Home
last modified time | relevance | path

Searched refs:token (Results 1 – 24 of 24) sorted by relevance

/net/rxrpc/
Dkey.c92 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local
110 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad()
113 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad()
114 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
115 if (!token) in rxrpc_preparse_xdr_rxkad()
118 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
119 if (!token->kad) { in rxrpc_preparse_xdr_rxkad()
120 kfree(token); in rxrpc_preparse_xdr_rxkad()
124 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad()
125 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
[all …]
Drxkad.c55 struct rxrpc_key_token *token; in rxkad_init_connection_security() local
60 token = conn->params.key->payload.data[0]; in rxkad_init_connection_security()
61 conn->security_ix = token->security_index; in rxkad_init_connection_security()
70 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
71 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
104 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local
125 token = conn->params.key->payload.data[0]; in rxkad_prime_packet_security()
126 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
221 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local
241 token = call->conn->params.key->payload.data[0]; in rxkad_secure_packet_encrypt()
[all …]
Dsecurity.c71 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local
84 token = key->payload.data[0]; in rxrpc_init_client_conn_security()
85 if (!token) in rxrpc_init_client_conn_security()
88 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security()
/net/sunrpc/auth_gss/
Dgss_krb5_seal.c73 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument
79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token()
81 ptr = (u16 *)token->data; in setup_token()
99 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument
112 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2()
122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2()
128 struct xdr_netobj *token) in gss_get_mic_v1() argument
143 ptr = setup_token(ctx, token); in gss_get_mic_v1()
167 struct xdr_netobj *token) in gss_get_mic_v2() argument
180 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2()
[all …]
/net/ipv4/
Dinetpeer.c275 unsigned long now, token; in inet_peer_xrlim_allow() local
281 token = peer->rate_tokens; in inet_peer_xrlim_allow()
283 token += now - peer->rate_last; in inet_peer_xrlim_allow()
285 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow()
286 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow()
287 if (token >= timeout) { in inet_peer_xrlim_allow()
288 token -= timeout; in inet_peer_xrlim_allow()
291 peer->rate_tokens = token; in inet_peer_xrlim_allow()
/net/ceph/
Dceph_common.c402 int token, intval; in ceph_parse_options() local
406 token = match_token((char *)c, opt_tokens, argstr); in ceph_parse_options()
407 if (token < 0 && parse_extra_token) { in ceph_parse_options()
416 if (token < Opt_last_int) { in ceph_parse_options()
422 dout("got int token %d val %d\n", token, intval); in ceph_parse_options()
423 } else if (token > Opt_last_int && token < Opt_last_string) { in ceph_parse_options()
424 dout("got string token %d val %s\n", token, in ceph_parse_options()
427 dout("got token %d\n", token); in ceph_parse_options()
429 switch (token) { in ceph_parse_options()
563 BUG_ON(token); in ceph_parse_options()
/net/smc/
Dsmc_core.h168 u64 token; member
258 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument
268 if (cur->alert_token_local > token) { in smc_lgr_find_conn()
271 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
Dsmc_cdc.h45 __be32 token; member
232 peer->token = htonl(local->token); in smc_host_msg_to_cdc()
265 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
Dsmc_ism.c35 rc = smcd->ops->move_data(smcd, pos->token, pos->index, pos->signal, in smc_ism_write()
151 dmb.dmb_tok = dmb_desc->token; in smc_ism_unregister_dmb()
173 dmb_desc->token = dmb.dmb_tok; in smc_ism_register_dmb()
Dsmc_diag.c114 .token = conn->alert_token_local, in __smc_diag_dump()
178 .token = conn->rmb_desc->token, in __smc_diag_dump()
Dsmc_ism.h30 u64 token; /* Token of DMB */ member
Dsmc_clc.c488 cclc.token = conn->rmb_desc->token; in smc_clc_send_confirm()
560 aclc.token = conn->rmb_desc->token; in smc_clc_send_accept()
Dsmc_clc.h143 u64 token; /* DMB token */ member
Dsmc.h105 u32 token; /* alert_token */ member
Dsmc_cdc.c367 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
Dsmc_core.c70 u32 token = conn->alert_token_local; in smc_lgr_add_alert_token() local
78 if (cur->alert_token_local > token) in smc_lgr_add_alert_token()
Dsmc_tx.c256 pos.token = conn->peer_token; in smcd_tx_ism_write()
Daf_smc.c426 smc->conn.local_tx_ctrl.token = ntohl(clc->rmbe_alert_token); in smcr_conn_save_peer_info()
438 smc->conn.peer_token = clc->token; in smcd_conn_save_peer_info()
/net/9p/
Dtrans_rdma.c199 int token; in parse_opts() local
203 token = match_token(p, tokens, args); in parse_opts()
204 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
212 switch (token) { in parse_opts()
Dtrans_fd.c763 int token; in parse_opts() local
767 token = match_token(p, tokens, args); in parse_opts()
768 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
776 switch (token) { in parse_opts()
Dclient.c156 int token, r; in parse_opts() local
159 token = match_token(p, tokens, args); in parse_opts()
160 switch (token) { in parse_opts()
/net/mac80211/
Dspectmgmt.c220 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
/net/ipv6/
Daddrconf.c438 ndev->token = in6addr_any; in ipv6_add_dev()
2784 if (!ipv6_addr_any(&in6_dev->token)) { in addrconf_prefix_rcv()
2787 in6_dev->token.s6_addr + 8, 8); in addrconf_prefix_rcv()
5582 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla)); in inet6_fill_ifla6_attrs()
5614 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token) in inet6_set_iftoken() argument
5623 if (!token) in inet6_set_iftoken()
5634 BUILD_BUG_ON(sizeof(token->s6_addr) != 16); in inet6_set_iftoken()
5635 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8); in inet6_set_iftoken()
5639 clear_token = ipv6_addr_any(token); in inet6_set_iftoken()
Dip6_fib.c132 static __be32 addr_bit_set(const void *token, int fn_bit) in addr_bit_set() argument
134 const __be32 *addr = token; in addr_bit_set()