/linux-6.1.9/drivers/staging/rtl8192e/ |
D | rtllib_crypt_tkip.c | 269 struct rtllib_tkip_data *tkey = priv; in rtllib_tkip_encrypt() local 286 if (!tkey->tx_phase1_done) { in rtllib_tkip_encrypt() 287 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in rtllib_tkip_encrypt() 288 tkey->tx_iv32); in rtllib_tkip_encrypt() 289 tkey->tx_phase1_done = 1; in rtllib_tkip_encrypt() 291 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, in rtllib_tkip_encrypt() 292 tkey->tx_iv16); in rtllib_tkip_encrypt() 294 tkey->tx_phase1_done = 1; in rtllib_tkip_encrypt() 303 *pos++ = Hi8(tkey->tx_iv16); in rtllib_tkip_encrypt() 304 *pos++ = (Hi8(tkey->tx_iv16) | 0x20) & 0x7F; in rtllib_tkip_encrypt() [all …]
|
/linux-6.1.9/net/wireless/ |
D | lib80211_crypt_tkip.c | 286 struct lib80211_tkip_data *tkey = priv; in lib80211_tkip_hdr() local 298 if (!tkey->tx_phase1_done) { in lib80211_tkip_hdr() 299 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in lib80211_tkip_hdr() 300 tkey->tx_iv32); in lib80211_tkip_hdr() 301 tkey->tx_phase1_done = 1; in lib80211_tkip_hdr() 303 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); in lib80211_tkip_hdr() 312 *pos++ = (tkey->key_idx << 6) | (1 << 5) /* Ext IV included */ ; in lib80211_tkip_hdr() 313 *pos++ = tkey->tx_iv32 & 0xff; in lib80211_tkip_hdr() 314 *pos++ = (tkey->tx_iv32 >> 8) & 0xff; in lib80211_tkip_hdr() 315 *pos++ = (tkey->tx_iv32 >> 16) & 0xff; in lib80211_tkip_hdr() [all …]
|
/linux-6.1.9/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_tkip.c | 271 struct ieee80211_tkip_data *tkey = priv; in ieee80211_tkip_encrypt() local 286 if (!tkey->tx_phase1_done) { in ieee80211_tkip_encrypt() 287 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2, in ieee80211_tkip_encrypt() 288 tkey->tx_iv32); in ieee80211_tkip_encrypt() 289 tkey->tx_phase1_done = 1; in ieee80211_tkip_encrypt() 291 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16); in ieee80211_tkip_encrypt() 293 tkey->tx_phase1_done = 1; in ieee80211_tkip_encrypt() 302 *pos++ = Hi8(tkey->tx_iv16); in ieee80211_tkip_encrypt() 303 *pos++ = (Hi8(tkey->tx_iv16) | 0x20) & 0x7F; in ieee80211_tkip_encrypt() 304 *pos++ = Lo8(tkey->tx_iv16); in ieee80211_tkip_encrypt() [all …]
|
/linux-6.1.9/samples/bpf/ |
D | tc_l2_redirect_kern.c | 61 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_forward() local 112 struct bpf_tunnel_key tkey = {}; in _l2_to_iptun_ingress_redirect() local 143 tkey.tunnel_id = 10000; in _l2_to_iptun_ingress_redirect() 144 tkey.tunnel_ttl = 64; in _l2_to_iptun_ingress_redirect() 145 tkey.remote_ipv4 = 0x0a020166; /* 10.2.1.102 */ in _l2_to_iptun_ingress_redirect() 146 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0); in _l2_to_iptun_ingress_redirect() 153 struct bpf_tunnel_key tkey = {}; in _l2_to_ip6tun_ingress_redirect() local 194 tkey.tunnel_id = 10000; in _l2_to_ip6tun_ingress_redirect() 195 tkey.tunnel_ttl = 64; in _l2_to_ip6tun_ingress_redirect() 197 tkey.remote_ipv6[0] = _htonl(0x2401db02); in _l2_to_ip6tun_ingress_redirect() [all …]
|
/linux-6.1.9/security/keys/encrypted-keys/ |
D | masterkey_trusted.c | 31 struct key *tkey; in request_trusted_key() local 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key() 34 if (IS_ERR(tkey)) in request_trusted_key() 37 down_read(&tkey->sem); in request_trusted_key() 38 tpayload = tkey->payload.data[0]; in request_trusted_key() 42 return tkey; in request_trusted_key()
|
/linux-6.1.9/net/sched/ |
D | act_pedit.c | 341 struct tc_pedit_key *tkey = p->tcfp_keys; in tcf_pedit_act() local 347 for (i = p->tcfp_nkeys; i > 0; i--, tkey++) { in tcf_pedit_act() 349 int offset = tkey->off; in tcf_pedit_act() 368 if (tkey->offmask) { in tcf_pedit_act() 371 if (!offset_valid(skb, hoffset + tkey->at)) { in tcf_pedit_act() 373 hoffset + tkey->at); in tcf_pedit_act() 376 d = skb_header_pointer(skb, hoffset + tkey->at, in tcf_pedit_act() 380 offset += (*d & tkey->offmask) >> tkey->shift; in tcf_pedit_act() 401 val = tkey->val; in tcf_pedit_act() 404 val = (*ptr + tkey->val) & ~tkey->mask; in tcf_pedit_act() [all …]
|
/linux-6.1.9/tools/testing/selftests/bpf/progs/ |
D | test_l4lb_noinline.c | 327 struct bpf_tunnel_key tkey = {}; in process_packet() local 345 tkey.tunnel_ttl = 64; in process_packet() 430 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet() 437 tkey.remote_ipv4 = dst->dst; in process_packet() 445 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet() 446 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
|
D | test_l4lb.c | 328 struct bpf_tunnel_key tkey = {}; in process_packet() local 346 tkey.tunnel_ttl = 64; in process_packet() 431 memcpy(tkey.remote_ipv6, dst->dstv6, 16); in process_packet() 438 tkey.remote_ipv4 = dst->dst; in process_packet() 446 bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), tun_flag); in process_packet() 447 *(u32 *)eth->eth_dest = tkey.remote_ipv4; in process_packet()
|
/linux-6.1.9/arch/arm64/boot/dts/qcom/ |
D | msm8916-samsung-a3u-eur.dts | 116 tkey_en_default: tkey-en-default { 124 tkey_led_en_default: tkey-led-en-default {
|
D | msm8916-samsung-serranove.dts | 144 i2c-tkey { 497 tkey_default: tkey-default { 505 tkey_en_default: tkey-en-default { 513 tkey_i2c_default: tkey-i2c-default { 521 tkey_led_en_default: tkey-led-en-default {
|
D | msm8916-samsung-a5u-eur.dts | 65 tkey_en_default: tkey-en-default {
|
D | msm8916-samsung-a2015-common.dtsi | 100 i2c-tkey { 440 tkey_default: tkey-default { 448 tkey_i2c_default: tkey-i2c-default {
|
D | msm8916-samsung-e2015-common.dtsi | 78 tkey_en_default: tkey-en-default {
|
D | msm8916-samsung-grandmax.dts | 28 /delete-node/ i2c-tkey;
|