/net/rxrpc/ |
D | key.c | 56 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 77 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 79 if (!token) in rxrpc_preparse_xdr_rxkad() 82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 83 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 84 kfree(token); in rxrpc_preparse_xdr_rxkad() 88 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad() 89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad() [all …]
|
D | security.c | 71 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local 84 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_conn_security() 85 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security() 94 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
|
D | rxkad.c | 101 struct rxrpc_key_token *token) in rxkad_init_connection_security() argument 108 conn->security_ix = token->security_index; in rxkad_init_connection_security() 117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 187 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 208 token = conn->params.key->payload.data[0]; in rxkad_prime_packet_security() 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 308 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 335 token = call->conn->params.key->payload.data[0]; in rxkad_secure_packet_encrypt() 336 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() [all …]
|
D | insecure.c | 12 struct rxrpc_key_token *token) in none_init_connection_security() argument
|
/net/mptcp/ |
D | token.c | 48 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument 50 return &token_hash[token & token_mask]; in token_bucket() 55 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument 61 if (req->token == token) in __token_lookup_req() 68 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument 74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk() 79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument 81 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy() 82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy() 85 static void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) in mptcp_crypto_key_gen_sha() argument [all …]
|
D | token_test.c | 25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic() 26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic() 77 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic() 78 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic() 79 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 83 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 93 msk->token = req->token; in mptcp_token_test_accept() 95 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 99 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 116 msk->token = req->token; in mptcp_token_test_destroyed() [all …]
|
D | pm_userspace.c | 164 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_announce() local 171 if (!addr || !token) { in mptcp_nl_cmd_announce() 176 token_val = nla_get_u32(token); in mptcp_nl_cmd_announce() 180 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_announce() 261 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_remove() local 271 if (!id || !token) { in mptcp_nl_cmd_remove() 277 token_val = nla_get_u32(token); in mptcp_nl_cmd_remove() 281 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_remove() 329 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_sf_create() local 339 if (!laddr || !raddr || !token) { in mptcp_nl_cmd_sf_create() [all …]
|
D | syncookies.c | 24 u32 token; member 62 entry->token = subflow_req->token; in mptcp_join_store_state() 111 msk = mptcp_token_get_sock(net, e->token); in mptcp_token_join_cookie_init_state() 121 subflow_req->token = e->token; in mptcp_token_join_cookie_init_state()
|
D | crypto.c | 31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument 38 if (token) in mptcp_crypto_key_sha() 39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
|
D | protocol.h | 145 u32 token; member 271 u32 token; member 406 u32 token; member 450 u32 token; 763 bool mptcp_token_exists(u32 token); 764 struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token); 769 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn); 825 int mptcp_userspace_pm_set_flags(struct net *net, struct nlattr *token,
|
D | subflow.c | 90 msk = mptcp_token_get_sock(sock_net(req_to_sk(req)), subflow_req->token); in subflow_token_join_request() 181 &subflow_req->token, in subflow_check_req() 183 if (mptcp_token_exists(subflow_req->token)) { in subflow_check_req() 206 subflow_req->token = mp_opt.token; in subflow_check_req() 236 pr_debug("token=%u, remote_nonce=%u msk=%p", subflow_req->token, in subflow_check_req() 348 subflow, subflow->token, thmac, subflow->thmac); in subflow_thmac_valid() 1461 subflow->token = msk->token; in __mptcp_subflow_connect() 1865 new_ctx->token = subflow_req->token; in subflow_ulp_clone() 1877 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
|
D | Makefile | 4 mptcp-y := protocol.o subflow.o options.o token.o crypto.o ctrl.o pm.o diag.o \
|
D | Kconfig | 30 Currently covers the MPTCP crypto and token helpers.
|
D | diag.c | 54 nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_LOC, sf->token) || in subflow_get_info()
|
D | pm_netlink.c | 1926 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_set_flags() local 1953 if (token) in mptcp_nl_cmd_set_flags() 1955 token, &addr, &remote, bkup); in mptcp_nl_cmd_set_flags() 2048 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_put_token_and_ssk() 2106 int err = nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token); in mptcp_event_created() 2134 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_addr_removed() 2169 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_addr_announced() 2233 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token) < 0) in mptcp_event()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_seal.c | 73 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument 79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token() 81 ptr = (u16 *)token->data; in setup_token() 99 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument 112 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2() 122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 128 struct xdr_netobj *token) in gss_get_mic_v1() argument 143 ptr = setup_token(ctx, token); in gss_get_mic_v1() 167 struct xdr_netobj *token) in gss_get_mic_v2() argument 180 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2() [all …]
|
/net/ipv4/ |
D | inetpeer.c | 272 unsigned long now, token; in inet_peer_xrlim_allow() local 278 token = peer->rate_tokens; in inet_peer_xrlim_allow() 280 token += now - peer->rate_last; in inet_peer_xrlim_allow() 282 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow() 283 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow() 284 if (token >= timeout) { in inet_peer_xrlim_allow() 285 token -= timeout; in inet_peer_xrlim_allow() 288 peer->rate_tokens = token; in inet_peer_xrlim_allow()
|
/net/smc/ |
D | smc_cdc.h | 45 __be32 token; member 215 peer->token = htonl(local->token); in smc_host_msg_to_cdc() 248 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
|
D | smc_core.h | 196 u64 token; member 404 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument 414 if (cur->alert_token_local > token) { in smc_lgr_find_conn() 417 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
|
D | smc_diag.c | 109 .token = conn->alert_token_local, in __smc_diag_dump() 175 dinfo.token = conn->rmb_desc->token; in __smc_diag_dump()
|
D | smc_cdc.c | 155 peer->token = htonl(local->token); in smcr_cdc_msg_send_validation() 453 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
|
/net/ceph/ |
D | ceph_common.c | 422 int token, err; in ceph_parse_param() local 425 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param() 426 dout("%s fs_parse '%s' token %d\n", __func__, param->key, token); in ceph_parse_param() 427 if (token < 0) in ceph_parse_param() 428 return token; in ceph_parse_param() 430 switch (token) { in ceph_parse_param()
|
/net/9p/ |
D | trans_rdma.c | 200 int token; in parse_opts() local 204 token = match_token(p, tokens, args); in parse_opts() 205 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 213 switch (token) { in parse_opts()
|
D | trans_fd.c | 789 int token; in parse_opts() local 793 token = match_token(p, tokens, args); in parse_opts() 794 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 802 switch (token) { in parse_opts()
|
/net/mac80211/ |
D | spectmgmt.c | 226 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
|