Home
last modified time | relevance | path

Searched refs:tkey (Results 1 – 22 of 22) sorted by relevance

/linux/drivers/staging/rtl8192e/
H A Drtllib_crypt_tkip.c255 struct rtllib_tkip_data *tkey = priv; in rtllib_tkip_encrypt() local
272 if (!tkey->tx_phase1_done) { in rtllib_tkip_encrypt()
273 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in rtllib_tkip_encrypt()
274 tkey->tx_iv32); in rtllib_tkip_encrypt()
275 tkey->tx_phase1_done = 1; in rtllib_tkip_encrypt()
277 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, in rtllib_tkip_encrypt()
278 tkey->tx_iv16); in rtllib_tkip_encrypt()
280 tkey->tx_phase1_done = 1; in rtllib_tkip_encrypt()
289 *pos++ = Hi8(tkey->tx_iv16); in rtllib_tkip_encrypt()
290 *pos++ = (Hi8(tkey->tx_iv16) | 0x20) & 0x7F; in rtllib_tkip_encrypt()
[all …]
/linux/net/wireless/
H A Dlib80211_crypt_tkip.c286 struct lib80211_tkip_data *tkey = priv; in lib80211_tkip_hdr() local
298 if (!tkey->tx_phase1_done) { in lib80211_tkip_hdr()
299 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in lib80211_tkip_hdr()
300 tkey->tx_iv32); in lib80211_tkip_hdr()
301 tkey->tx_phase1_done = 1; in lib80211_tkip_hdr()
303 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); in lib80211_tkip_hdr()
312 *pos++ = (tkey->key_idx << 6) | (1 << 5) /* Ext IV included */ ; in lib80211_tkip_hdr()
313 *pos++ = tkey->tx_iv32 & 0xff; in lib80211_tkip_hdr()
314 *pos++ = (tkey->tx_iv32 >> 8) & 0xff; in lib80211_tkip_hdr()
315 *pos++ = (tkey->tx_iv32 >> 16) & 0xff; in lib80211_tkip_hdr()
[all …]
/linux/samples/bpf/
H A Dtc_l2_redirect_kern.c61 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_forward() local
112 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_redirect() local
143 tkey.tunnel_id = 10000; in _l2_to_iptun_ingress_redirect()
144 tkey.tunnel_ttl = 64; in _l2_to_iptun_ingress_redirect()
145 tkey.remote_ipv4 = 0x0a020166; /* 10.2.1.102 */ in _l2_to_iptun_ingress_redirect()
146 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0); in _l2_to_iptun_ingress_redirect()
153 struct bpf_tunnel_key tkey = {}; in _l2_to_ip6tun_ingress_redirect() local
194 tkey.tunnel_id = 10000; in _l2_to_ip6tun_ingress_redirect()
195 tkey.tunnel_ttl = 64; in _l2_to_ip6tun_ingress_redirect()
197 tkey.remote_ipv6[0] = _htonl(0x2401db02); in _l2_to_ip6tun_ingress_redirect()
[all …]
/linux/security/keys/encrypted-keys/
H A Dmasterkey_trusted.c31 struct key *tkey; in request_trusted_key() local
33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
34 if (IS_ERR(tkey)) in request_trusted_key()
37 down_read(&tkey->sem); in request_trusted_key()
38 tpayload = tkey->payload.data[0]; in request_trusted_key()
42 return tkey; in request_trusted_key()
/linux/net/sched/
H A Dact_pedit.c395 struct tc_pedit_key *tkey; in tcf_pedit_act() local
411 tkey = parms->tcfp_keys; in tcf_pedit_act()
414 for (i = parms->tcfp_nkeys; i > 0; i--, tkey++) { in tcf_pedit_act()
415 int offset = tkey->off; in tcf_pedit_act()
434 if (tkey->offmask) { in tcf_pedit_act()
437 if (!offset_valid(skb, hoffset + tkey->at)) { in tcf_pedit_act()
439 hoffset + tkey->at); in tcf_pedit_act()
442 d = skb_header_pointer(skb, hoffset + tkey->at, in tcf_pedit_act()
447 offset += (*d & tkey->offmask) >> tkey->shift; in tcf_pedit_act()
466 val = tkey->val; in tcf_pedit_act()
[all …]
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_l4lb_noinline.c327 struct bpf_tunnel_key tkey = {}; in process_packet() local
345 tkey.tunnel_ttl = 64; in process_packet()
430 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet()
437 tkey.remote_ipv4 = dst->dst; in process_packet()
