Searched refs:tk (Results 1 – 4 of 4) sorted by relevance
| /net/mac80211/ |
| A D | tkip.c | 120 ppk[0] += tkipS(ppk[5] ^ get_unaligned_le16(tk + 0)); in tkip_mixing_phase2() 121 ppk[1] += tkipS(ppk[0] ^ get_unaligned_le16(tk + 2)); in tkip_mixing_phase2() 122 ppk[2] += tkipS(ppk[1] ^ get_unaligned_le16(tk + 4)); in tkip_mixing_phase2() 123 ppk[3] += tkipS(ppk[2] ^ get_unaligned_le16(tk + 6)); in tkip_mixing_phase2() 124 ppk[4] += tkipS(ppk[3] ^ get_unaligned_le16(tk + 8)); in tkip_mixing_phase2() 125 ppk[5] += tkipS(ppk[4] ^ get_unaligned_le16(tk + 10)); in tkip_mixing_phase2() 168 tkip_mixing_phase1(tk, ctx, sdata->vif.addr, iv32); in ieee80211_compute_tkip_p1k() 191 tkip_mixing_phase1(tk, &ctx, ta, iv32); in ieee80211_get_tkip_rx_p1k() 210 tkip_mixing_phase2(tk, ctx, iv16, p2k); in ieee80211_get_tkip_p2k() 292 tkip_mixing_phase1(tk, &rx_ctx->ctx, ta, iv32); in ieee80211_tkip_decrypt_data() [all …]
|
| /net/bluetooth/ |
| A D | smp.c | 106 u8 tk[16]; /* SMP Temporary Key */ member 860 memset(smp->tk, 0, sizeof(smp->tk)); in tk_request() 925 memset(smp->tk, 0, sizeof(smp->tk)); in tk_request() 928 put_unaligned_le32(passkey, smp->tk); in tk_request() 1003 smp_s1(smp->tk, smp->rrnd, smp->prnd, stk); in smp_random() 1019 smp_s1(smp->tk, smp->prnd, smp->rrnd, stk); in smp_random() 1234 if (smp_h6(smp->tfm_cmac, smp->tk, brle, smp->tk)) in sc_generate_ltk() 1665 memset(smp->tk, 0, sizeof(smp->tk)); in smp_user_confirm_reply() 1667 put_unaligned_le32(value, smp->tk); in smp_user_confirm_reply() 2528 memcpy(smp->tk, rp->ltk, sizeof(smp->tk)); in smp_cmd_encrypt_info() [all …]
|
| A D | hci_core.c | 1324 u8 tk[16], u8 enc_size, __le16 ediv, __le64 rand) in hci_add_ltk() 1341 memcpy(key->val, tk, sizeof(key->val)); in hci_add_ltk()
|
| /net/sunrpc/ |
| A D | sched.c | 899 static bool xprt_needs_memalloc(struct rpc_xprt *xprt, struct rpc_task *tk) in xprt_needs_memalloc() argument 905 return test_bit(XPRT_LOCKED, &xprt->state) && xprt->snd_task == tk; in xprt_needs_memalloc()
|
Completed in 22 milliseconds