/linux-4.1.27/include/linux/ceph/ |
D | auth.h | 24 int (*sign_message)(struct ceph_auth_handshake *auth, 26 int (*check_message_signature)(struct ceph_auth_handshake *auth, 59 struct ceph_auth_handshake *auth); 62 struct ceph_auth_handshake *auth); 75 int (*sign_message)(struct ceph_auth_handshake *auth, 77 int (*check_message_signature)(struct ceph_auth_handshake *auth, 114 struct ceph_auth_handshake *auth); 126 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 129 if (auth->sign_message) in ceph_auth_sign_message() 130 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
D | mon_client.h | 65 struct ceph_auth_client *auth; member
|
D | ceph_fs.h | 486 __le32 auth; /* auth mds, if this is a delegation point */ member
|
/linux-4.1.27/drivers/gpu/drm/ |
D | drm_auth.c | 153 struct drm_auth *auth = data; in drm_getmagic() local 157 auth->magic = file_priv->magic; in drm_getmagic() 163 auth->magic = sequence++; in drm_getmagic() 165 } while (drm_find_file(file_priv->master, auth->magic)); in drm_getmagic() 166 file_priv->magic = auth->magic; in drm_getmagic() 167 drm_add_magic(file_priv->master, file_priv, auth->magic); in drm_getmagic() 170 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic() 191 struct drm_auth *auth = data; in drm_authmagic() local 194 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic() 195 if ((file = drm_find_file(file_priv->master, auth->magic))) { in drm_authmagic() [all …]
|
D | drm_ioc32.c | 292 int auth; /**< Is client authenticated? */ member 321 || __get_user(c32.auth, &client->auth) in compat_drm_getclient()
|
D | drm_ioctl.c | 246 client->auth = file_priv->authenticated; in drm_getclient()
|
/linux-4.1.27/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 111 struct iscsi_node_auth *auth, in chap_server_open() argument 119 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 120 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 172 struct iscsi_node_auth *auth, in chap_server_compute_md5() argument 226 compare_len = strlen(auth->userid) + 1; in chap_server_compute_md5() 227 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_md5() 271 sg_init_one(&sg, &auth->password, strlen(auth->password)); in chap_server_compute_md5() 272 ret = crypto_hash_update(&desc, &sg, strlen(auth->password)); in chap_server_compute_md5() 308 if (!auth->authenticate_target) { in chap_server_compute_md5() 400 sg_init_one(&sg, auth->password_mutual, in chap_server_compute_md5() [all …]
|
D | iscsi_target_configfs.c | 458 struct iscsi_node_auth *auth = &nacl->node_auth; \ 462 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \ 470 struct iscsi_node_auth *auth = &nacl->node_auth; \ 474 if (count >= sizeof(auth->name)) \ 476 snprintf(auth->name, sizeof(auth->name), "%s", page); \ 477 if (!strncmp("NULL", auth->name, 4)) \ 478 auth->naf_flags &= ~flags; \ 480 auth->naf_flags |= flags; \ 482 if ((auth->naf_flags & NAF_USERID_IN_SET) && \ 483 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \ [all …]
|
D | iscsi_target_nego.c | 112 struct iscsi_node_auth *auth; in iscsi_handle_authentication() local 139 auth = &iscsi_tpg->tpg_demo_auth; in iscsi_handle_authentication() 144 auth = &iscsi_nacl->node_auth; in iscsi_handle_authentication() 150 auth = &iscsit_global->discovery_acl.node_auth; in iscsi_handle_authentication() 162 return srp_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication() 166 return chap_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication()
|
/linux-4.1.27/crypto/ |
D | authenc.c | 29 struct crypto_ahash_spawn auth; member 35 struct crypto_ahash *auth; member 89 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 97 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 98 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 100 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 101 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey() 263 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_ahash_fb() local 269 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_ahash_fb() 270 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_ahash_fb() [all …]
|
D | authencesn.c | 29 struct crypto_ahash_spawn auth; member 35 struct crypto_ahash *auth; member 63 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 71 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey() 72 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey() 74 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 75 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey() 343 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_ahash() local 349 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_esn_ahash() 350 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_ahash() [all …]
