/net/rxrpc/ |
D | ar-key.c | 92 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 109 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 112 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 113 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 114 if (!token) in rxrpc_preparse_xdr_rxkad() 117 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 118 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 119 kfree(token); in rxrpc_preparse_xdr_rxkad() 123 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad() 124 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad() [all …]
|
D | rxkad.c | 65 struct rxrpc_key_token *token; in rxkad_init_connection_security() local 70 token = conn->key->payload.data[0]; in rxkad_init_connection_security() 71 conn->security_ix = token->security_index; in rxkad_init_connection_security() 80 if (crypto_blkcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 81 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 115 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 128 token = conn->key->payload.data[0]; in rxkad_prime_packet_security() 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 202 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 224 token = call->conn->key->payload.data[0]; in rxkad_secure_packet_encrypt() [all …]
|
D | ar-security.c | 126 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local 140 token = key->payload.data[0]; in rxrpc_init_client_conn_security() 141 if (!token) in rxrpc_init_client_conn_security() 144 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_seal.c | 75 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument 81 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token() 83 ptr = (u16 *)token->data; in setup_token() 101 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument 114 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2() 124 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 130 struct xdr_netobj *token) in gss_get_mic_v1() argument 145 ptr = setup_token(ctx, token); in gss_get_mic_v1() 171 struct xdr_netobj *token) in gss_get_mic_v2() argument 184 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2() [all …]
|
/net/ceph/ |
D | ceph_common.c | 375 int token, intval, ret; in ceph_parse_options() local 379 token = match_token((char *)c, opt_tokens, argstr); in ceph_parse_options() 380 if (token < 0 && parse_extra_token) { in ceph_parse_options() 389 if (token < Opt_last_int) { in ceph_parse_options() 396 dout("got int token %d val %d\n", token, intval); in ceph_parse_options() 397 } else if (token > Opt_last_int && token < Opt_last_string) { in ceph_parse_options() 398 dout("got string token %d val %s\n", token, in ceph_parse_options() 401 dout("got token %d\n", token); in ceph_parse_options() 403 switch (token) { in ceph_parse_options() 513 BUG_ON(token); in ceph_parse_options()
|
/net/ipv4/ |
D | inetpeer.c | 496 unsigned long now, token; in inet_peer_xrlim_allow() local 502 token = peer->rate_tokens; in inet_peer_xrlim_allow() 504 token += now - peer->rate_last; in inet_peer_xrlim_allow() 506 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow() 507 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow() 508 if (token >= timeout) { in inet_peer_xrlim_allow() 509 token -= timeout; in inet_peer_xrlim_allow() 512 peer->rate_tokens = token; in inet_peer_xrlim_allow()
|
/net/9p/ |
D | trans_rdma.c | 195 int token; in parse_opts() local 199 token = match_token(p, tokens, args); in parse_opts() 200 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 208 switch (token) { in parse_opts()
|
D | trans_fd.c | 753 int token; in parse_opts() local 757 token = match_token(p, tokens, args); in parse_opts() 758 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 766 switch (token) { in parse_opts()
|
D | client.c | 146 int token, r; in parse_opts() local 149 token = match_token(p, tokens, args); in parse_opts() 150 switch (token) { in parse_opts()
|
/net/mac80211/ |
D | spectmgmt.c | 220 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
|
/net/ipv6/ |
D | addrconf.c | 443 ndev->token = in6addr_any; in ipv6_add_dev() 2495 if (!ipv6_addr_any(&in6_dev->token)) { in addrconf_prefix_rcv() 2498 in6_dev->token.s6_addr + 8, 8); in addrconf_prefix_rcv() 4891 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla)); in inet6_fill_ifla6_attrs() 4923 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token) in inet6_set_iftoken() argument 4932 if (!token) in inet6_set_iftoken() 4934 if (ipv6_addr_any(token)) in inet6_set_iftoken() 4945 BUILD_BUG_ON(sizeof(token->s6_addr) != 16); in inet6_set_iftoken() 4946 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8); in inet6_set_iftoken()
|
D | ip6_fib.c | 130 static __be32 addr_bit_set(const void *token, int fn_bit) in addr_bit_set() argument 132 const __be32 *addr = token; in addr_bit_set()
|