445 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet()
446 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
H A Dtest_l4lb.c328 struct bpf_tunnel_key tkey = {}; in process_packet() local
346 tkey.tunnel_ttl = 64; in process_packet()
431 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet()
438 tkey.remote_ipv4 = dst->dst; in process_packet()
446 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet()
447 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
H A Dtest_l4lb_noinline_dynptr.c332 struct bpf_tunnel_key tkey = {}; in process_packet() local
350 tkey.tunnel_ttl = 64; in process_packet()
437 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet()
444 tkey.remote_ipv4 = dst->dst; in process_packet()
452 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet()
453 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
/linux/include/net/
H A Dtcp_ao.h183 const u8 *tkey, int hash_offset, u32 sne);
209 struct tcp_ao_key *key, const u8 *tkey,
235 const u8 *tkey, int hash_offset, u32 sne);
254 const u8 *tkey, int hash_offset, u32 sne);
H A Dtcp.h2261 const u8 *tkey, int hash_offset, u32 sne);
/linux/net/l2tp/
H A Dl2tp_netlink.c495 unsigned long tkey; member
502 unsigned long key = cbd->tkey; in l2tp_nl_cmd_tunnel_dump()
523 cbd->tkey = key; in l2tp_nl_cmd_tunnel_dump()
845 unsigned long tkey = cbd->tkey; in l2tp_nl_cmd_session_dump() local
850 tunnel = l2tp_tunnel_get_next(net, &tkey); in l2tp_nl_cmd_session_dump()
858 tkey++; in l2tp_nl_cmd_session_dump()
878 cbd->tkey = tkey; in l2tp_nl_cmd_session_dump()
H A Dl2tp_debugfs.c37 unsigned long tkey; /* lookup key of current tunnel */ member
49 pd->tunnel = l2tp_tunnel_get_next(pd->net, &pd->tkey); in l2tp_dfs_next_tunnel()
50 pd->tkey++; in l2tp_dfs_next_tunnel()
H A Dl2tp_ppp.c1400 unsigned long tkey; /* lookup key of current tunnel */ member
1413 pd->tunnel = l2tp_tunnel_get_next(net, &pd->tkey); in pppol2tp_next_tunnel()
1414 pd->tkey++; in pppol2tp_next_tunnel()
/linux/arch/arm64/boot/dts/qcom/
H A Dmsm8916-samsung-a3u-eur.dts142 tkey_en_default: tkey-en-default-state {
150 tkey_led_en_default: tkey-led-en-default-state {
H A Dmsm8916-samsung-serranove.dts156 i2c-tkey {
477 tkey_default: tkey-default-state {
485 tkey_en_default: tkey-en-default-state {
493 tkey_i2c_default: tkey-i2c-default-state {
501 tkey_led_en_default: tkey-led-en-default-state {
H A Dmsm8939-samsung-a7.dts171 i2c-tkey {
595 tkey_default: tkey-default-state {
602 tkey_en_default: tkey-en-default-state {
609 tkey_i2c_default: tkey-i2c-default-state {
616 tkey_led_en_default: tkey-led-en-default-state {
H A Dmsm8916-samsung-a5u-eur.dts85 tkey_en_default: tkey-en-default-state {
H A Dmsm8916-samsung-e2015-common.dtsi101 tkey_en_default: tkey-en-default-state {
H A Dmsm8916-samsung-a2015-common.dtsi146 i2c-tkey {
537 tkey_default: tkey-default-state {
545 tkey_i2c_default: tkey-i2c-default-state {
H A Dmsm8916-samsung-grandmax.dts28 /delete-node/ i2c-tkey;
/linux/net/ipv6/
H A Dtcp_ao.c136 const u8 *tkey, int hash_offset, u32 sne) in tcp_v6_ao_hash_skb() argument
138 return tcp_ao_hash_skb(AF_INET6, ao_hash, key, sk, skb, tkey, in tcp_v6_ao_hash_skb()
/linux/net/ipv4/
H A Dtcp_ao.c560 struct tcp_ao_key *key, const u8 *tkey, in tcp_ao_hash_hdr() argument
577 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) in tcp_ao_hash_hdr()
623 const u8 *tkey, int hash_offset, u32 sne) in tcp_ao_hash_skb() argument
637 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) in tcp_ao_hash_skb()
673 const u8 *tkey, int hash_offset, u32 sne) in tcp_v4_ao_hash_skb() argument
676 tkey, hash_offset, sne); in tcp_v4_ao_hash_skb()