Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 112 of 112) sorted by relevance

/linux-4.4.14/include/linux/ceph/
Dauth.h24 int (*sign_message)(struct ceph_auth_handshake *auth,
26 int (*check_message_signature)(struct ceph_auth_handshake *auth,
59 struct ceph_auth_handshake *auth);
62 struct ceph_auth_handshake *auth);
75 int (*sign_message)(struct ceph_auth_handshake *auth,
77 int (*check_message_signature)(struct ceph_auth_handshake *auth,
114 struct ceph_auth_handshake *auth);
126 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument
129 if (auth->sign_message) in ceph_auth_sign_message()
130 return auth->sign_message(auth, msg); in ceph_auth_sign_message()
[all …]
Dmon_client.h65 struct ceph_auth_client *auth; member
Dceph_fs.h486 __le32 auth; /* auth mds, if this is a delegation point */ member
/linux-4.4.14/crypto/
Dauthencesn.c31 struct crypto_ahash_spawn auth; member
37 struct crypto_ahash *auth; member
67 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local
75 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey()
76 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey()
78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
79 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey()
106 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local
108 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail()
139 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local
[all …]
Dauthenc.c28 struct crypto_ahash_spawn auth; member
34 struct crypto_ahash *auth; member
85 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local
93 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey()
94 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey()
96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
97 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey()
144 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local
150 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv()
151 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv()
[all …]
/linux-4.4.14/drivers/target/iscsi/
Discsi_target_auth.c111 struct iscsi_node_auth *auth, in chap_server_open() argument
119 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open()
120 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open()
172 struct iscsi_node_auth *auth, in chap_server_compute_md5() argument
226 compare_len = strlen(auth->userid) + 1; in chap_server_compute_md5()
227 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_md5()
271 sg_init_one(&sg, &auth->password, strlen(auth->password)); in chap_server_compute_md5()
272 ret = crypto_hash_update(&desc, &sg, strlen(auth->password)); in chap_server_compute_md5()
308 if (!auth->authenticate_target) { in chap_server_compute_md5()
400 sg_init_one(&sg, auth->password_mutual, in chap_server_compute_md5()
[all …]
Discsi_target_configfs.c410 struct iscsi_node_auth *auth = &nacl->node_auth; \
414 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
422 struct iscsi_node_auth *auth = &nacl->node_auth; \
426 if (count >= sizeof(auth->name)) \
428 snprintf(auth->name, sizeof(auth->name), "%s", page); \
429 if (!strncmp("NULL", auth->name, 4)) \
430 auth->naf_flags &= ~flags; \
432 auth->naf_flags |= flags; \
434 if ((auth->naf_flags & NAF_USERID_IN_SET) && \
435 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \
[all …]
Discsi_target_nego.c112 struct iscsi_node_auth *auth; in iscsi_handle_authentication() local
139 auth = &iscsi_tpg->tpg_demo_auth; in iscsi_handle_authentication()
144 auth = &iscsi_nacl->node_auth; in iscsi_handle_authentication()
150 auth = &iscsit_global->discovery_acl.node_auth; in iscsi_handle_authentication()
162 return srp_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication()
166 return chap_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication()
/linux-4.4.14/drivers/gpu/drm/
Ddrm_auth.c48 struct drm_auth *auth = data; in drm_getmagic() local
58 auth->magic = file_priv->magic; in drm_getmagic()
61 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic()
79 struct drm_auth *auth = data; in drm_authmagic() local
82 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic()
85 file = idr_find(&file_priv->master->magic_map, auth->magic); in drm_authmagic()
88 idr_replace(&file_priv->master->magic_map, NULL, auth->magic); in drm_authmagic()
Ddrm_ioc32.c292 int auth; /**< Is client authenticated? */ member
321 || __get_user(c32.auth, &client->auth) in compat_drm_getclient()
Ddrm_ioctl.c234 client->auth = file_priv->authenticated; in drm_getclient()
/linux-4.4.14/net/sunrpc/
Dauth.c259 struct rpc_auth *auth; in rpcauth_create() local
263 auth = ERR_PTR(-EINVAL); in rpcauth_create()
276 auth = ops->create(args, clnt); in rpcauth_create()
278 if (IS_ERR(auth)) in rpcauth_create()
279 return auth; in rpcauth_create()
282 clnt->cl_auth = auth; in rpcauth_create()
285 return auth; in rpcauth_create()
290 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument
292 if (!atomic_dec_and_test(&auth->au_count)) in rpcauth_release()