|
/linux-4.1.27/net/sunrpc/ |
D | auth.c | 259 struct rpc_auth *auth; in rpcauth_create() local 263 auth = ERR_PTR(-EINVAL); in rpcauth_create() 276 auth = ops->create(args, clnt); in rpcauth_create() 278 if (IS_ERR(auth)) in rpcauth_create() 279 return auth; in rpcauth_create() 282 clnt->cl_auth = auth; in rpcauth_create() 285 return auth; in rpcauth_create() 290 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument 292 if (!atomic_dec_and_test(&auth->au_count)) in rpcauth_release() 294 auth->au_ops->destroy(auth); in rpcauth_release() [all …]
|
D | auth_generic.c | 68 struct rpc_auth *auth = task->tk_client->cl_auth; in generic_bind_cred() local 71 return auth->au_ops->lookup_cred(auth, acred, lookupflags); in generic_bind_cred() 78 generic_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_lookup_cred() argument 84 generic_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_create_cred() argument 211 generic_key_timeout(struct rpc_auth *auth, struct rpc_cred *cred) in generic_key_timeout() argument 228 tcred = auth->au_ops->lookup_cred(auth, acred, 0); in generic_key_timeout()
|
D | auth_unix.c | 45 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 47 dprintk("RPC: destroying UNIX authenticator %p\n", auth); in unx_destroy() 48 rpcauth_clear_credcache(auth->au_credcache); in unx_destroy() 55 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument 57 return rpcauth_lookup_credcache(auth, acred, flags); in unx_lookup_cred() 61 unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_create_cred() argument 74 rpcauth_init_cred(&cred->uc_base, acred, auth, &unix_credops); in unx_create_cred()
|
D | auth_null.c | 28 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 36 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
D | Makefile | 12 auth.o auth_null.o auth_unix.o auth_generic.o \
|
D | clnt.c | 301 struct rpc_auth *auth; in rpc_client_register() local 319 auth = rpcauth_create(&auth_args, clnt); in rpc_client_register() 320 if (IS_ERR(auth)) { in rpc_client_register() 323 err = PTR_ERR(auth); in rpc_client_register()
|
/linux-4.1.27/net/ceph/ |
D | auth_none.c | 67 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() argument 88 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 89 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 90 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 91 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer() 92 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer()
|
D | auth_x.c | 429 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 430 void *p = auth + 1; in ceph_x_build_request() 442 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 443 tmp.client_challenge = auth->client_challenge; in ceph_x_build_request() 450 auth->struct_v = 1; in ceph_x_build_request() 451 auth->key = 0; in ceph_x_build_request() 453 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 455 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 456 le64_to_cpu(auth->key)); in ceph_x_build_request() 546 struct ceph_auth_handshake *auth) in ceph_x_create_authorizer() argument [all …]
|
D | mon_client.c | 127 ceph_auth_reset(monc->auth); in __close_session() 153 ret = ceph_auth_build_hello(monc->auth, in __open_session() 347 (int)monc->client->have_fsid, monc->auth->global_id); in have_debugfs_info() 348 return monc->client->have_fsid && monc->auth->global_id > 0; in have_debugfs_info() 743 if (ceph_auth_is_authenticated(monc->auth)) in delayed_work() 794 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init() 796 if (IS_ERR(monc->auth)) { in ceph_monc_init() 797 err = PTR_ERR(monc->auth); in ceph_monc_init() 800 monc->auth->want_keys = in ceph_monc_init() 852 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all …]
|
D | Makefile | 10 auth.o auth_none.o \
|
D | messenger.c | 1397 struct ceph_auth_handshake *auth; in get_connect_authorizer() local 1407 auth = con->ops->get_authorizer(con, auth_proto, con->auth_retry); in get_connect_authorizer() 1410 if (IS_ERR(auth)) in get_connect_authorizer() 1411 return auth; in get_connect_authorizer() 1415 con->auth_reply_buf = auth->authorizer_reply_buf; in get_connect_authorizer() 1416 con->auth_reply_buf_len = auth->authorizer_reply_buf_len; in get_connect_authorizer() 1417 return auth; in get_connect_authorizer() 1438 struct ceph_auth_handshake *auth; in prepare_write_connect() local 1465 auth = get_connect_authorizer(con, &auth_proto); in prepare_write_connect() 1466 if (IS_ERR(auth)) in prepare_write_connect() [all …]
|
