Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 274) sorted by relevance

1234567891011

/net/mac80211/
A Dkey.c236 if (!key || !key->local->ops->set_key) in ieee80211_key_disable_hw_accel()
358 if (!key) in __ieee80211_set_default_key()
601 if (!key) in ieee80211_key_alloc()
735 memcpy(key->conf.key, key_data, key_len); in ieee80211_key_alloc()
789 if (!key) in ieee80211_key_destroy()
803 if (!key) in ieee80211_key_free_unused()
806 WARN_ON(key->sdata || key->local); in ieee80211_key_free_unused()
953 if (!key) in ieee80211_key_free()
960 ieee80211_key_replace(key->sdata, NULL, key->sta, in ieee80211_key_free()
1003 if (key->sta && key->sta->removed) in ieee80211_key_iter()
[all …]
A Ddebugfs_key.c72 u32 c = key->conf.cipher; in key_algorithm_read()
87 switch (key->conf.cipher) { in key_tx_spec_write()
123 switch (key->conf.cipher) { in key_tx_spec_read()
162 switch (key->conf.cipher) { in key_rx_spec_read()
309 p += scnprintf(p, bufsize + buf - p, "%02x", key->conf.key[i]); in key_key_read()
315 KEY_OPS(key);
339 sta = key->sta; in ieee80211_debugfs_key_add()
343 key->debugfs.stalink = in ieee80211_debugfs_key_add()
357 DEBUGFS_ADD(key); in ieee80211_debugfs_key_add()
363 if (!key) in ieee80211_debugfs_key_remove()
[all …]
A Dwpa.c85 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add()
161 key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ieee80211_rx_h_michael_mic_verify()
197 struct ieee80211_key *key = tx->key; in tkip_encrypt_skb() local
269 struct ieee80211_key *key = rx->key; in ieee80211_crypto_tkip_decrypt() local
430 struct ieee80211_key *key = tx->key; in ccmp_encrypt_skb() local
520 struct ieee80211_key *key = rx->key; in ieee80211_crypto_ccmp_decrypt() local
630 struct ieee80211_key *key = tx->key; in gcmp_encrypt_skb() local
717 struct ieee80211_key *key = rx->key; in ieee80211_crypto_gcmp_decrypt() local
835 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_encrypt() local
883 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_256_encrypt() local
[all …]
A Dtkip.c156 const u8 *tk = &key->conf.key[NL80211_TKIP_DATA_OFFSET_ENCR_KEY]; in ieee80211_compute_tkip_p1k()
178 spin_lock_bh(&key->u.tkip.txlock); in ieee80211_get_tkip_p1k_iv()
181 spin_unlock_bh(&key->u.tkip.txlock); in ieee80211_get_tkip_p1k_iv()
201 const u8 *tk = &key->conf.key[NL80211_TKIP_DATA_OFFSET_ENCR_KEY]; in ieee80211_get_tkip_p2k()
208 spin_lock(&key->u.tkip.txlock); in ieee80211_get_tkip_p2k()
211 spin_unlock(&key->u.tkip.txlock); in ieee80211_get_tkip_p2k()
223 struct ieee80211_key *key, in ieee80211_tkip_encrypt_data() argument
240 struct ieee80211_key *key, in ieee80211_tkip_decrypt_data() argument
249 const u8 *tk = &key->conf.key[NL80211_TKIP_DATA_OFFSET_ENCR_KEY]; in ieee80211_tkip_decrypt_data()
263 if ((keyid >> 6) != key->conf.keyidx) in ieee80211_tkip_decrypt_data()
[all …]
/net/openvswitch/
A Dflow.c694 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
714 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
731 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
740 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
748 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
759 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
787 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
827 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
841 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
855 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
[all …]
A Dactions.c55 key = &keys->key[level - 1]; in clone_key()
56 *key = *key_; in clone_key()
59 return key; in clone_key()
103 da->pkt_key = *key; in add_deferred_actions()
141 invalidate_flow_key(key); in push_mpls()
158 invalidate_flow_key(key); in pop_mpls()
190 key->eth.vlan.tci = 0; in pop_vlan()
191 key->eth.vlan.tpid = 0; in pop_vlan()
1507 key, a); in do_execute_actions()
