/* * netsniff-ng - the packet sniffing beast * Copyright 2011 Daniel Borkmann. * Subject to the GPL, version 2. */ #ifndef CT_USERMGMT_H #define CT_USERMGMT_H #include #include "curve.h" #include "crypto_hash_sha512.h" enum is_user_enum { USERNAMES_OK = 0, /* Usernames match, valid 'token' */ USERNAMES_NE, /* Usernames do not match */ USERNAMES_TS, /* Usernames match, but 'token' invalid, Drop connection here */ USERNAMES_ERR, }; struct username_struct { uint32_t salt; uint8_t hash[crypto_hash_sha512_BYTES]; }; extern int username_msg(char *username, size_t len, char *dst, size_t dlen); extern enum is_user_enum username_msg_is_user(char *src, size_t slen, char *username, size_t len); extern void parse_userfile_and_generate_user_store_or_die(char *homedir); extern void dump_user_store(void); extern void destroy_user_store(void); extern int get_user_by_socket(int sock, struct curve25519_proto **proto); extern int get_user_by_sockaddr(struct sockaddr_storage *sa, size_t sa_len, struct curve25519_proto **proto); extern int try_register_user_by_socket(struct curve25519_struct *c, char *src, size_t slen, int sock, int log); extern int try_register_user_by_sockaddr(struct curve25519_struct *c, char *src, size_t slen, struct sockaddr_storage *sa, size_t sa_len, int log); extern void remove_user_by_socket(int sock); extern void remove_user_by_sockaddr(struct sockaddr_storage *sa, size_t sa_len); #endif /* CT_USERMGMT_H */ auser
summaryrefslogtreecommitdiff
path: root/net/phonet/pep-gprs.c
diff options
context:
space:
mode:
authorAlexander Stein <alexander.stein@systec-electronic.com>2017-01-30 12:35:28 +0100
committerLinus Walleij <linus.walleij@linaro.org>2017-01-30 15:53:57 +0100
commitcdca06e4e85974d8a3503ab15709dbbaf90d3dd1 (patch)
tree268b0c01070a957006db97c88dccb5fb061440ff /net/phonet/pep-gprs.c
parent1b89970d81bbd52720fc64a3fe9572ee33588363 (diff)
pinctrl: baytrail: Add missing spinlock usage in byt_gpio_irq_handler
According to VLI64 Intel Atom E3800 Specification Update (#329901) concurrent read accesses may result in returning 0xffffffff and write accesses may be dropped silently. To workaround all accesses must be protected by locks. Cc: stable@vger.kernel.org Signed-off-by: Alexander Stein <alexander.stein@systec-electronic.com> Acked-by: Mika Westerberg <mika.westerberg@linux.intel.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
Diffstat (limited to 'net/phonet/pep-gprs.c')