D | osd_client.c | 1039 struct ceph_auth_client *ac = osd->o_osdc->client->monc.auth; in put_osd() 2940 struct ceph_auth_client *ac = osdc->client->monc.auth; in get_authorizer() 2941 struct ceph_auth_handshake *auth = &o->o_auth; in get_authorizer() local 2943 if (force_new && auth->authorizer) { in get_authorizer() 2944 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer() 2945 auth->authorizer = NULL; in get_authorizer() 2947 if (!auth->authorizer) { in get_authorizer() 2949 auth); in get_authorizer() 2954 auth); in get_authorizer() 2960 return auth; in get_authorizer() [all …]
|
D | auth.c | 284 struct ceph_auth_handshake *auth) in ceph_auth_create_authorizer() argument 290 ret = ac->ops->create_authorizer(ac, peer_type, auth); in ceph_auth_create_authorizer()
|
D | debugfs.c | 219 client->monc.auth->global_id); in ceph_debugfs_client_init()
|
D | ceph_common.c | 535 return client->monc.auth->global_id; in ceph_client_id()
|
/linux-4.1.27/net/sctp/ |
D | output.c | 78 packet->auth = NULL; in sctp_packet_reset() 193 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 209 if (!chunk->auth) in sctp_packet_bundle_auth() 212 auth = sctp_make_auth(asoc); in sctp_packet_bundle_auth() 213 if (!auth) in sctp_packet_bundle_auth() 216 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth() 219 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 307 packet->auth = chunk; in __sctp_packet_append_chunk() 391 unsigned char *auth = NULL; /* pointer to auth in skb data */ in sctp_packet_transmit() local 492 if (chunk == packet->auth) in sctp_packet_transmit() [all …]
|
D | auth.c | 419 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 709 struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() argument 724 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 725 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 745 sg_init_one(&sg, auth, end - (unsigned char *)auth); in sctp_auth_calculate_hmac() 750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
|
D | Makefile | 13 output.o input.o debug.o ssnmap.o auth.o
|
D | endpointola.c | 449 chunk->auth = 1; in sctp_endpoint_bh_rcv() 469 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_endpoint_bh_rcv()
|
D | sm_statefuns.c | 761 struct sctp_chunk auth; in sctp_sf_do_5_1D_ce() local 771 auth.skb = chunk->auth_chunk; in sctp_sf_do_5_1D_ce() 772 auth.asoc = chunk->asoc; in sctp_sf_do_5_1D_ce() 773 auth.sctp_hdr = chunk->sctp_hdr; in sctp_sf_do_5_1D_ce() 774 auth.chunk_hdr = (sctp_chunkhdr_t *)skb_push(chunk->auth_chunk, in sctp_sf_do_5_1D_ce() 777 auth.transport = chunk->transport; in sctp_sf_do_5_1D_ce() 779 ret = sctp_sf_authenticate(net, ep, new_asoc, type, &auth); in sctp_sf_do_5_1D_ce() 3611 if (!net->sctp.addip_noauth && !chunk->auth) in sctp_sf_do_asconf() 3728 if (!net->sctp.addip_noauth && !asconf_ack->auth) in sctp_sf_do_asconf_ack() 4055 chunk->auth = 1; in sctp_sf_authenticate()
|
D | associola.c | 1023 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_assoc_bh_rcv()
|
D | sm_make_chunk.c | 1395 retval->auth = 1; in _sctp_make_chunk()
|
/linux-4.1.27/Documentation/networking/ |
D | mac80211-auth-assoc-deauth.txt | 35 mac80211->driver: TX auth frame 36 driver->mac80211: RX auth frame 38 alt WEP shared key auth 39 mac80211->driver: TX auth frame 40 driver->mac80211: RX auth frame 44 mac80211->userspace: RX auth frame
|
D | 00-INDEX | 137 mac80211-auth-assoc-deauth.txt
|
/linux-4.1.27/net/xfrm/ |
D | xfrm_algo.c | 162 .auth = { 182 .auth = { 202 .auth = { 222 .auth = { 241 .auth = { 260 .auth = { 280 .auth = { 299 .auth = { 319 .auth = {
|
D | xfrm_user.c | 315 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth() 336 if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits) in attach_auth_trunc() 346 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth_trunc() 747 static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb) in copy_to_user_auth() argument 753 sizeof(*algo) + (auth->alg_key_len + 7) / 8); in copy_to_user_auth() 758 strncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name)); in copy_to_user_auth() 759 memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8); in copy_to_user_auth() 760 algo->alg_key_len = auth->alg_key_len; in copy_to_user_auth()
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