1566 clone = clone_flow_key ? clone_key(key) : key; in clone_execute()
[all …]
A Dconntrack.c111 switch (ntohs(key->eth.type)) { in key_to_nfproto()
202 key->ct_state = state; in __ovs_ct_update_key()
203 key->ct_zone = zone->id; in __ovs_ct_update_key()
234 key->ct_orig_proto = 0; in __ovs_ct_update_key()
284 struct sw_flow_key *key, in ovs_ct_fill_key() argument
355 key->ct.mark = new_mark; in ovs_ct_set_mark()
553 !!(key->ct_state & in ovs_ct_executed()
640 key->tp.src = src; in ovs_nat_update_key()
662 key->tp.dst = dst; in ovs_nat_update_key()
762 key->ct_state = 0; in __ovs_ct_lookup()
[all …]
A Dopenvswitch_trace.h17 TP_ARGS(dp, skb, key, a, rem),
56 __entry->recirc_id = key->recirc_id;
57 __entry->keyaddr = key;
58 __entry->key_eth_type = key->eth.type;
59 __entry->key_ct_state = key->ct_state;
61 __entry->key_ct_zone = key->ct_zone;
85 const struct sw_flow_key *key,
88 TP_ARGS(dp, skb, key, upcall_info),
126 __entry->recirc_id = key->recirc_id;
127 __entry->keyaddr = key;
[all …]
A Dconntrack.h26 int ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key);
28 void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key,
51 const struct sw_flow_key *key, in ovs_ct_copy_action() argument
64 struct sw_flow_key *key, in ovs_ct_execute() argument
72 struct sw_flow_key *key) in ovs_ct_clear() argument
78 struct sw_flow_key *key, in ovs_ct_fill_key() argument
81 key->ct_state = 0; in ovs_ct_fill_key()
82 key->ct_zone = 0; in ovs_ct_fill_key()
83 key->ct.mark = 0; in ovs_ct_fill_key()
84 memset(&key->ct.labels, 0, sizeof(key->ct.labels)); in ovs_ct_fill_key()
[all …]
A Dflow.h171 return key->eth.type == htons(ETH_P_IPV6) && in sw_flow_key_is_nd()
172 key->ip.proto == NEXTHDR_ICMP && in sw_flow_key_is_nd()
173 key->tp.dst == 0 && in sw_flow_key_is_nd()
174 (key->tp.src == htons(NDISC_NEIGHBOUR_SOLICITATION) || in sw_flow_key_is_nd()
187 struct sw_flow_key key; member
191 struct sw_flow_key *key; member
230 struct sw_flow_key key; member
258 return key->mac_proto & ~SW_FLOW_KEY_INVALID; in ovs_key_mac_proto()
268 return __ovs_mac_header_len(ovs_key_mac_proto(key)); in ovs_mac_header_len()
292 struct sw_flow_key *key);
[all …]
A Dflow_netlink.c1933 memcpy(new_key, key, sizeof(*key)); in ovs_nla_get_identifier()
1971 match.key = key; in ovs_nla_get_flow_metadata()
1976 memset(&key->ct, 0, sizeof(key->ct)); in ovs_nla_get_flow_metadata()
1977 memset(&key->ipv4.ct_orig, 0, sizeof(key->ipv4.ct_orig)); in ovs_nla_get_flow_metadata()
2309 return ovs_nla_put_key(&flow->key, &flow->key, in ovs_nla_put_masked_key()
2316 return ovs_nla_put_key(&flow->key, &flow->mask->key, in ovs_nla_put_mask()
2720 match->key = key; in ovs_match_init()
2724 memset(key, 0, sizeof(*key)); in ovs_match_init()
2727 memset(&mask->key, 0, sizeof(mask->key)); in ovs_match_init()
2828 tun_info->key = key.tun_key; in validate_and_copy_set_tun()
[all …]
/net/ceph/
A Dcrypto.c28 key->key = NULL; in set_secret()
40 if (!key->len) in set_secret()
43 key->key = kmemdup(buf, key->len, GFP_NOIO); in set_secret()
44 if (!key->key) { in set_secret()
59 ret = crypto_sync_skcipher_setkey(key->tfm, key->key, key->len); in set_secret()
83 ceph_decode_copy(p, &key->created, sizeof(key->created)); in ceph_crypto_key_decode()
119 key->type, key->len); in ceph_crypto_key_unarmor()
125 if (key) { in ceph_crypto_key_destroy()
126 kfree_sensitive(key->key); in ceph_crypto_key_destroy()
127 key->key = NULL; in ceph_crypto_key_destroy()
[all …]
A Dceph_common.c155 if (opt1->key && !opt2->key) in ceph_compare_options()
157 if (!opt1->key && opt2->key) in ceph_compare_options()
159 if (opt1->key && opt2->key) { in ceph_compare_options()
160 if (opt1->key->type != opt2->key->type) in ceph_compare_options()
166 if (opt1->key->len != opt2->key->len) in ceph_compare_options()