294 auth->au_ops->destroy(auth); in rpcauth_release()
[all …]
Dauth_generic.c68 struct rpc_auth *auth = task->tk_client->cl_auth; in generic_bind_cred() local
71 return auth->au_ops->lookup_cred(auth, acred, lookupflags); in generic_bind_cred()
78 generic_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_lookup_cred() argument
84 generic_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_create_cred() argument
211 generic_key_timeout(struct rpc_auth *auth, struct rpc_cred *cred) in generic_key_timeout() argument
228 tcred = auth->au_ops->lookup_cred(auth, acred, 0); in generic_key_timeout()
Dauth_unix.c45 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument
47 dprintk("RPC: destroying UNIX authenticator %p\n", auth); in unx_destroy()
48 rpcauth_clear_credcache(auth->au_credcache); in unx_destroy()
55 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument
57 return rpcauth_lookup_credcache(auth, acred, flags); in unx_lookup_cred()
61 unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_create_cred() argument
74 rpcauth_init_cred(&cred->uc_base, acred, auth, &unix_credops); in unx_create_cred()
Dauth_null.c28 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument
36 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
DMakefile11 auth.o auth_null.o auth_unix.o auth_generic.o \
Dclnt.c301 struct rpc_auth *auth; in rpc_client_register() local
319 auth = rpcauth_create(&auth_args, clnt); in rpc_client_register()
320 if (IS_ERR(auth)) { in rpc_client_register()
323 err = PTR_ERR(auth); in rpc_client_register()
/linux-4.4.14/net/ceph/
Dauth_none.c67 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() argument
88 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer()
89 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer()
90 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer()
91 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer()
92 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer()
Dauth_x.c438 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local
439 void *p = auth + 1; in ceph_x_build_request()
451 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request()
452 tmp.client_challenge = auth->client_challenge; in ceph_x_build_request()
459 auth->struct_v = 1; in ceph_x_build_request()
460 auth->key = 0; in ceph_x_build_request()
462 auth->key ^= *(__le64 *)u; in ceph_x_build_request()
464 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request()
465 le64_to_cpu(auth->key)); in ceph_x_build_request()
555 struct ceph_auth_handshake *auth) in ceph_x_create_authorizer() argument
[all …]
Dmon_client.c127 ceph_auth_reset(monc->auth); in __close_session()
157 ret = ceph_auth_build_hello(monc->auth, in __open_session()
363 (int)monc->client->have_fsid, monc->auth->global_id); in have_debugfs_info()
364 return monc->client->have_fsid && monc->auth->global_id > 0; in have_debugfs_info()
756 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work()
822 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init()
824 if (IS_ERR(monc->auth)) { in ceph_monc_init()
825 err = PTR_ERR(monc->auth); in ceph_monc_init()
828 monc->auth->want_keys = in ceph_monc_init()
880 ceph_auth_destroy(monc->auth); in ceph_monc_init()
[all …]
DMakefile10 auth.o auth_none.o \
Dmessenger.c1403 struct ceph_auth_handshake *auth; in get_connect_authorizer() local
1413 auth = con->ops->get_authorizer(con, auth_proto, con->auth_retry); in get_connect_authorizer()
1416 if (IS_ERR(auth)) in get_connect_authorizer()
1417 return auth; in get_connect_authorizer()
1421 con->auth_reply_buf = auth->authorizer_reply_buf; in get_connect_authorizer()
1422 con->auth_reply_buf_len = auth->authorizer_reply_buf_len; in get_connect_authorizer()
1423 return auth; in get_connect_authorizer()
1444 struct ceph_auth_handshake *auth; in prepare_write_connect() local
1472 auth = get_connect_authorizer(con, &auth_proto); in prepare_write_connect()
1473 if (IS_ERR(auth)) in prepare_write_connect()
[all …]
Dosd_client.c1055 struct ceph_auth_client *ac = osd->o_osdc->client->monc.auth; in put_osd()
2936 struct ceph_auth_client *ac = osdc->client->monc.auth; in get_authorizer()
2937 struct ceph_auth_handshake *auth = &o->o_auth; in get_authorizer() local
2939 if (force_new && auth->authorizer) { in get_authorizer()
2940 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer()
2941 auth->authorizer = NULL; in get_authorizer()
2943 if (!auth->authorizer) { in get_authorizer()
2945 auth); in get_authorizer()
2950 auth); in get_authorizer()
2956 return auth; in get_authorizer()
[all …]
Dauth.c284 struct ceph_auth_handshake *auth) in ceph_auth_create_authorizer() argument
290 ret = ac->ops->create_authorizer(ac, peer_type, auth); in ceph_auth_create_authorizer()
Ddebugfs.c219 client->monc.auth->global_id); in ceph_debugfs_client_init()
Dceph_common.c572 return client->monc.auth->global_id; in ceph_client_id()
/linux-4.4.14/crypto/asymmetric_keys/
Dpkcs7_verify.c180 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local