D | rtllib_crypt_ccmp.c | 111 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument 174 rtllib_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 175 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 176 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 177 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 178 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | rtllib_softmac.c | 797 struct rtllib_authentication *auth; in rtllib_authentication_req() local 809 auth = (struct rtllib_authentication *) in rtllib_authentication_req() 812 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH); in rtllib_authentication_req() 814 auth->header.frame_ctl |= cpu_to_le16(RTLLIB_FCTL_WEP); in rtllib_authentication_req() 816 auth->header.duration_id = cpu_to_le16(0x013a); in rtllib_authentication_req() 817 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN); in rtllib_authentication_req() 818 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN); in rtllib_authentication_req() 819 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN); in rtllib_authentication_req() 821 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req() 823 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in rtllib_authentication_req() [all …]
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_ccmp.c | 116 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument 182 ieee80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 183 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 184 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 185 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 186 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | ieee80211_softmac.c | 652 struct ieee80211_authentication *auth; in ieee80211_authentication_req() local 660 auth = (struct ieee80211_authentication *) in ieee80211_authentication_req() 663 auth->header.frame_ctl = IEEE80211_STYPE_AUTH; in ieee80211_authentication_req() 664 if (challengelen) auth->header.frame_ctl |= IEEE80211_FCTL_WEP; in ieee80211_authentication_req() 666 auth->header.duration_id = 0x013a; //FIXME in ieee80211_authentication_req() 668 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req() 669 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN); in ieee80211_authentication_req() 670 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req() 674 auth->algorithm = WLAN_AUTH_OPEN; in ieee80211_authentication_req() 676 auth->algorithm = WLAN_AUTH_SHARED_KEY; in ieee80211_authentication_req() [all …]
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
D | auth_gss.c | 294 struct gss_auth *auth; member 330 struct net *net = gss_msg->auth->net; in gss_release_msg() 338 gss_put_auth(gss_msg->auth); in gss_release_msg() 447 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 509 gss_msg->auth = gss_auth; in gss_alloc_msg() 725 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 986 struct rpc_auth * auth; in gss_create_new() local 1015 auth = &gss_auth->rpc_auth; in gss_create_new() 1016 auth->au_cslack = GSS_CRED_SLACK >> 2; in gss_create_new() 1017 auth->au_rslack = GSS_VERF_SLACK >> 2; in gss_create_new() [all …]
|
/linux-4.1.27/net/wireless/ |
D | lib80211_crypt_ccmp.c | 113 u8 * pn, size_t dlen, u8 * b0, u8 * auth, u8 * s0) in ccmp_init_blocks() argument 171 lib80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 172 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 173 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 174 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 175 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | sme.c | 161 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work() 317 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth() 490 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect()
|
D | core.c | 348 WARN_ON(ops->auth && (!ops->assoc || !ops->deauth || !ops->disassoc)); in wiphy_new_nm()
|
D | rdev-ops.h | 436 ret = rdev->ops->auth(&rdev->wiphy, dev, req); in rdev_auth()
|
D | nl80211.c | 1483 CMD(auth, AUTHENTICATE); in nl80211_send_wiphy() 1540 if (rdev->ops->connect || rdev->ops->auth) { in nl80211_send_wiphy() 6864 if (!rdev->ops->auth) in nl80211_authenticate()
|
/linux-4.1.27/fs/ncpfs/ |
D | ioctl.c | 589 user.auth_type = server->auth.auth_type; in __ncp_ioctl() 591 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl() 597 server->auth.object_name, in __ncp_ioctl() 616 user.auth_type = server->auth.auth_type; in __ncp_ioctl() 618 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl() 624 server->auth.object_name, in __ncp_ioctl() 670 oldname = server->auth.object_name; in __ncp_ioctl() 671 oldnamelen = server->auth.object_name_len; in __ncp_ioctl() 674 server->auth.auth_type = user.auth_type; in __ncp_ioctl() 675 server->auth.object_name_len = user.object_name_len; in __ncp_ioctl() [all …]
|
D | ncp_fs_sb.h | 92 } auth; member
|
D | inode.c | 591 server->auth.auth_type = NCP_AUTH_NONE; in ncp_fill_super() 793 kfree(server->auth.object_name); in ncp_put_super()
|
/linux-4.1.27/net/bluetooth/ |