168 if (opt1->key->key && !opt2->key->key) in ceph_compare_options()
170 if (!opt1->key->key && opt2->key->key) in ceph_compare_options()
172 if (opt1->key->key && opt2->key->key) { in ceph_compare_options()
173 ret = memcmp(opt1->key->key, opt2->key->key, opt1->key->len); in ceph_compare_options()
459 opt->key = kzalloc(sizeof(*opt->key), GFP_KERNEL); in ceph_parse_param()
[all …]
/net/ipv4/
A Dtcp_ao.c122 return key; in tcp_ao_established_key()
891 if (!key) in tcp_ao_syncookie()
1008 if (key) in tcp_inbound_ao_hash()
1025 if (!key) in tcp_inbound_ao_hash()
1261 if (key) in tcp_ao_copy_all_matching()
1268 if (key) in tcp_ao_copy_all_matching()
1395 memcpy(key->key, cmd->key, cmd->keylen); in tcp_ao_parse_crypto()
1430 err = crypto_ahash_setkey(tfm, key->key, key->keylen); in tcp_ao_parse_crypto()
1437 if (tcp_ao_maclen(key) > key->digest_size) in tcp_ao_parse_crypto()
1924 if (key == new_current || key == new_rnext) in tcp_ao_del_cmd()
[all …]
A Dfib_trie.c359 l->key = key; in leaf_new()
1125 tn = tnode_new(key, __fls(key ^ n->key), 1); in fib_insert_node()
1546 index = key ^ n->key; in fib_table_lookup()
1918 key = l->key + 1; in fib_trie_unmerge()
1919 if (key < l->key) in fib_trie_unmerge()
2197 key = l->key + 1; in fib_table_notify()
2199 if (key < l->key) in fib_table_notify()
2356 key = l->key + 1; in fib_table_dump()
2362 if (key < l->key) in fib_table_dump()
2836 key = iter->key; in fib_route_get_idx()
[all …]
A Dtcp_diag.c39 const struct tcp_md5sig_key *key) in tcp_diag_md5sig_fill() argument
41 info->tcpm_family = key->family; in tcp_diag_md5sig_fill()
42 info->tcpm_prefixlen = key->prefixlen; in tcp_diag_md5sig_fill()
43 info->tcpm_keylen = key->keylen; in tcp_diag_md5sig_fill()
44 memcpy(info->tcpm_key, key->key, key->keylen); in tcp_diag_md5sig_fill()
46 if (key->family == AF_INET) in tcp_diag_md5sig_fill()
49 else if (key->family == AF_INET6) in tcp_diag_md5sig_fill()
50 memcpy(&info->tcpm_addr, &key->addr.a6, in tcp_diag_md5sig_fill()
58 const struct tcp_md5sig_key *key; in tcp_diag_put_md5sig() local
76 tcp_diag_md5sig_fill(info++, key); in tcp_diag_put_md5sig()
[all …]
/net/sched/
A Dcls_flower.c96 struct fl_flow_key key; member
1179 u32 key, mask; in fl_set_key_flags() local
1253 opt = (struct geneve_opt *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_geneve_opt()
1334 md = (struct vxlan_metadata *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_vxlan_opt()
1371 md = (struct erspan_metadata *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_erspan_opt()
1480 md = (struct pfcp_metadata *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_pfcp_opt()
1923 fl_set_key_pppoe(tb, &key->pppoe, &mask->pppoe, key, mask); in fl_set_key()
2468 err = fl_set_key(net, tca_opts, tb, &fnew->key, &mask->key, extack); in fl_change()
3114 u32 key, mask; in fl_dump_key_flags() local
3128 key = 0; in fl_dump_key_flags()
[all …]
/net/mac802154/
A Dllsec.c66 mkey = container_of(key->key, struct mac802154_llsec_key, key); in mac802154_llsec_destroy()
120 key = kzalloc(sizeof(*key), GFP_KERNEL); in llsec_key_alloc()
121 if (!key) in llsec_key_alloc()
125 key->key = *template; in llsec_key_alloc()
134 if (crypto_aead_setkey(key->tfm[i], template->key, in llsec_key_alloc()
149 return key; in llsec_key_alloc()
227 if (memcmp(pos->key->key, key->key, in mac802154_llsec_key_add()
237 if (pos->key->frame_types != key->frame_types || in mac802154_llsec_key_add()
238 pos->key->cmd_frame_ids != key->cmd_frame_ids) in mac802154_llsec_key_add()
257 new->key = &mkey->key; in mac802154_llsec_key_add()
[all …]
/net/mctp/
A Droute.c230 key = kzalloc(sizeof(*key), gfp); in mctp_key_alloc()
231 if (!key) in mctp_key_alloc()
258 mctp_dev_release_key(key->dev, key); in mctp_key_unref()
280 if (mctp_key_match(tmp, key->net, key->local_addr, in mctp_key_add()
