Home
last modified time | relevance | path

Searched refs:token (Results 1 – 12 of 12) sorted by relevance

/net/rxrpc/
Dar-key.c92 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local
109 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad()
112 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad()
113 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
114 if (!token) in rxrpc_preparse_xdr_rxkad()
117 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
118 if (!token->kad) { in rxrpc_preparse_xdr_rxkad()
119 kfree(token); in rxrpc_preparse_xdr_rxkad()
123 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad()
124 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
[all …]
Drxkad.c65 struct rxrpc_key_token *token; in rxkad_init_connection_security() local
70 token = conn->key->payload.data[0]; in rxkad_init_connection_security()
71 conn->security_ix = token->security_index; in rxkad_init_connection_security()
80 if (crypto_blkcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
81 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
115 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local
128 token = conn->key->payload.data[0]; in rxkad_prime_packet_security()
129 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
202 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local
224 token = call->conn->key->payload.data[0]; in rxkad_secure_packet_encrypt()
[all …]
Dar-security.c126 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local
140 token = key->payload.data[0]; in rxrpc_init_client_conn_security()
141 if (!token) in rxrpc_init_client_conn_security()
144 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security()
/net/sunrpc/auth_gss/
Dgss_krb5_seal.c75 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument
81 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token()
83 ptr = (u16 *)token->data; in setup_token()
101 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument
114 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2()
124 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2()
130 struct xdr_netobj *token) in gss_get_mic_v1() argument
145 ptr = setup_token(ctx, token); in gss_get_mic_v1()
171 struct xdr_netobj *token) in gss_get_mic_v2() argument
184 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2()
[all …]
/net/ceph/
Dceph_common.c375 int token, intval, ret; in ceph_parse_options() local
379 token = match_token((char *)c, opt_tokens, argstr); in ceph_parse_options()
380 if (token < 0 && parse_extra_token) { in ceph_parse_options()
389 if (token < Opt_last_int) { in ceph_parse_options()
396 dout("got int token %d val %d\n", token, intval); in ceph_parse_options()
397 } else if (token > Opt_last_int && token < Opt_last_string) { in ceph_parse_options()
398 dout("got string token %d val %s\n", token, in ceph_parse_options()
401 dout("got token %d\n", token); in ceph_parse_options()
403 switch (token) { in ceph_parse_options()
513 BUG_ON(token); in ceph_parse_options()
/net/ipv4/
Dinetpeer.c496 unsigned long now, token; in inet_peer_xrlim_allow() local
502 token = peer->rate_tokens; in inet_peer_xrlim_allow()
504 token += now - peer->rate_last; in inet_peer_xrlim_allow()
506 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow()
507 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow()
508 if (token >= timeout) { in inet_peer_xrlim_allow()
509 token -= timeout; in inet_peer_xrlim_allow()
512 peer->rate_tokens = token; in inet_peer_xrlim_allow()
/net/9p/
Dtrans_rdma.c195 int token; in parse_opts() local
199 token = match_token(p, tokens, args); in parse_opts()
200 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
208 switch (token) { in parse_opts()
Dtrans_fd.c753 int token; in parse_opts() local
757 token = match_token(p, tokens, args); in parse_opts()
758 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
766 switch (token) { in parse_opts()
Dclient.c146 int token, r; in parse_opts() local
149 token = match_token(p, tokens, args); in parse_opts()
150 switch (token) { in parse_opts()
/net/mac80211/
Dspectmgmt.c220 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
/net/ipv6/
Daddrconf.c443 ndev->token = in6addr_any; in ipv6_add_dev()
2495 if (!ipv6_addr_any(&in6_dev->token)) { in addrconf_prefix_rcv()
2498 in6_dev->token.s6_addr + 8, 8); in addrconf_prefix_rcv()
4891 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla)); in inet6_fill_ifla6_attrs()
4923 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token) in inet6_set_iftoken() argument
4932 if (!token) in inet6_set_iftoken()
4934 if (ipv6_addr_any(token)) in inet6_set_iftoken()
4945 BUILD_BUG_ON(sizeof(token->s6_addr) != 16); in inet6_set_iftoken()
4946 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8); in inet6_set_iftoken()
Dip6_fib.c130 static __be32 addr_bit_set(const void *token, int fn_bit) in addr_bit_set() argument
132 const __be32 *addr = token; in addr_bit_set()