| /linux/drivers/staging/rtl8192e/ |
| A D | rtllib_crypt_tkip.c | 273 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in rtllib_tkip_encrypt() 277 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, in rtllib_tkip_encrypt() 376 (iv32 == tkey->rx_iv32 && iv16 <= tkey->rx_iv16)) && in rtllib_tkip_decrypt() 389 if (iv32 != tkey->rx_iv32 || !tkey->rx_phase1_done) { in rtllib_tkip_decrypt() 390 tkip_mixing_phase1(tkey->rx_ttak, tkey->key, in rtllib_tkip_decrypt() 394 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16); in rtllib_tkip_decrypt() 520 if (michael_mic(tkey->tx_tfm_michael, &tkey->key[16], tkey->tx_hdr, in rtllib_michael_mic_add() 564 if (michael_mic(tkey->rx_tfm_michael, &tkey->key[24], tkey->rx_hdr, in rtllib_michael_mic_verify() 588 tkey->rx_iv32 = tkey->rx_iv32_new; in rtllib_michael_mic_verify() 589 tkey->rx_iv16 = tkey->rx_iv16_new; in rtllib_michael_mic_verify() [all …]
|
| /linux/net/wireless/ |
| A D | lib80211_crypt_tkip.c | 299 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in lib80211_tkip_hdr() 303 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); in lib80211_tkip_hdr() 318 tkey->tx_iv16++; in lib80211_tkip_hdr() 424 hdr->addr2, tkey->rx_iv32, tkey->rx_iv16, in lib80211_tkip_decrypt() 431 if (iv32 != tkey->rx_iv32 || !tkey->rx_phase1_done) { in lib80211_tkip_decrypt() 435 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16); in lib80211_tkip_decrypt() 556 if (michael_mic(tkey->tx_tfm_michael, &tkey->key[16], tkey->tx_hdr, in lib80211_michael_mic_add() 594 if (michael_mic(tkey->rx_tfm_michael, &tkey->key[24], tkey->rx_hdr, in lib80211_michael_mic_verify() 612 tkey->rx_iv32 = tkey->rx_iv32_new; in lib80211_michael_mic_verify() 613 tkey->rx_iv16 = tkey->rx_iv16_new; in lib80211_michael_mic_verify() [all …]
|
| /linux/samples/bpf/ |
| A D | tc_l2_redirect_kern.c | 61 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_forward() local 112 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_redirect() local 143 tkey.tunnel_id = 10000; in _l2_to_iptun_ingress_redirect() 144 tkey.tunnel_ttl = 64; in _l2_to_iptun_ingress_redirect() 146 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0); in _l2_to_iptun_ingress_redirect() 153 struct bpf_tunnel_key tkey = {}; in _l2_to_ip6tun_ingress_redirect() local 194 tkey.tunnel_id = 10000; in _l2_to_ip6tun_ingress_redirect() 195 tkey.tunnel_ttl = 64; in _l2_to_ip6tun_ingress_redirect() 198 tkey.remote_ipv6[1] = 0; in _l2_to_ip6tun_ingress_redirect() 199 tkey.remote_ipv6[2] = 0; in _l2_to_ip6tun_ingress_redirect() [all …]
|
| /linux/security/keys/encrypted-keys/ |
| A D | masterkey_trusted.c | 31 struct key *tkey; in request_trusted_key() local 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key() 34 if (IS_ERR(tkey)) in request_trusted_key() 37 down_read(&tkey->sem); in request_trusted_key() 38 tpayload = tkey->payload.data[0]; in request_trusted_key() 42 return tkey; in request_trusted_key()
|
| /linux/net/sched/ |
| A D | act_pedit.c | 395 struct tc_pedit_key *tkey; in tcf_pedit_act() local 411 tkey = parms->tcfp_keys; in tcf_pedit_act() 414 for (i = parms->tcfp_nkeys; i > 0; i--, tkey++) { in tcf_pedit_act() 415 int offset = tkey->off; in tcf_pedit_act() 434 if (tkey->offmask) { in tcf_pedit_act() 437 if (!offset_valid(skb, hoffset + tkey->at)) { in tcf_pedit_act() 439 hoffset + tkey->at); in tcf_pedit_act() 447 offset += (*d & tkey->offmask) >> tkey->shift; in tcf_pedit_act() 466 val = tkey->val; in tcf_pedit_act() 469 val = (*ptr + tkey->val) & ~tkey->mask; in tcf_pedit_act() [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| A D | test_l4lb.c | 328 struct bpf_tunnel_key tkey = {}; in process_packet() local 346 tkey.tunnel_ttl = 64; in process_packet() 431 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet() 438 tkey.remote_ipv4 = dst->dst; in process_packet() 446 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet() 447 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