229 auth = x509->akid_id; in pkcs7_verify_sig_chain()
230 if (auth) { in pkcs7_verify_sig_chain()
231 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
235 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain()
239 auth = x509->akid_skid; in pkcs7_verify_sig_chain()
240 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
246 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
/linux-4.4.14/net/sctp/
Doutput.c78 packet->auth = NULL; in sctp_packet_reset()
193 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local
209 if (!chunk->auth) in sctp_packet_bundle_auth()
212 auth = sctp_make_auth(asoc); in sctp_packet_bundle_auth()
213 if (!auth) in sctp_packet_bundle_auth()
216 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth()
219 sctp_chunk_free(auth); in sctp_packet_bundle_auth()
307 packet->auth = chunk; in __sctp_packet_append_chunk()
391 unsigned char *auth = NULL; /* pointer to auth in skb data */ in sctp_packet_transmit() local
492 if (chunk == packet->auth) in sctp_packet_transmit()
[all …]
Dauth.c419 chunk->auth = 1; in sctp_auth_asoc_init_active_key()
709 struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() argument
724 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac()
725 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac()
745 sg_init_one(&sg, auth, end - (unsigned char *)auth); in sctp_auth_calculate_hmac()
750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
DMakefile13 output.o input.o debug.o ssnmap.o auth.o
Dendpointola.c449 chunk->auth = 1; in sctp_endpoint_bh_rcv()
469 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_endpoint_bh_rcv()
Dsm_statefuns.c761 struct sctp_chunk auth; in sctp_sf_do_5_1D_ce() local
771 auth.skb = chunk->auth_chunk; in sctp_sf_do_5_1D_ce()
772 auth.asoc = chunk->asoc; in sctp_sf_do_5_1D_ce()
773 auth.sctp_hdr = chunk->sctp_hdr; in sctp_sf_do_5_1D_ce()
774 auth.chunk_hdr = (sctp_chunkhdr_t *)skb_push(chunk->auth_chunk, in sctp_sf_do_5_1D_ce()
777 auth.transport = chunk->transport; in sctp_sf_do_5_1D_ce()
779 ret = sctp_sf_authenticate(net, ep, new_asoc, type, &auth); in sctp_sf_do_5_1D_ce()
3611 if (!net->sctp.addip_noauth && !chunk->auth) in sctp_sf_do_asconf()
3728 if (!net->sctp.addip_noauth && !asconf_ack->auth) in sctp_sf_do_asconf_ack()
4055 chunk->auth = 1; in sctp_sf_authenticate()
Dassociola.c1023 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_assoc_bh_rcv()
Dsm_make_chunk.c1395 retval->auth = 1; in _sctp_make_chunk()
/linux-4.4.14/Documentation/networking/
Dmac80211-auth-assoc-deauth.txt35 mac80211->driver: TX auth frame
36 driver->mac80211: RX auth frame
38 alt WEP shared key auth
39 mac80211->driver: TX auth frame
40 driver->mac80211: RX auth frame
44 mac80211->userspace: RX auth frame
D00-INDEX137 mac80211-auth-assoc-deauth.txt
/linux-4.4.14/net/xfrm/
Dxfrm_algo.c181 .auth = {
201 .auth = {
221 .auth = {
241 .auth = {
260 .auth = {
279 .auth = {
299 .auth = {
318 .auth = {
338 .auth = {
Dxfrm_user.c341 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth()
362 if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits) in attach_auth_trunc()
372 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth_trunc()
772 static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb) in copy_to_user_auth() argument
778 sizeof(*algo) + (auth->alg_key_len + 7) / 8); in copy_to_user_auth()
783 strncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name)); in copy_to_user_auth()
784 memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8); in copy_to_user_auth()
785 algo->alg_key_len = auth->alg_key_len; in copy_to_user_auth()
/linux-4.4.14/drivers/staging/rtl8192e/
Drtllib_crypt_ccmp.c111 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument
174 rtllib_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks()
175 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks()
176 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
177 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks()
178 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
Drtllib_softmac.c778 struct rtllib_authentication *auth; in rtllib_authentication_req() local
790 auth = (struct rtllib_authentication *) in rtllib_authentication_req()
793 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH); in rtllib_authentication_req()
795 auth->header.frame_ctl |= cpu_to_le16(RTLLIB_FCTL_WEP); in rtllib_authentication_req()
797 auth->header.duration_id = cpu_to_le16(0x013a); in rtllib_authentication_req()
798 ether_addr_copy(auth->header.addr1, beacon->bssid); in rtllib_authentication_req()
799 ether_addr_copy(auth->header.addr2, ieee->dev->dev_addr); in rtllib_authentication_req()
800 ether_addr_copy(auth->header.addr3, beacon->bssid); in rtllib_authentication_req()
802 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req()
804 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in rtllib_authentication_req()
[all …]
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/
