From nobody Wed Apr 8 17:17:07 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4761BFA3740 for ; Thu, 27 Oct 2022 20:50:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236947AbiJ0UuQ (ORCPT ); Thu, 27 Oct 2022 16:50:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59408 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237079AbiJ0Uso (ORCPT ); Thu, 27 Oct 2022 16:48:44 -0400 Received: from mail-wm1-x331.google.com (mail-wm1-x331.google.com [IPv6:2a00:1450:4864:20::331]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8514913E3D for ; Thu, 27 Oct 2022 13:44:47 -0700 (PDT) Received: by mail-wm1-x331.google.com with SMTP id v130-20020a1cac88000000b003bcde03bd44so5031831wme.5 for ; Thu, 27 Oct 2022 13:44:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=google; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=+hdisk2huNybtWVXbtT77JtWTDX9XIc08M/YyYNQqQA=; b=MM8otwdC1LN6OlvEG3BsuhkUbKyfXU0Gw9ltqT8j5DlmSOuwH3akRiMcBkqr1LxZwv WVkTGPBIPKvb9LLxgN5dpr3kAxslA7vmqoVRPfb6BYsG3k+xHpVlqtEJ96EPIkbZ7obO aaang8AdmLd0ddkxrre13QxJyh97ceo38siZ6S4NNk/BSva1bMi/PwXklRVNOAHva9Ob FCJD5ODwXDWGUJuF3rNTCeWGDx4+yhI3cD6eN2cpsFBT6ZuxRYUQI54faEnwKvHgGr17 j5f+8d0Jti2Vga93K4Q1CrOXVrtZro8+lNuJ0oD+pUHZWrWuQ7Ty03k5B3yR+DOOiVS2 2IMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+hdisk2huNybtWVXbtT77JtWTDX9XIc08M/YyYNQqQA=; b=cd7UdTJlj4WDURtRECnYIvTSlA6iOt3JS5MiIb8ieJEMTswVXL1bW8Odmtcu0Z6lVH 2gckw+PnlS79rd9VK3t0WniIw75dQo4Bwr/VyrkQYGB7m0yii4zJfw/s0erDCMw17Re9 yK7KvPiWrcqWtIyhaczTzi8DEBELdFpDYU3Ta7ehDz92F2HiEvkM2ND+9PrA7sLsyFR7 IYcwqSdANvPgV4p1Mbbmvf4Izt1hjF0gaXnn4TC6epQ9932u1EnjRNdtwlBA6Xistncf jqVxKp1svdsJDI+q2cYjPBdfMVpqAIBYPYLty85CH8MK7vgSGE+EYAzrxT1Bj9gq3sOT xSjQ== X-Gm-Message-State: ACrzQf1s/5wpzAHGk0XIDU5KCJ5bT/EfOUfEaA7CR25pVb8rYslvnQfL CzxnJDesdMf2tiR9cnVrPZnqXdK12tx9fS1c X-Google-Smtp-Source: AMsMyM5SF49nP77j8TfEXrfOKQS7xRflyPat+mSDDrloLi2E6Ob4dMgZY72Rt5v2+BW3WzIkv7/s6g== X-Received: by 2002:a05:600c:19d2:b0:3c6:fbb9:ca9a with SMTP id u18-20020a05600c19d200b003c6fbb9ca9amr7330350wmq.110.1666903486720; Thu, 27 Oct 2022 13:44:46 -0700 (PDT) Received: from Mindolluin.ire.aristanetworks.com ([217.173.96.166]) by smtp.gmail.com with ESMTPSA id n3-20020a5d6b83000000b00236644228besm1968739wrx.40.2022.10.27.13.44.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Oct 2022 13:44:46 -0700 (PDT) From: Dmitry Safonov To: linux-kernel@vger.kernel.org, David Ahern , Eric Dumazet Cc: Dmitry Safonov , Andy Lutomirski , Ard Biesheuvel , Bob Gilligan , Dan Carpenter , "David S. Miller" , Dmitry Safonov <0x7f454c46@gmail.com>, Eric Biggers , "Eric W. Biederman" , Francesco Ruggeri , Herbert Xu , Hideaki YOSHIFUJI , Ivan Delalande , Jakub Kicinski , Leonard Crestez , Paolo Abeni , Salam Noureddine , Shuah Khan , netdev@vger.kernel.org, linux-crypto@vger.kernel.org Subject: [PATCH v3 34/36] selftest/nettest: Rename md5_prefix* => auth_prefix* Date: Thu, 27 Oct 2022 21:43:45 +0100 Message-Id: <20221027204347.529913-35-dima@arista.com> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20221027204347.529913-1-dima@arista.com> References: <20221027204347.529913-1-dima@arista.