|
| A D | test_l4lb_noinline.c | 327 struct bpf_tunnel_key tkey = {}; in process_packet() local 345 tkey.tunnel_ttl = 64; in process_packet() 430 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet() 437 tkey.remote_ipv4 = dst->dst; in process_packet() 445 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet() 446 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
|
| A D | test_l4lb_noinline_dynptr.c | 332 struct bpf_tunnel_key tkey = {}; in process_packet() local 350 tkey.tunnel_ttl = 64; in process_packet() 437 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet() 444 tkey.remote_ipv4 = dst->dst; in process_packet() 452 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet() 453 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
|
| /linux/include/net/ |
| A D | tcp_ao.h | 183 const u8 *tkey, int hash_offset, u32 sne); 209 struct tcp_ao_key *key, const u8 *tkey, 235 const u8 *tkey, int hash_offset, u32 sne); 254 const u8 *tkey, int hash_offset, u32 sne);
|
| A D | tcp.h | 2261 const u8 *tkey, int hash_offset, u32 sne);
|
| /linux/net/l2tp/ |
| A D | l2tp_netlink.c | 495 unsigned long tkey; member 502 unsigned long key = cbd->tkey; in l2tp_nl_cmd_tunnel_dump() 523 cbd->tkey = key; in l2tp_nl_cmd_tunnel_dump() 845 unsigned long tkey = cbd->tkey; in l2tp_nl_cmd_session_dump() local 850 tunnel = l2tp_tunnel_get_next(net, &tkey); in l2tp_nl_cmd_session_dump() 858 tkey++; in l2tp_nl_cmd_session_dump() 878 cbd->tkey = tkey; in l2tp_nl_cmd_session_dump()
|
| A D | l2tp_debugfs.c | 37 unsigned long tkey; /* lookup key of current tunnel */ member 49 pd->tunnel = l2tp_tunnel_get_next(pd->net, &pd->tkey); in l2tp_dfs_next_tunnel() 50 pd->tkey++; in l2tp_dfs_next_tunnel()
|
| A D | l2tp_ppp.c | 1400 unsigned long tkey; /* lookup key of current tunnel */ member 1413 pd->tunnel = l2tp_tunnel_get_next(net, &pd->tkey); in pppol2tp_next_tunnel() 1414 pd->tkey++; in pppol2tp_next_tunnel()
|
| /linux/arch/arm64/boot/dts/qcom/ |
| A D | msm8916-samsung-a3u-eur.dts | 142 tkey_en_default: tkey-en-default-state { 150 tkey_led_en_default: tkey-led-en-default-state {
|
| A D | msm8916-samsung-serranove.dts | 156 i2c-tkey { 477 tkey_default: tkey-default-state { 485 tkey_en_default: tkey-en-default-state { 493 tkey_i2c_default: tkey-i2c-default-state { 501 tkey_led_en_default: tkey-led-en-default-state {
|
| A D | msm8939-samsung-a7.dts | 171 i2c-tkey { 595 tkey_default: tkey-default-state { 602 tkey_en_default: tkey-en-default-state { 609 tkey_i2c_default: tkey-i2c-default-state { 616 tkey_led_en_default: tkey-led-en-default-state {
|
| A D | msm8916-samsung-a5u-eur.dts | 85 tkey_en_default: tkey-en-default-state {
|
| A D | msm8916-samsung-e2015-common.dtsi | 101 tkey_en_default: tkey-en-default-state {
|
| A D | msm8916-samsung-a2015-common.dtsi | 146 i2c-tkey { 537 tkey_default: tkey-default-state { 545 tkey_i2c_default: tkey-i2c-default-state {
|
| A D | msm8916-samsung-grandmax.dts | 28 /delete-node/ i2c-tkey;
|
| /linux/net/ipv6/ |
| A D | tcp_ao.c | 136 const u8 *tkey, int hash_offset, u32 sne) in tcp_v6_ao_hash_skb() argument 138 return tcp_ao_hash_skb(AF_INET6, ao_hash, key, sk, skb, tkey, in tcp_v6_ao_hash_skb()
|
| /linux/net/ipv4/ |
| A D | tcp_ao.c | 560 struct tcp_ao_key *key, const u8 *tkey, in tcp_ao_hash_hdr() argument 577 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) in tcp_ao_hash_hdr() 623 const u8 *tkey, int hash_offset, u32 sne) in tcp_ao_hash_skb() argument 637 if (crypto_ahash_setkey(crypto_ahash_reqtfm(hp.req), tkey, tkey_len)) in tcp_ao_hash_skb() 673 const u8 *tkey, int hash_offset, u32 sne) in tcp_v4_ao_hash_skb() argument 676 tkey, hash_offset, sne); in tcp_v4_ao_hash_skb()
|