Dieee80211_crypt_ccmp.c116 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument
182 ieee80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks()
183 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks()
184 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
185 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks()
186 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
Dieee80211_softmac.c646 struct ieee80211_authentication *auth; in ieee80211_authentication_req() local
654 auth = (struct ieee80211_authentication *) in ieee80211_authentication_req()
658 auth->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_AUTH in ieee80211_authentication_req()
661 auth->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_AUTH); in ieee80211_authentication_req()
663 auth->header.duration_id = cpu_to_le16(0x013a); in ieee80211_authentication_req()
665 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req()
666 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN); in ieee80211_authentication_req()
667 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req()
671 auth->algorithm = WLAN_AUTH_OPEN; in ieee80211_authentication_req()
673 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in ieee80211_authentication_req()
[all …]
/linux-4.4.14/net/sunrpc/auth_gss/
Dauth_gss.c294 struct gss_auth *auth; member
330 struct net *net = gss_msg->auth->net; in gss_release_msg()
338 gss_put_auth(gss_msg->auth); in gss_release_msg()
447 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg()
509 gss_msg->auth = gss_auth; in gss_alloc_msg()
725 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall()
986 struct rpc_auth * auth; in gss_create_new() local
1015 auth = &gss_auth->rpc_auth; in gss_create_new()
1016 auth->au_cslack = GSS_CRED_SLACK >> 2; in gss_create_new()
1017 auth->au_rslack = GSS_VERF_SLACK >> 2; in gss_create_new()
[all …]
/linux-4.4.14/net/wireless/
Dlib80211_crypt_ccmp.c113 u8 * pn, size_t dlen, u8 * b0, u8 * auth, u8 * s0) in ccmp_init_blocks() argument
171 lib80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks()
172 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks()
173 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
174 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks()
175 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
Dsme.c161 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work()
317 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth()
490 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect()
Dcore.c348 WARN_ON(ops->auth && (!ops->assoc || !ops->deauth || !ops->disassoc)); in wiphy_new_nm()
Drdev-ops.h436 ret = rdev->ops->auth(&rdev->wiphy, dev, req); in rdev_auth()
Dnl80211.c1496 CMD(auth, AUTHENTICATE); in nl80211_send_wiphy()
1553 if (rdev->ops->connect || rdev->ops->auth) { in nl80211_send_wiphy()
7031 if (!rdev->ops->auth) in nl80211_authenticate()
/linux-4.4.14/fs/ncpfs/
Dioctl.c591 user.auth_type = server->auth.auth_type; in __ncp_ioctl()
593 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl()
599 server->auth.object_name, in __ncp_ioctl()
618 user.auth_type = server->auth.auth_type; in __ncp_ioctl()
620 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl()
626 server->auth.object_name, in __ncp_ioctl()
672 oldname = server->auth.object_name; in __ncp_ioctl()
673 oldnamelen = server->auth.object_name_len; in __ncp_ioctl()
676 server->auth.auth_type = user.auth_type; in __ncp_ioctl()
677 server->auth.object_name_len = user.object_name_len; in __ncp_ioctl()
[all …]
Dncp_fs_sb.h92 } auth; member
Dinode.c591 server->auth.auth_type = NCP_AUTH_NONE; in ncp_fill_super()
793 kfree(server->auth.object_name); in ncp_put_super()
/linux-4.4.14/net/bluetooth/
Dsmp.c859 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument
872 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io); in tk_request()
880 if (!(auth & SMP_AUTH_MITM)) in tk_request()
1013 u8 stk[16], auth; in smp_random() local
1023 auth = 1; in smp_random()
1025 auth = 0; in smp_random()
1032 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random()
1132 u8 key_type, auth; in sc_add_ltk() local
1140 auth = 1; in sc_add_ltk()
1142 auth = 0; in sc_add_ltk()
[all …]
Dhci_conn.c1241 goto auth; in hci_conn_security()
1272 auth: in hci_conn_security()
Dhci_core.c1018 __u8 auth = opt; in hci_auth_req() local
1020 BT_DBG("%s %x", req->hdev->name, auth); in hci_auth_req()
1023 hci_req_add(req, HCI_OP_WRITE_AUTH_ENABLE, 1, &auth); in hci_auth_req()
/linux-4.4.14/drivers/net/wireless/ti/wl1251/
Dacx.c117 struct acx_sleep_auth *auth; in wl1251_acx_sleep_auth() local
122 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1251_acx_sleep_auth()
123 if (!auth) in wl1251_acx_sleep_auth()
126 auth->sleep_auth = sleep_auth; in wl1251_acx_sleep_auth()
128 ret = wl1251_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1251_acx_sleep_auth()
130 kfree(auth); in wl1251_acx_sleep_auth()
/linux-4.4.14/Documentation/security/
Dkeys-request-key.txt94 keyring that contains a link to auth key V.