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Now it's going to be used for TCP-AO testing too. Signed-off-by: Dmitry Safonov --- tools/testing/selftests/net/nettest.c | 28 +++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/tools/testing/selftests/net/nettest.c b/tools/testing/selftest= s/net/nettest.c index b9e600899cf6..3499d6aff9e4 100644 --- a/tools/testing/selftests/net/nettest.c +++ b/tools/testing/selftests/net/nettest.c @@ -97,11 +97,11 @@ struct sock_args { =20 const char *password; /* prefix for MD5 password */ - const char *md5_prefix_str; + const char *auth_prefix_str; union { struct sockaddr_in v4; struct sockaddr_in6 v6; - } md5_prefix; + } auth_prefix; unsigned int prefix_len; /* 0: default, -1: force off, +1: force on */ int bind_key_ifindex; @@ -274,7 +274,7 @@ static int tcp_md5sig(int sd, void *addr, socklen_t ale= n, struct sock_args *args md5sig.tcpm_flags |=3D TCP_MD5SIG_FLAG_PREFIX; =20 md5sig.tcpm_prefixlen =3D args->prefix_len; - addr =3D &args->md5_prefix; + addr =3D &args->auth_prefix; } memcpy(&md5sig.tcpm_addr, addr, alen); =20 @@ -314,13 +314,13 @@ static int tcp_md5_remote(int sd, struct sock_args *a= rgs) switch (args->version) { case AF_INET: sin.sin_port =3D htons(args->port); - sin.sin_addr =3D args->md5_prefix.v4.sin_addr; + sin.sin_addr =3D args->auth_prefix.v4.sin_addr; addr =3D &sin; alen =3D sizeof(sin); break; case AF_INET6: sin6.sin6_port =3D htons(args->port); - sin6.sin6_addr =3D args->md5_prefix.v6.sin6_addr; + sin6.sin6_addr =3D args->auth_prefix.v6.sin6_addr; addr =3D &sin6; alen =3D sizeof(sin6); break; @@ -753,11 +753,11 @@ static int convert_addr(struct sock_args *args, const= char *_str, case ADDR_TYPE_MD5_PREFIX: desc =3D "md5 prefix"; if (family =3D=3D AF_INET) { - args->md5_prefix.v4.sin_family =3D AF_INET; - addr =3D &args->md5_prefix.v4.sin_addr; + args->auth_prefix.v4.sin_family =3D AF_INET; + addr =3D &args->auth_prefix.v4.sin_addr; } else if (family =3D=3D AF_INET6) { - args->md5_prefix.v6.sin6_family =3D AF_INET6; - addr =3D &args->md5_prefix.v6.sin6_addr; + args->auth_prefix.v6.sin6_family =3D AF_INET6; + addr =3D &args->auth_prefix.v6.sin6_addr; } else return 1; =20 @@ -840,8 +840,8 @@ static int validate_addresses(struct sock_args *args) convert_addr(args, args->remote_addr_str, ADDR_TYPE_REMOTE) < 0) return 1; =20 - if (args->md5_prefix_str && - convert_addr(args, args->md5_prefix_str, + if (args->auth_prefix_str && + convert_addr(args, args->auth_prefix_str, ADDR_TYPE_MD5_PREFIX) < 0) return 1; =20 @@ -2029,7 +2029,7 @@ int main(int argc, char *argv[]) args.password =3D optarg; break; case 'm': - args.md5_prefix_str =3D optarg; + args.auth_prefix_str =3D optarg; break; case 'S': args.use_setsockopt =3D 1; @@ -2091,13 +2091,13 @@ int main(int argc, char *argv[]) } =20 if (args.password && (!args.use_md5 || - (!args.has_remote_ip && !args.md5_prefix_str) || + (!args.has_remote_ip && !args.auth_prefix_str) || args.type !=3D SOCK_STREAM)) { log_error("MD5 passwords apply to TCP only and require a remote ip for t= he password\n"); return 1; } =20 - if ((args.md5_prefix_str || args.use_md5) && !args.password) { + if ((args.auth_prefix_str || args.use_md5) && !args.password) { log_error("Prefix range for MD5 protection specified without a password\= n"); return 1; } --=20 2.38.1