Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 40) sorted by relevance

12

/net/rxrpc/
Dkey.c56 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local
74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad()
77 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad()
78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
79 if (!token) in rxrpc_preparse_xdr_rxkad()
82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad()
83 if (!token->kad) { in rxrpc_preparse_xdr_rxkad()
84 kfree(token); in rxrpc_preparse_xdr_rxkad()
88 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad()
89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
[all …]
Dsecurity.c71 struct rxrpc_key_token *token; in rxrpc_init_client_call_security() local
82 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_call_security()
83 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_call_security()
100 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local
106 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_conn_security()
107 if (token->security_index == conn->security->security_index) in rxrpc_init_client_conn_security()
115 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
Drxkad.c101 struct rxrpc_key_token *token) in rxkad_init_connection_security() argument
108 conn->security_ix = token->security_index; in rxkad_init_connection_security()
117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
187 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local
208 token = conn->key->payload.data[0]; in rxkad_prime_packet_security()
209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
295 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local
320 token = call->conn->key->payload.data[0]; in rxkad_secure_packet_encrypt()
321 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
[all …]
Dinsecure.c12 struct rxrpc_key_token *token) in none_init_connection_security() argument
/net/mptcp/
Dtoken.c48 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument
50 return &token_hash[token & token_mask]; in token_bucket()
55 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument
61 if (req->token == token) in __token_lookup_req()
68 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument
74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk()
79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument
81 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy()
82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy()
85 static void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) in mptcp_crypto_key_gen_sha() argument
[all …]
Dtoken_test.c25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic()
26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic()
80 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic()
81 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic()
82 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic()
86 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic()
96 msk->token = req->token; in mptcp_token_test_accept()
98 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept()
102 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept()
119 msk->token = req->token; in mptcp_token_test_destroyed()
[all …]
Dpm_userspace.c180 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_announce() local
187 if (!addr || !token) { in mptcp_nl_cmd_announce()
192 token_val = nla_get_u32(token); in mptcp_nl_cmd_announce()
196 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_announce()
277 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_remove() local
287 if (!id || !token) { in mptcp_nl_cmd_remove()
293 token_val = nla_get_u32(token); in mptcp_nl_cmd_remove()
297 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_remove()
345 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_sf_create() local
355 if (!laddr || !raddr || !token) { in mptcp_nl_cmd_sf_create()
[all …]
Dsyncookies.c24 u32 token; member
62 entry->token = subflow_req->token; in mptcp_join_store_state()
111 msk = mptcp_token_get_sock(net, e->token); in mptcp_token_join_cookie_init_state()
121 subflow_req->token = e->token; in mptcp_token_join_cookie_init_state()
Dcrypto.c31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument
38 if (token) in mptcp_crypto_key_sha()
39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
Dprotocol.h153 u32 token; member
283 u32 token; member
429 u32 token; member
474 u32 token;
873 bool mptcp_token_exists(u32 token);
874 struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token);
879 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn);
937 int mptcp_pm_set_flags(struct net *net, struct nlattr *token,
941 int mptcp_userspace_pm_set_flags(struct net *net, struct nlattr *token,
Dsubflow.c91 msk = mptcp_token_get_sock(sock_net(req_to_sk(req)), subflow_req->token); in subflow_token_join_request()
186 &subflow_req->token, in subflow_check_req()
188 if (mptcp_token_exists(subflow_req->token)) { in subflow_check_req()
211 subflow_req->token = mp_opt.token; in subflow_check_req()
241 pr_debug("token=%u, remote_nonce=%u msk=%p", subflow_req->token, in subflow_check_req()
394 subflow, subflow->token, thmac, subflow->thmac); in subflow_thmac_valid()
1572 subflow->token = msk->token; in __mptcp_subflow_connect()
1984 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
1998 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
Dpm.c70 pr_debug("msk=%p, token=%u side=%d", msk, msk->token, server_side); in mptcp_pm_new_connection()
443 int mptcp_pm_set_flags(struct net *net, struct nlattr *token, in mptcp_pm_set_flags() argument
447 if (token) in mptcp_pm_set_flags()
448 return mptcp_userspace_pm_set_flags(net, token, loc, rem, bkup); in mptcp_pm_set_flags()
DMakefile4 mptcp-y := protocol.o subflow.o options.o token.o crypto.o ctrl.o pm.o diag.o \
DKconfig30 Currently covers the MPTCP crypto and token helpers.
/net/sunrpc/auth_gss/
Dgss_krb5_seal.c75 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument
89 krb5_hdr = (u16 *)token->data; in setup_token_v2()
100 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2()
106 struct xdr_netobj *token) in gss_krb5_get_mic_v2() argument
119 krb5_hdr = setup_token_v2(ctx, token); in gss_krb5_get_mic_v2()
Dgss_krb5_internal.h46 struct xdr_netobj *token);
88 struct xdr_netobj *token);
/net/ipv4/
Dinetpeer.c272 unsigned long now, token; in inet_peer_xrlim_allow() local
278 token = peer->rate_tokens; in inet_peer_xrlim_allow()
280 token += now - peer->rate_last; in inet_peer_xrlim_allow()
282 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow()
283 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow()
284 if (token >= timeout) { in inet_peer_xrlim_allow()
285 token -= timeout; in inet_peer_xrlim_allow()
288 peer->rate_tokens = token; in inet_peer_xrlim_allow()
/net/smc/
Dsmc_cdc.h45 __be32 token; member
215 peer->token = htonl(local->token); in smc_host_msg_to_cdc()
248 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
Dsmc_core.h220 u64 token; member
435 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument
445 if (cur->alert_token_local > token) { in smc_lgr_find_conn()
448 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
Dsmc_diag.c109 .token = conn->alert_token_local, in __smc_diag_dump()
176 dinfo.token = conn->rmb_desc->token; in __smc_diag_dump()
Dsmc_cdc.c155 peer->token = htonl(local->token); in smcr_cdc_msg_send_validation()
453 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
/net/ceph/
Dceph_common.c422 int token, err; in ceph_parse_param() local
425 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param()
426 dout("%s fs_parse '%s' token %d\n", __func__, param->key, token); in ceph_parse_param()
427 if (token < 0) in ceph_parse_param()
428 return token; in ceph_parse_param()
430 switch (token) { in ceph_parse_param()
/net/9p/
Dtrans_rdma.c199 int token; in parse_opts() local
203 token = match_token(p, tokens, args); in parse_opts()
204 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
212 switch (token) { in parse_opts()
Dtrans_fd.c788 int token; in parse_opts() local
792 token = match_token(p, tokens, args); in parse_opts()
793 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts()
801 switch (token) { in parse_opts()
/net/mac80211/
Dspectmgmt.c226 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()

12