D | smp.c | 841 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 854 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io); in tk_request() 862 if (!(auth & SMP_AUTH_MITM)) in tk_request() 998 u8 stk[16], auth; in smp_random() local 1011 auth = 1; in smp_random() 1013 auth = 0; in smp_random() 1020 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1135 u8 key_type, auth; in sc_add_ltk() local 1143 auth = 1; in sc_add_ltk() 1145 auth = 0; in sc_add_ltk() [all …]
|
D | hci_conn.c | 1030 goto auth; in hci_conn_security() 1061 auth: in hci_conn_security()
|
D | hci_core.c | 955 __u8 auth = opt; in hci_auth_req() local 957 BT_DBG("%s %x", req->hdev->name, auth); in hci_auth_req() 960 hci_req_add(req, HCI_OP_WRITE_AUTH_ENABLE, 1, &auth); in hci_auth_req()
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
D | acx.c | 120 struct acx_sleep_auth *auth; in wl1251_acx_sleep_auth() local 125 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1251_acx_sleep_auth() 126 if (!auth) in wl1251_acx_sleep_auth() 129 auth->sleep_auth = sleep_auth; in wl1251_acx_sleep_auth() 131 ret = wl1251_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1251_acx_sleep_auth() 133 kfree(auth); in wl1251_acx_sleep_auth()
|
/linux-4.1.27/Documentation/security/ |
D | keys-request-key.txt | 94 keyring that contains a link to auth key V. 103 search notes that the session keyring has auth key V in its bottom level. 113 (9) Upon instantiating key U, auth key V is automatically revoked so that it 120 be created uninstantiated, another auth key (X) would be created (as per step 122 context specified by auth key X will still be process A, as it was in auth key
|
D | keys-trusted-encrypted.txt | 31 keyauth= ascii hex auth for sealing key default 0x00...i 33 blobauth= ascii hex auth for sealed data default 0x00... 35 blobauth= ascii hex auth for sealed data default 0x00...
|
/linux-4.1.27/drivers/crypto/qce/ |
D | common.c | 240 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local 274 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 276 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 279 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
|
/linux-4.1.27/fs/nfsd/ |
D | Makefile | 13 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
|
D | nfs4callback.c | 704 struct rpc_auth *auth = client->cl_auth; in get_backchannel_cred() local 709 return auth->au_ops->lookup_cred(client->cl_auth, &acred, 0); in get_backchannel_cred()
|
/linux-4.1.27/drivers/net/wireless/hostap/ |
D | hostap_80211.h | 22 } __packed auth; member
|
/linux-4.1.27/include/net/sctp/ |
D | auth.h | 104 struct sctp_auth_chunk *auth, gfp_t gfp);
|
D | structs.h | 646 auth:1, /* IN: was auth'ed | OUT: needs auth */ member 708 struct sctp_chunk *auth; member
|
/linux-4.1.27/drivers/net/wireless/ |
D | atmel.c | 2870 struct auth_body auth; in send_authentication_request() local 2883 auth.alg = cpu_to_le16(system); in send_authentication_request() 2885 auth.status = 0; in send_authentication_request() 2886 auth.trans_seq = cpu_to_le16(priv->CurrentAuthentTransactionSeqNum); in send_authentication_request() 2891 auth.el_id = 16; /* challenge_text */ in send_authentication_request() 2892 auth.chall_text_len = challenge_len; in send_authentication_request() 2893 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request() 2894 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 8 + challenge_len); in send_authentication_request() 2896 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 6); in send_authentication_request() 3050 struct auth_body *auth = (struct auth_body *)priv->rx_buf; in authenticate() local [all …]
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
D | acx.c | 70 struct acx_sleep_auth *auth; in wl1271_acx_sleep_auth() local 75 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1271_acx_sleep_auth() 76 if (!auth) { in wl1271_acx_sleep_auth() 81 auth->sleep_auth = sleep_auth; in wl1271_acx_sleep_auth() 83 ret = wl1271_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1271_acx_sleep_auth() 92 kfree(auth); in wl1271_acx_sleep_auth()
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
D | cfg.c | 346 struct mrvl_ie_auth_type *auth = (void *) tlv; in lbs_add_auth_type_tlv() local 353 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); in lbs_add_auth_type_tlv() 354 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); in lbs_add_auth_type_tlv() 355 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); in lbs_add_auth_type_tlv() 356 return sizeof(*auth); in lbs_add_auth_type_tlv()
|
D | types.h | 177 __le16 auth; member
|
/linux-4.1.27/fs/nfs/flexfilelayout/ |
D | flexfilelayoutdev.c | 313 struct rpc_auth *auth = ds->ds_clp->cl_rpcclient->cl_auth; in ff_layout_update_mirror_cred() local 321 cred = auth->au_ops->lookup_cred(auth, &acred, 0); in ff_layout_update_mirror_cred()