281 key->peer_addr, key->tag)) { in mctp_key_add()
325 mctp_dev_release_key(key->dev, key); in __mctp_key_done_in()
355 flow->key = key; in mctp_skb_set_flow()
367 key = flow->key; in mctp_flow_prepare_output()
556 if (key->reasm_head || key->reasm_dead) { in mctp_dst_input()
737 if (!key) in mctp_alloc_local_tag()
[all …]
A Daf_mctp.c363 __releases(&key->lock) in __mctp_key_remove()
369 skb = key->reasm_head; in __mctp_key_remove()
370 key->reasm_head = NULL; in __mctp_key_remove()
371 key->reasm_dead = true; in __mctp_key_remove()
372 key->valid = false; in __mctp_key_remove()
373 mctp_dev_release_key(key->dev, key); in __mctp_key_remove()
380 mctp_key_unref(key); in __mctp_key_remove()
521 if (IS_ERR(key)) in mctp_ioctl_alloctag()
522 return PTR_ERR(key); in mctp_ioctl_alloctag()
536 mctp_key_unref(key); in mctp_ioctl_alloctag()
[all …]
/net/tipc/
A Dcrypto.c1165 key = c->key; in tipc_crypto_key_attach()
1190 key.pending = key_next(key.active ?: key.passive); in tipc_crypto_key_attach()
1266 key = rx->key; in tipc_crypto_key_try_align()
1454 key = tx->key; in tipc_crypto_key_revoke()
1560 key = tx->key; in tipc_crypto_timeout()
1579 key = rx->key; in tipc_crypto_timeout()
1584 key.passive = key.active; in tipc_crypto_timeout()
1585 key.active = key.pending; in tipc_crypto_timeout()
1611 key.passive = key.active; in tipc_crypto_timeout()
1833 key = rx->key; in tipc_crypto_rcv()
[all …]
/net/rxrpc/
A Dkey.c224 token->rxgk->key.len = ntohl(key[-1]); in rxrpc_preparse_xdr_yfs_rxgk()
236 memcpy(token->rxgk->key.data, key, token->rxgk->key.len); in rxrpc_preparse_xdr_yfs_rxgk()
575 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument
614 struct key *key; in rxrpc_request_key() local
633 rx->key = key; in rxrpc_request_key()
648 struct key *key; in rxrpc_get_server_data_key() local
680 conn->key = key; in rxrpc_get_server_data_key()
704 struct key *key; in rxrpc_get_null_key() local
711 return key; in rxrpc_get_null_key()
720 return key; in rxrpc_get_null_key()
[all …]
A Dserver_key.c101 static void rxrpc_destroy_s(struct key *key) in rxrpc_destroy_s() argument
106 sec->destroy_server_key(key); in rxrpc_destroy_s()
109 static void rxrpc_describe_s(const struct key *key, struct seq_file *m) in rxrpc_describe_s() argument
113 seq_puts(m, key->description); in rxrpc_describe_s()
115 sec->describe_server_key(key, m); in rxrpc_describe_s()
123 struct key *key; in rxrpc_server_keyring() local
136 if (IS_ERR(key)) { in rxrpc_server_keyring()
138 _leave(" = %ld", PTR_ERR(key)); in rxrpc_server_keyring()
139 return PTR_ERR(key); in rxrpc_server_keyring()
142 rx->securities = key; in rxrpc_server_keyring()
[all …]
A Dsecurity.c75 struct key *key = call->key; in rxrpc_init_client_call_security() local
78 if (!key) in rxrpc_init_client_call_security()
81 ret = key_validate(key); in rxrpc_init_client_call_security()
104 struct key *key = conn->key; in rxrpc_init_client_conn_security() local
167 struct key *key = ERR_PTR(-EKEYREJECTED); in rxrpc_look_up_server_security() local
194 key = ERR_CAST(kref); in rxrpc_look_up_server_security()
198 key = key_ref_to_ptr(kref); in rxrpc_look_up_server_security()
200 ret = key_validate(key); in rxrpc_look_up_server_security()
202 key_put(key); in rxrpc_look_up_server_security()
203 key = ERR_PTR(ret); in rxrpc_look_up_server_security()
[all …]
/net/sctp/
A Dauth.c48 if (!key) in sctp_auth_key_put()
68 if (!key) in sctp_auth_create_key()
71 key->len = key_len; in sctp_auth_create_key()
75 return key; in sctp_auth_create_key()
100 sh_key->key = NULL; in sctp_auth_shkey_destroy()
263 if (ep_key->key) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
367 new->key = sh_key->key; in sctp_auth_asoc_copy_shkeys()
439 return key; in sctp_auth_get_shkey()
852 if (!key) { in sctp_auth_set_key()
[all …]

Completed in 803 milliseconds

1234567891011