| /net/rxrpc/ |
| A D | key.c | 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 79 if (!token) in rxrpc_preparse_xdr_rxkad() 110 token->kad->ticket[0], token->kad->ticket[1], in rxrpc_preparse_xdr_rxkad() 205 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_yfs_rxgk() 225 token->rxgk->key.data = token->rxgk->_key; in rxrpc_preparse_xdr_yfs_rxgk() 503 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse() 544 for (; token; token = next) { in rxrpc_free_token_list() 590 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_describe() 753 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_read() [all …]
|
| A D | security.c | 74 struct rxrpc_key_token *token; in rxrpc_init_client_call_security() local 85 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_call_security() 86 sec = rxrpc_security_lookup(token->security_index); in rxrpc_init_client_call_security() 103 struct rxrpc_key_token *token; in rxrpc_init_client_conn_security() local 109 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_init_client_conn_security() 110 if (token->security_index == conn->security->security_index) in rxrpc_init_client_conn_security() 118 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
|
| A D | rxkad.c | 101 struct rxrpc_key_token *token) in rxkad_init_connection_security() argument 108 conn->security_ix = token->security_index; in rxkad_init_connection_security() 195 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 216 token = conn->key->payload.data[0]; in rxkad_prime_packet_security() 303 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 325 token = call->conn->key->payload.data[0]; in rxkad_secure_packet_encrypt() 491 const struct rxrpc_key_token *token; in rxkad_verify_packet_2() local 864 const struct rxrpc_key_token *token; in rxkad_respond_to_challenge() local 877 token = conn->key->payload.data[0]; in rxkad_respond_to_challenge() 882 token->kad->ticket_len; in rxkad_respond_to_challenge() [all …]
|
| A D | rxgk_app.c | 46 struct rxrpc_key_token *token; in rxgk_yfs_decode_ticket() local 154 token = key->payload.data[0]; in rxgk_yfs_decode_ticket() 155 token->no_leak_key = true; in rxgk_yfs_decode_ticket()
|
| A D | rxgk.c | 234 struct rxrpc_key_token *token) in rxgk_init_connection_security() argument 242 conn->security_ix = token->security_index; in rxgk_init_connection_security() 243 conn->security_level = token->rxgk->level; in rxgk_init_connection_security() 250 gk = rxgk_generate_transport_key(conn, token->rxgk, conn->rxgk.key_number, in rxgk_init_connection_security() 1184 struct rxrpc_key_token *token; in rxgk_verify_response() local 1249 token = key->payload.data[0]; in rxgk_verify_response() 1250 conn->security_level = token->rxgk->level; in rxgk_verify_response() 1253 gk = rxgk_generate_transport_key(conn, token->rxgk, sp->hdr.cksum, GFP_NOFS); in rxgk_verify_response()
|
| /net/mptcp/ |
| A D | token.c | 61 if (req->token == token) in __token_lookup_req() 74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk() 82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy() 112 u32 token; in mptcp_token_new_request() local 115 &subflow_req->token, in mptcp_token_new_request() 121 token = subflow_req->token; in mptcp_token_new_request() 175 WRITE_ONCE(msk->token, subflow->token); in mptcp_token_new_connect() 223 if (READ_ONCE(msk->token) == token) in mptcp_token_exists() 259 if (READ_ONCE(msk->token) != token || in mptcp_token_get_sock() 266 if (READ_ONCE(msk->token) != token || in mptcp_token_get_sock() [all …]
|
| A D | token_test.c | 25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic() 26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic() 85 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic() 86 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic() 87 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 91 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 101 msk->token = req->token; in mptcp_token_test_accept() 103 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 107 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 124 msk->token = req->token; in mptcp_token_test_destroyed() [all …]
|
| A D | syncookies.c | 24 u32 token; member 62 entry->token = subflow_req->token; in mptcp_join_store_state() 111 msk = mptcp_token_get_sock(net, e->token); in mptcp_token_join_cookie_init_state() 121 subflow_req->token = e->token; in mptcp_token_join_cookie_init_state()
|
| A D | crypto.c | 31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument 38 if (token) in mptcp_crypto_key_sha() 39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
|
| A D | pm_netlink.c | 352 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token))) in mptcp_event_put_token_and_ssk() 410 int err = nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)); in mptcp_event_created() 438 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token))) in mptcp_event_addr_removed() 473 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token))) in mptcp_event_addr_announced() 587 if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)) < 0) in mptcp_event()
|