|
/linux-4.1.27/net/ipv4/ |
D | ah4.c | 496 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state() 501 aalg_desc->uinfo.auth.icv_fullbits / 8); in ah_init_state() 505 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
|
D | esp4.c | 607 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc() 612 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
|
/linux-4.1.27/arch/s390/include/asm/ |
D | cio.h | 73 __u32 auth : 1; member
|
/linux-4.1.27/fs/ceph/ |
D | mds_client.c | 381 s->s_mdsc->fsc->client->monc.auth, in ceph_put_mds_session() 3779 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in get_authorizer() 3780 struct ceph_auth_handshake *auth = &s->s_auth; in get_authorizer() local 3782 if (force_new && auth->authorizer) { in get_authorizer() 3783 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer() 3784 auth->authorizer = NULL; in get_authorizer() 3786 if (!auth->authorizer) { in get_authorizer() 3788 auth); in get_authorizer() 3793 auth); in get_authorizer() 3799 return auth; in get_authorizer() [all …]
|
D | debugfs.c | 163 struct ceph_auth_client *ac = fsc->client->monc.auth; in mds_sessions_show()
|
D | inode.c | 246 int mds = le32_to_cpu(dirinfo->auth); in ceph_fill_dirfrag()
|
/linux-4.1.27/net/ipv6/ |
D | ah6.c | 705 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state() 709 aalg_desc->uinfo.auth.icv_fullbits/8); in ah6_init_state() 713 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
|
D | esp6.c | 549 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc() 554 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
|
/linux-4.1.27/drivers/s390/cio/ |
D | device_status.c | 176 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth; in ccw_device_accumulate_esw()
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
D | rtw_mlme_ext.c | 936 pframe = mgmt->u.auth.variable; in OnAuth23a() 937 len = skb->len - offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23a() 939 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23a() 940 algorithm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23a() 1118 pie = mgmt->u.auth.variable; in OnAuth23aClient23a() 1119 plen -= offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23aClient23a() 1121 algthm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23aClient23a() 1122 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23aClient23a() 1123 status = le16_to_cpu(mgmt->u.auth.status_code); in OnAuth23aClient23a() 2856 pattrib->pktlen = offsetof(struct ieee80211_mgmt, u.auth.variable); in issue_auth() [all …]
|
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/ |
D | main.c | 63 u8 ucipher, u8 auth, u8 apsd_info) in ath6kl_add_new_sta() argument 78 sta->auth = auth; in ath6kl_add_new_sta() 424 u8 keymgmt, u8 ucipher, u8 auth, in ath6kl_connect_ap_mode_sta() argument 482 keymgmt, ucipher, auth, apsd_info); in ath6kl_connect_ap_mode_sta()
|
D | core.h | 418 u8 auth; member 943 u8 keymgmt, u8 ucipher, u8 auth,
|
D | wmi.h | 1533 u8 auth; member
|
D | wmi.c | 882 ev->u.ap_sta.auth, in ath6kl_wmi_connect_event_rx() 891 ev->u.ap_sta.auth, ev->assoc_req_len, in ath6kl_wmi_connect_event_rx()
|
/linux-4.1.27/drivers/staging/rtl8188eu/include/ |
D | ieee80211_ext.h | 189 } __packed auth; member
|
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/ |
D | cfg80211.h | 285 __le32 auth; member
|
D | cfg80211.c | 3445 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_cfg80211_sched_scan_start() 3520 u32 auth = 0; /* d11 open authentication */ in brcmf_configure_wpaie() local 3672 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); in brcmf_configure_wpaie()
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
D | libipw.h | 809 struct libipw_auth * auth); 811 struct libipw_deauth * auth);
|
D | ipw2200.c | 4581 struct notif_authenticate *auth in ipw_rx_notification() local 4582 = ¬if->u.auth; in ipw_rx_notification() 4590 le16_to_cpu(auth->status), in ipw_rx_notification() 4593 (auth->status))); in ipw_rx_notification() 4666 struct notif_authenticate *auth = ¬if->u.auth; in ipw_rx_notification() local 4667 switch (auth->state) { in ipw_rx_notification() 4681 le16_to_cpu(auth->status), in ipw_rx_notification() 4683 (auth-> in ipw_rx_notification() 4746 auth->state); in ipw_rx_notification()
|
D | ipw2200.h | 659 struct notif_authenticate auth; member
|
/linux-4.1.27/Documentation/ |
D | coccinelle.txt | 205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth 323 …linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
|
D | email-clients.txt | 203 - Won't do TLS SMTP auth over a non-SSL connection.
