Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 38) sorted by relevance

12

/net/rxrpc/
Dkey.c56 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local
74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad()
77 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad()
78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
79 if (!token) in rxrpc_preparse_xdr_rxkad()
82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
83 if (!token->kad) { in rxrpc_preparse_xdr_rxkad()
84 kfree(token); in rxrpc_preparse_xdr_rxkad()
88 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad()
89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
[all …]
Dsecurity.c71 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local
84 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_conn_security()
85 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_conn_security()
94 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
Drxkad.c101 struct rxrpc_key_token *token) in rxkad_init_connection_security() argument
108 conn->security_ix = token->security_index; in rxkad_init_connection_security()
117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
187 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local
208 token = conn->params.key->payload.data[0]; in rxkad_prime_packet_security()
209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
308 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local
335 token = call->conn->params.key->payload.data[0]; in rxkad_secure_packet_encrypt()
336 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
[all …]
Dinsecure.c12 struct rxrpc_key_token *token) in none_init_connection_security() argument
/net/mptcp/
Dtoken.c48 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument
50 return &token_hash[token & token_mask]; in token_bucket()
55 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument
61 if (req->token == token) in __token_lookup_req()
68 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument
74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk()
79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument
81 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy()
82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy()
85 static void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) in mptcp_crypto_key_gen_sha() argument
[all …]
Dtoken_test.c25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic()
26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic()
77 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic()
78 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic()
79 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic()
83 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic()
93 msk->token = req->token; in mptcp_token_test_accept()
95 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept()
99 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept()
116 msk->token = req->token; in mptcp_token_test_destroyed()
[all …]
Dpm_userspace.c164 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_announce() local
171 if (!addr || !token) { in mptcp_nl_cmd_announce()
176 token_val = nla_get_u32(token); in mptcp_nl_cmd_announce()
180 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_announce()
261 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_remove() local
271 if (!id || !token) { in mptcp_nl_cmd_remove()
277 token_val = nla_get_u32(token); in mptcp_nl_cmd_remove()
281 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_remove()
329 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_sf_create() local
339 if (!laddr || !raddr || !token) { in mptcp_nl_cmd_sf_create()
[all …]
Dsyncookies.c24 u32 token; member
62 entry->token = subflow_req->token; in mptcp_join_store_state()
111 msk = mptcp_token_get_sock(net, e->token); in mptcp_token_join_cookie_init_state()
121 subflow_req->token = e->token; in mptcp_token_join_cookie_init_state()
Dcrypto.c31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument
38 if (token) in mptcp_crypto_key_sha()
39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
Dprotocol.h145 u32 token; member
271 u32 token; member
406 u32 token; member
450 u32 token;
763 bool mptcp_token_exists(u32 token);
764 struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token);
769 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn);
825 int mptcp_userspace_pm_set_flags(struct net *net, struct nlattr *token,
Dsubflow.c90 msk = mptcp_token_get_sock(sock_net(req_to_sk(req)), subflow_req->token); in subflow_token_join_request()
181 &subflow_req->token, in subflow_check_req()
183 if (mptcp_token_exists(subflow_req->token)) { in subflow_check_req()
206 subflow_req->token = mp_opt.token; in subflow_check_req()
236 pr_debug("token=%u, remote_nonce=%u msk=%p", subflow_req->token, in subflow_check_req()
348 subflow, subflow->token, thmac, subflow->thmac); in subflow_thmac_valid()
1461 subflow->token = msk->token; in __mptcp_subflow_connect()
1865 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
1877 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
DMakefile4 mptcp-y := protocol.o subflow.o options.o token.o crypto.o ctrl.o pm.o diag.o \
DKconfig30 Currently covers the MPTCP crypto and token helpers.
Ddiag.c54 nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_LOC, sf->token) || in subflow_get_info()
Dpm_netlink.c1926 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_set_flags() local
1953 if (token) in mptcp_nl_cmd_set_flags()
1955 token, &addr, &remote, bkup); in mptcp_nl_cmd_set_flags()
2048 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_put_token_and_ssk()
2106 int err = nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token); in mptcp_event_created()
2134 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_addr_removed()
2169 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token)) in mptcp_event_addr_announced()
2233 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token) < 0) in mptcp_event()
/net/sunrpc/auth_gss/
Dgss_krb5_seal.c73 setup_token(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token() argument
79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token()
81 ptr = (u16 *)token->data; in setup_token()
99 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument
112 krb5_hdr = ptr = (u16 *)token->data; in setup_token_v2()
122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2()
128 struct xdr_netobj *token) in gss_get_mic_v1() argument
143 ptr = setup_token(ctx, token); in gss_get_mic_v1()
167 struct xdr_netobj *token) in gss_get_mic_v2() argument
180 krb5_hdr = setup_token_v2(ctx, token); in gss_get_mic_v2()
[all …]
/net/ipv4/
Dinetpeer.c272 unsigned long now, token; in inet_peer_xrlim_allow() local
278 token = peer->rate_tokens; in inet_peer_xrlim_allow()
280 token += now - peer->rate_last; in inet_peer_xrlim_allow()
282 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow()
283 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow()
284 if (token >= timeout) { in inet_peer_xrlim_allow()
285 token -= timeout; in inet_peer_xrlim_allow()
288 peer->rate_tokens = token; in inet_peer_xrlim_allow()
/net/smc/
Dsmc_cdc.h45 __be32 token; member
215 peer->token = htonl(local->token); in smc_host_msg_to_cdc()
248 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
Dsmc_core.h196 u64 token; member
404 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument
414 if (cur->alert_token_local > token) { in smc_lgr_find_conn()
417 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
Dsmc_diag.c109 .token = conn->alert_token_local, in __smc_diag_dump()
175 dinfo.token = conn->rmb_desc->token; in __smc_diag_dump()
Dsmc_cdc.c155 peer->token = htonl(local->token); in smcr_cdc_msg_send_validation()
453 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
/net/ceph/
Dceph_common.c422 int token, err; in ceph_parse_param() local
425 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param()
426 dout("%s fs_parse '%s' token %d\n", __func__, param->key, token); in ceph_parse_param()
427 if (token < 0) in ceph_parse_param()
428 return token; in ceph_parse_param()
430 switch (token) { in ceph_parse_param()
/net/9p/
Dtrans_rdma.c200 int token; in parse_opts() local
204 token = match_token(p, tokens, args); in parse_opts()
205 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
213 switch (token) { in parse_opts()
Dtrans_fd.c789 int token; in parse_opts() local
793 token = match_token(p, tokens, args); in parse_opts()
794 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
802 switch (token) { in parse_opts()
/net/mac80211/
Dspectmgmt.c226 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()

12