/net/rxrpc/ |
D | key.c | 92 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 110 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 113 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 114 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 115 if (!token) in rxrpc_preparse_xdr_rxkad() 118 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 119 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 120 kfree(token); in rxrpc_preparse_xdr_rxkad() 124 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad() 125 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad() [all …]
|
D | rxkad.c | 55 struct rxrpc_key_token *token; in rxkad_init_connection_security() local 60 token = conn->params.key->payload.data[0]; in rxkad_init_connection_security() 61 conn->security_ix = token->security_index; in rxkad_init_connection_security() 70 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 71 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 104 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 125 token = conn->params.key->payload.data[0]; in rxkad_prime_packet_security() 126 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 221 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 241 token = call->conn->params.key->payload.data[0]; in rxkad_secure_packet_encrypt() [all …]
|
D | security.c | 71 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local 84 token = key->payload.data[0]; in rxrpc_init_client_conn_security() 85 if (!token) in rxrpc_init_client_conn_security() 88 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_seal.c | 73 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument 79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token() 81 ptr = (u16 *)token->data; in setup_token() 99 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument 112 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2() 122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 128 struct xdr_netobj *token) in gss_get_mic_v1() argument 143 ptr = setup_token(ctx, token); in gss_get_mic_v1() 167 struct xdr_netobj *token) in gss_get_mic_v2() argument 180 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2() [all …]
|
/net/ipv4/ |
D | inetpeer.c | 275 unsigned long now, token; in inet_peer_xrlim_allow() local 281 token = peer->rate_tokens; in inet_peer_xrlim_allow() 283 token += now - peer->rate_last; in inet_peer_xrlim_allow() 285 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow() 286 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow() 287 if (token >= timeout) { in inet_peer_xrlim_allow() 288 token -= timeout; in inet_peer_xrlim_allow() 291 peer->rate_tokens = token; in inet_peer_xrlim_allow()
|
/net/ceph/ |
D | ceph_common.c | 402 int token, intval; in ceph_parse_options() local 406 token = match_token((char *)c, opt_tokens, argstr); in ceph_parse_options() 407 if (token < 0 && parse_extra_token) { in ceph_parse_options() 416 if (token < Opt_last_int) { in ceph_parse_options() 422 dout("got int token %d val %d\n", token, intval); in ceph_parse_options() 423 } else if (token > Opt_last_int && token < Opt_last_string) { in ceph_parse_options() 424 dout("got string token %d val %s\n", token, in ceph_parse_options() 427 dout("got token %d\n", token); in ceph_parse_options() 429 switch (token) { in ceph_parse_options() 563 BUG_ON(token); in ceph_parse_options()
|
/net/smc/ |
D | smc_core.h | 168 u64 token; member 258 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument 268 if (cur->alert_token_local > token) { in smc_lgr_find_conn() 271 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
|
D | smc_cdc.h | 45 __be32 token; member 232 peer->token = htonl(local->token); in smc_host_msg_to_cdc() 265 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
|
D | smc_ism.c | 35 rc = smcd->ops->move_data(smcd, pos->token, pos->index, pos->signal, in smc_ism_write() 151 dmb.dmb_tok = dmb_desc->token; in smc_ism_unregister_dmb() 173 dmb_desc->token = dmb.dmb_tok; in smc_ism_register_dmb()
|
D | smc_diag.c | 114 .token = conn->alert_token_local, in __smc_diag_dump() 178 .token = conn->rmb_desc->token, in __smc_diag_dump()
|
D | smc_ism.h | 30 u64 token; /* Token of DMB */ member
|
D | smc_clc.c | 488 cclc.token = conn->rmb_desc->token; in smc_clc_send_confirm() 560 aclc.token = conn->rmb_desc->token; in smc_clc_send_accept()
|
D | smc_clc.h | 143 u64 token; /* DMB token */ member
|
D | smc.h | 105 u32 token; /* alert_token */ member
|
D | smc_cdc.c | 367 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
|
D | smc_core.c | 70 u32 token = conn->alert_token_local; in smc_lgr_add_alert_token() local 78 if (cur->alert_token_local > token) in smc_lgr_add_alert_token()
|
D | smc_tx.c | 256 pos.token = conn->peer_token; in smcd_tx_ism_write()
|
D | af_smc.c | 426 smc->conn.local_tx_ctrl.token = ntohl(clc->rmbe_alert_token); in smcr_conn_save_peer_info() 438 smc->conn.peer_token = clc->token; in smcd_conn_save_peer_info()
|
/net/9p/ |
D | trans_rdma.c | 199 int token; in parse_opts() local 203 token = match_token(p, tokens, args); in parse_opts() 204 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 212 switch (token) { in parse_opts()
|
D | trans_fd.c | 763 int token; in parse_opts() local 767 token = match_token(p, tokens, args); in parse_opts() 768 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 776 switch (token) { in parse_opts()
|
D | client.c | 156 int token, r; in parse_opts() local 159 token = match_token(p, tokens, args); in parse_opts() 160 switch (token) { in parse_opts()
|
/net/mac80211/ |
D | spectmgmt.c | 220 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
|
/net/ipv6/ |
D | addrconf.c | 438 ndev->token = in6addr_any; in ipv6_add_dev() 2784 if (!ipv6_addr_any(&in6_dev->token)) { in addrconf_prefix_rcv() 2787 in6_dev->token.s6_addr + 8, 8); in addrconf_prefix_rcv() 5582 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla)); in inet6_fill_ifla6_attrs() 5614 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token) in inet6_set_iftoken() argument 5623 if (!token) in inet6_set_iftoken() 5634 BUILD_BUG_ON(sizeof(token->s6_addr) != 16); in inet6_set_iftoken() 5635 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8); in inet6_set_iftoken() 5639 clear_token = ipv6_addr_any(token); in inet6_set_iftoken()
|
D | ip6_fib.c | 132 static __be32 addr_bit_set(const void *token, int fn_bit) in addr_bit_set() argument 134 const __be32 *addr = token; in addr_bit_set()
|