|
/linux-4.1.27/fs/nfs/ |
D | nfs2xdr.c | 74 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 77 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
D | super.c | 808 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local 849 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats() 850 if (auth->au_flavor) in nfs_show_stats() 851 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats()
|
D | write.c | 1142 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_key_timeout_notify() local 1144 return rpcauth_key_timeout_notify(auth, ctx->cred); in nfs_key_timeout_notify()
|
D | nfs3xdr.c | 113 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 116 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
D | nfs4proc.c | 3022 struct rpc_auth *auth; in nfs4_lookup_root_sec() local 3025 auth = rpcauth_create(&auth_args, server->client); in nfs4_lookup_root_sec() 3026 if (IS_ERR(auth)) { in nfs4_lookup_root_sec()
|
D | nfs4xdr.c | 960 struct rpc_auth *auth = req->rq_cred->cr_auth; in encode_compound_hdr() local 965 hdr->replen = RPC_REPHDRSIZE + auth->au_rslack + 3 + hdr->taglen; in encode_compound_hdr()
|
/linux-4.1.27/drivers/s390/block/ |
D | dasd_eckd.h | 145 unsigned char auth:2; /* Access authorization */ member
|
D | dasd_eckd.c | 283 data->mask.auth = 0x1; in define_extent() 564 dedata->mask.auth = 0x1; in prefix_LRE()
|
/linux-4.1.27/include/uapi/drm/ |
D | drm.h | 227 int auth; /**< Is client authenticated? */ member
|
/linux-4.1.27/net/mac80211/ |
D | ibss.c | 962 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth_ibss() 963 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth_ibss()
|
D | util.c | 1292 mgmt->u.auth.auth_alg = cpu_to_le16(auth_alg); in ieee80211_send_auth() 1293 mgmt->u.auth.auth_transaction = cpu_to_le16(transaction); in ieee80211_send_auth() 1294 mgmt->u.auth.status_code = cpu_to_le16(status); in ieee80211_send_auth()
|
D | mlme.c | 2507 pos = mgmt->u.auth.variable; in ieee80211_auth_challenge() 2548 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth() 2549 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth() 2550 status_code = le16_to_cpu(mgmt->u.auth.status_code); in ieee80211_rx_mgmt_auth()
|
D | cfg.c | 3741 .auth = ieee80211_auth,
|
/linux-4.1.27/include/linux/ |
D | ieee80211.h | 871 } __packed auth; member
|
/linux-4.1.27/drivers/gpu/drm/radeon/ |
D | r100.c | 1367 const unsigned *auth, unsigned n, in r100_cs_parse_packet0() argument 1393 if (auth[j] & m) { in r100_cs_parse_packet0() 1400 if (!(auth[j] & m)) { in r100_cs_parse_packet0()
|
D | radeon_asic.h | 126 const unsigned *auth, unsigned n,
|
/linux-4.1.27/include/net/ |
D | xfrm.h | 1341 struct xfrm_algo_auth_info auth; member
|
D | cfg80211.h | 2553 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | CHANGES | 134 Fix oops on second mount to server when null auth is used.
|
/linux-4.1.27/net/key/ |
D | af_key.c | 1157 x->aalg->alg_trunc_len = a->uinfo.auth.icv_truncbits; in pfkey_msg2xfrm_state()
|