/net/rxrpc/ |
D | key.c | 56 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 77 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 79 if (!token) in rxrpc_preparse_xdr_rxkad() 82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 83 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 84 kfree(token); in rxrpc_preparse_xdr_rxkad() 88 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad() 89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad() [all …]
|
D | security.c | 71 struct rxrpc_key_token *token; in rxrpc_init_client_call_security() local 82 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_call_security() 83 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_call_security() 100 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local 106 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_conn_security() 107 if (token->security_index == conn->security->security_index) in rxrpc_init_client_conn_security() 115 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
|
D | rxkad.c | 101 struct rxrpc_key_token *token) in rxkad_init_connection_security() argument 108 conn->security_ix = token->security_index; in rxkad_init_connection_security() 117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 187 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 208 token = conn->key->payload.data[0]; in rxkad_prime_packet_security() 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 295 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 320 token = call->conn->key->payload.data[0]; in rxkad_secure_packet_encrypt() 321 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() [all …]
|
D | insecure.c | 12 struct rxrpc_key_token *token) in none_init_connection_security() argument
|
/net/mptcp/ |
D | token.c | 48 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument 50 return &token_hash[token & token_mask]; in token_bucket() 55 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument 61 if (req->token == token) in __token_lookup_req() 68 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument 74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk() 79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument 81 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy() 82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy() 85 static void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) in mptcp_crypto_key_gen_sha() argument [all …]
|
D | token_test.c | 25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic() 26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic() 80 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic() 81 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic() 82 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 86 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 96 msk->token = req->token; in mptcp_token_test_accept() 98 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 102 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 119 msk->token = req->token; in mptcp_token_test_destroyed() [all …]
|
D | pm_userspace.c | 180 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_announce() local 187 if (!addr || !token) { in mptcp_nl_cmd_announce() 192 token_val = nla_get_u32(token); in mptcp_nl_cmd_announce() 196 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_announce() 277 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_remove() local 287 if (!id || !token) { in mptcp_nl_cmd_remove() 293 token_val = nla_get_u32(token); in mptcp_nl_cmd_remove() 297 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_nl_cmd_remove() 345 struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_nl_cmd_sf_create() local 355 if (!laddr || !raddr || !token) { in mptcp_nl_cmd_sf_create() [all …]
|
D | syncookies.c | 24 u32 token; member 62 entry->token = subflow_req->token; in mptcp_join_store_state() 111 msk = mptcp_token_get_sock(net, e->token); in mptcp_token_join_cookie_init_state() 121 subflow_req->token = e->token; in mptcp_token_join_cookie_init_state()
|
D | crypto.c | 31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument 38 if (token) in mptcp_crypto_key_sha() 39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
|
D | protocol.h | 153 u32 token; member 283 u32 token; member 429 u32 token; member 474 u32 token; 873 bool mptcp_token_exists(u32 token); 874 struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token); 879 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn); 937 int mptcp_pm_set_flags(struct net *net, struct nlattr *token, 941 int mptcp_userspace_pm_set_flags(struct net *net, struct nlattr *token,
|
D | subflow.c | 91 msk = mptcp_token_get_sock(sock_net(req_to_sk(req)), subflow_req->token); in subflow_token_join_request() 186 &subflow_req->token, in subflow_check_req() 188 if (mptcp_token_exists(subflow_req->token)) { in subflow_check_req() 211 subflow_req->token = mp_opt.token; in subflow_check_req() 241 pr_debug("token=%u, remote_nonce=%u msk=%p", subflow_req->token, in subflow_check_req() 394 subflow, subflow->token, thmac, subflow->thmac); in subflow_thmac_valid() 1572 subflow->token = msk->token; in __mptcp_subflow_connect() 1984 new_ctx->token = subflow_req->token; in subflow_ulp_clone() 1998 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
|
D | pm.c | 70 pr_debug("msk=%p, token=%u side=%d", msk, msk->token, server_side); in mptcp_pm_new_connection() 443 int mptcp_pm_set_flags(struct net *net, struct nlattr *token, in mptcp_pm_set_flags() argument 447 if (token) in mptcp_pm_set_flags() 448 return mptcp_userspace_pm_set_flags(net, token, loc, rem, bkup); in mptcp_pm_set_flags()
|
D | Makefile | 4 mptcp-y := protocol.o subflow.o options.o token.o crypto.o ctrl.o pm.o diag.o \
|
D | Kconfig | 30 Currently covers the MPTCP crypto and token helpers.
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_seal.c | 75 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument 89 krb5_hdr = (u16 *)token->data; in setup_token_v2() 100 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 106 struct xdr_netobj *token) in gss_krb5_get_mic_v2() argument 119 krb5_hdr = setup_token_v2(ctx, token); in gss_krb5_get_mic_v2()
|
D | gss_krb5_internal.h | 46 struct xdr_netobj *token); 88 struct xdr_netobj *token);
|
/net/ipv4/ |
D | inetpeer.c | 272 unsigned long now, token; in inet_peer_xrlim_allow() local 278 token = peer->rate_tokens; in inet_peer_xrlim_allow() 280 token += now - peer->rate_last; in inet_peer_xrlim_allow() 282 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow() 283 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow() 284 if (token >= timeout) { in inet_peer_xrlim_allow() 285 token -= timeout; in inet_peer_xrlim_allow() 288 peer->rate_tokens = token; in inet_peer_xrlim_allow()
|
/net/smc/ |
D | smc_cdc.h | 45 __be32 token; member 215 peer->token = htonl(local->token); in smc_host_msg_to_cdc() 248 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
|
D | smc_core.h | 220 u64 token; member 435 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument 445 if (cur->alert_token_local > token) { in smc_lgr_find_conn() 448 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
|
D | smc_diag.c | 109 .token = conn->alert_token_local, in __smc_diag_dump() 176 dinfo.token = conn->rmb_desc->token; in __smc_diag_dump()
|
D | smc_cdc.c | 155 peer->token = htonl(local->token); in smcr_cdc_msg_send_validation() 453 conn = smc_lgr_find_conn(ntohl(cdc->token), lgr); in smc_cdc_rx_handler()
|
/net/ceph/ |
D | ceph_common.c | 422 int token, err; in ceph_parse_param() local 425 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param() 426 dout("%s fs_parse '%s' token %d\n", __func__, param->key, token); in ceph_parse_param() 427 if (token < 0) in ceph_parse_param() 428 return token; in ceph_parse_param() 430 switch (token) { in ceph_parse_param()
|
/net/9p/ |
D | trans_rdma.c | 199 int token; in parse_opts() local 203 token = match_token(p, tokens, args); in parse_opts() 204 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 212 switch (token) { in parse_opts()
|
D | trans_fd.c | 788 int token; in parse_opts() local 792 token = match_token(p, tokens, args); in parse_opts() 793 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 801 switch (token) { in parse_opts()
|
/net/mac80211/ |
D | spectmgmt.c | 226 msr_report->u.action.u.measurement.msr_elem.token = request_ie->token; in ieee80211_send_refuse_measurement_request()
|