Searched refs:TCP_AO_ADD_KEY (Results 1 – 9 of 9) sorted by relevance
/linux/tools/testing/selftests/net/tcp_ao/ |
H A D | setsockopt-closed.c | 89 if (optname == TCP_AO_ADD_KEY) { in __setsockopt_checked() 109 case TCP_AO_ADD_KEY: in setsockopt_checked() 136 case TCP_AO_ADD_KEY: { in prepare_defs() 223 test_extend(TCP_AO_ADD_KEY, false, "AO add", in extend_tests() 243 sk = prepare_defs(TCP_AO_ADD_KEY, &ao); in test_optmem_limit() 251 err = setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, in test_optmem_limit() 278 sk = prepare_defs(TCP_AO_ADD_KEY, &ao); in test_einval_add_key() 280 setsockopt_checked(sk, TCP_AO_ADD_KEY, &ao, EINVAL, "too big keylen"); in test_einval_add_key() 282 sk = prepare_defs(TCP_AO_ADD_KEY, &ao); in test_einval_add_key() 284 setsockopt_checked(sk, TCP_AO_ADD_KEY, &ao, EINVAL, "using reserved padding"); in test_einval_add_key() [all …]
|
H A D | connect-deny.c | 24 err = setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)); in test_add_key_maclen()
|
H A D | key-management.c | 184 err = setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)); in test_add_current_rnext_key() 542 err = setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)); in test_add_key_cr()
|
/linux/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | kconfig.c | 64 if (setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)) < 0) { in has_tcp_ao()
|
H A D | aolib.h | 440 err = setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)); in test_add_key_vrf() 649 if (setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &tmp, sizeof(tmp)) < 0) in test_add_repaired_key()
|
/linux/include/uapi/linux/ |
H A D | tcp.h | 132 #define TCP_AO_ADD_KEY 38 /* Add/Set MKT */ macro
|
/linux/Documentation/networking/ |
H A D | tcp_ao.rst | 295 ``TCP_AO_ADD_KEY`` and ``TCP_AO_DEL_KEY`` TCP socket options must be used. 381 ``setsockopt(TCP_AO_ADD_KEY)`` vs ``accept()``
|
/linux/net/ipv4/ |
H A D | tcp_ao.c | 2054 case TCP_AO_ADD_KEY: in tcp_parse_ao()
|
H A D | tcp.c | 3939 case TCP_AO_ADD_KEY: in do_tcp_setsockopt()
|