| A D | subflow.c | 91 msk = mptcp_token_get_sock(sock_net(req_to_sk(req)), subflow_req->token); in subflow_token_join_request() 199 &subflow_req->token, in subflow_check_req() 201 if (mptcp_token_exists(subflow_req->token)) { in subflow_check_req() 224 subflow_req->token = mp_opt.token; in subflow_check_req() 258 pr_debug("token=%u, remote_nonce=%u msk=%p\n", subflow_req->token, in subflow_check_req() 425 subflow, subflow->token, thmac, subflow->thmac); in subflow_thmac_valid() 1650 subflow->token = msk->token; in __mptcp_subflow_connect() 2052 new_ctx->token = subflow_req->token; in subflow_ulp_clone() 2066 new_ctx->token = subflow_req->token; in subflow_ulp_clone()
|
| A D | pm_userspace.c | 165 struct nlattr *token; in mptcp_userspace_pm_get_sock() local 170 token = info->attrs[MPTCP_PM_ATTR_TOKEN]; in mptcp_userspace_pm_get_sock() 171 msk = mptcp_token_get_sock(genl_info_net(info), nla_get_u32(token)); in mptcp_userspace_pm_get_sock() 173 NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token"); in mptcp_userspace_pm_get_sock() 178 NL_SET_ERR_MSG_ATTR(info->extack, token, in mptcp_userspace_pm_get_sock()
|
| A D | protocol.h | 170 u32 token; member 302 u32 token; member 472 u32 token; member 513 u32 token; 996 bool mptcp_token_exists(u32 token); 997 struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token); 1002 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn);
|
| /net/smc/ |
| A D | smc_loopback.c | 89 get_random_bytes(&dmb_node->token, sizeof(dmb_node->token)); in smc_lo_register_dmb() 92 if (tmp_node->token == dmb_node->token) { in smc_lo_register_dmb() 97 hash_add(ldev->dmb_ht, &dmb_node->list, dmb_node->token); in smc_lo_register_dmb() 102 dmb->dmb_tok = dmb_node->token; in smc_lo_register_dmb() 140 if (tmp_node->token == dmb->dmb_tok) { in smc_lo_unregister_dmb() 169 if (tmp_node->token == dmb->dmb_tok) { in smc_lo_attach_dmb() 188 dmb->dmb_tok = dmb_node->token; in smc_lo_attach_dmb() 195 static int smc_lo_detach_dmb(struct smcd_dev *smcd, u64 token) in smc_lo_detach_dmb() argument 202 hash_for_each_possible(ldev->dmb_ht, tmp_node, list, token) { in smc_lo_detach_dmb() 203 if (tmp_node->token == token) { in smc_lo_detach_dmb() [all …]
|
| A D | smc_cdc.h | 45 __be32 token; member 215 peer->token = htonl(local->token); in smc_host_msg_to_cdc() 248 local->token = ntohl(peer->token); in smcr_cdc_msg_to_host()
|
| A D | smc_ism.c | 217 dmb.dmb_tok = dmb_desc->token; in smc_ism_unregister_dmb() 245 dmb_desc->token = dmb.dmb_tok; in smc_ism_register_dmb() 263 int smc_ism_attach_dmb(struct smcd_dev *dev, u64 token, in smc_ism_attach_dmb() argument 273 dmb.dmb_tok = token; in smc_ism_attach_dmb() 277 dmb_desc->token = dmb.dmb_tok; in smc_ism_attach_dmb() 285 int smc_ism_detach_dmb(struct smcd_dev *dev, u64 token) in smc_ism_detach_dmb() argument 290 return dev->ops->detach_dmb(dev, token); in smc_ism_detach_dmb()
|
| A D | smc_ism.h | 52 int smc_ism_attach_dmb(struct smcd_dev *dev, u64 token, 54 int smc_ism_detach_dmb(struct smcd_dev *dev, u64 token);
|
| A D | smc_core.h | 226 u64 token; member 449 u32 token, struct smc_link_group *lgr) in smc_lgr_find_conn() argument 459 if (cur->alert_token_local > token) { in smc_lgr_find_conn() 462 if (cur->alert_token_local < token) { in smc_lgr_find_conn()
|
| A D | smc_diag.c | 110 .token = conn->alert_token_local, in __smc_diag_dump() 181 dinfo.token = conn->rmb_desc->token; in __smc_diag_dump()
|
| A D | smc_loopback.h | 27 u64 token; member
|
| /net/ipv4/ |
| A D | inetpeer.c | 249 unsigned long now, token, otoken, delta; in inet_peer_xrlim_allow() local 255 token = otoken = READ_ONCE(peer->rate_tokens); in inet_peer_xrlim_allow() 260 token += delta; in inet_peer_xrlim_allow() 261 if (token > XRLIM_BURST_FACTOR * timeout) in inet_peer_xrlim_allow() 262 token = XRLIM_BURST_FACTOR * timeout; in inet_peer_xrlim_allow() 264 if (token >= timeout) { in inet_peer_xrlim_allow() 265 token -= timeout; in inet_peer_xrlim_allow() 268 if (token != otoken) in inet_peer_xrlim_allow() 269 WRITE_ONCE(peer->rate_tokens, token); in inet_peer_xrlim_allow()
|
| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_seal.c | 75 setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) in setup_token_v2() argument 89 krb5_hdr = (u16 *)token->data; in setup_token_v2() 100 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 106 struct xdr_netobj *token) in gss_krb5_get_mic_v2() argument 119 krb5_hdr = setup_token_v2(ctx, token); in gss_krb5_get_mic_v2()
|
| A D | gss_krb5_internal.h | 46 struct xdr_netobj *token); 88 struct xdr_netobj *token);
|
| /net/ceph/ |
| A D | ceph_common.c | 422 int token, err; in ceph_parse_param() local 425 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param() 426 dout("%s fs_parse '%s' token %d\n", __func__, param->key, token); in ceph_parse_param() 427 if (token < 0) in ceph_parse_param() 428 return token; in ceph_parse_param() 430 switch (token) { in ceph_parse_param()
|
| /net/9p/ |
| A D | trans_rdma.c | 199 int token; in parse_opts() local 203 token = match_token(p, tokens, args); in parse_opts() 204 if ((token != Opt_err) && (token != Opt_privport)) { in parse_opts() 212 switch (token) { in parse_opts()
|