_HLIST_HEAD(&ns->keys); in mctp_routes_net_init()
|
D | af_mctp.c | 243 INIT_HLIST_HEAD(&msk->keys); in mctp_sk_init() 278 hlist_for_each_entry_safe(key, tmp, &msk->keys, sklist) { in mctp_sk_unhash()
|
/net/ipv6/ |
D | route.c | 2296 struct flow_keys *keys, in ip6_multipath_l3_keys() argument 2328 keys->addrs.v6addrs.src = _flkeys->addrs.v6addrs.src; in ip6_multipath_l3_keys() 2329 keys->addrs.v6addrs.dst = _flkeys->addrs.v6addrs.dst; in ip6_multipath_l3_keys() 2330 keys->tags.flow_label = _flkeys->tags.flow_label; in ip6_multipath_l3_keys() 2331 keys->basic.ip_proto = _flkeys->basic.ip_proto; in ip6_multipath_l3_keys() 2333 keys->addrs.v6addrs.src = key_iph->saddr; in ip6_multipath_l3_keys() 2334 keys->addrs.v6addrs.dst = key_iph->daddr; in ip6_multipath_l3_keys() 2335 keys->tags.flow_label = ip6_flowlabel(key_iph); in ip6_multipath_l3_keys() 2336 keys->basic.ip_proto = key_iph->nexthdr; in ip6_multipath_l3_keys() 2345 struct flow_keys keys, hash_keys; in rt6_multipath_custom_hash_outer() local [all …]
|
/net/ceph/ |
D | auth_x_protocol.h | 47 __le32 keys; member
|
/net/tipc/ |
D | crypto.c | 120 u8 keys; member 1109 c->key.keys = ((new_passive & KEY_MASK) << (KEY_BITS * 2)) | in tipc_crypto_key_set_state() 1200 if (likely(c->key.keys != key.keys)) in tipc_crypto_key_attach() 1417 if (tx->key.keys && in tipc_crypto_key_synch() 1433 if (tx->key.keys && in tipc_crypto_key_synch() 1884 tx_key, rx->key.keys); in tipc_crypto_rcv() 2314 if (unlikely(rx->skey || (key_gen == rx->key_gen && rx->key.keys))) { in tipc_crypto_key_rcv()
|