103 search notes that the session keyring has auth key V in its bottom level.
113 (9) Upon instantiating key U, auth key V is automatically revoked so that it
120 be created uninstantiated, another auth key (X) would be created (as per step
122 context specified by auth key X will still be process A, as it was in auth key
Dkeys-trusted-encrypted.txt31 keyauth= ascii hex auth for sealing key default 0x00...i
33 blobauth= ascii hex auth for sealed data default 0x00...
35 blobauth= ascii hex auth for sealed data default 0x00...
/linux-4.4.14/drivers/crypto/qce/
Dcommon.c240 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local
274 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
276 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
279 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
/linux-4.4.14/fs/nfsd/
DMakefile13 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
Dnfs4callback.c704 struct rpc_auth *auth = client->cl_auth; in get_backchannel_cred() local
709 return auth->au_ops->lookup_cred(client->cl_auth, &acred, 0); in get_backchannel_cred()
/linux-4.4.14/drivers/net/wireless/hostap/
Dhostap_80211.h22 } __packed auth; member
/linux-4.4.14/include/net/sctp/
Dauth.h104 struct sctp_auth_chunk *auth, gfp_t gfp);
Dstructs.h646 auth:1, /* IN: was auth'ed | OUT: needs auth */ member
708 struct sctp_chunk *auth; member
/linux-4.4.14/drivers/net/wireless/
Datmel.c2870 struct auth_body auth; in send_authentication_request() local
2883 auth.alg = cpu_to_le16(system); in send_authentication_request()
2885 auth.status = 0; in send_authentication_request()
2886 auth.trans_seq = cpu_to_le16(priv->CurrentAuthentTransactionSeqNum); in send_authentication_request()
2891 auth.el_id = 16; /* challenge_text */ in send_authentication_request()
2892 auth.chall_text_len = challenge_len; in send_authentication_request()
2893 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request()
2894 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 8 + challenge_len); in send_authentication_request()
2896 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 6); in send_authentication_request()
3050 struct auth_body *auth = (struct auth_body *)priv->rx_buf; in authenticate() local
[all …]
/linux-4.4.14/drivers/net/wireless/ti/wlcore/
Dacx.c70 struct acx_sleep_auth *auth; in wl1271_acx_sleep_auth() local
75 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1271_acx_sleep_auth()
76 if (!auth) { in wl1271_acx_sleep_auth()
81 auth->sleep_auth = sleep_auth; in wl1271_acx_sleep_auth()
83 ret = wl1271_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1271_acx_sleep_auth()
92 kfree(auth); in wl1271_acx_sleep_auth()
/linux-4.4.14/drivers/net/wireless/libertas/
Dcfg.c346 struct mrvl_ie_auth_type *auth = (void *) tlv; in lbs_add_auth_type_tlv() local
353 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); in lbs_add_auth_type_tlv()
354 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); in lbs_add_auth_type_tlv()
355 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); in lbs_add_auth_type_tlv()
356 return sizeof(*auth); in lbs_add_auth_type_tlv()
Dtypes.h177 __le16 auth; member
/linux-4.4.14/net/ipv4/
Dah4.c498 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state()
503 aalg_desc->uinfo.auth.icv_fullbits / 8); in ah_init_state()
507 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
Desp4.c650 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc()
655 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
/linux-4.4.14/fs/nfs/flexfilelayout/
Dflexfilelayoutdev.c339 struct rpc_auth *auth = ds->ds_clp->cl_rpcclient->cl_auth; in ff_layout_update_mirror_cred() local
347 cred = auth->au_ops->lookup_cred(auth, &acred, 0); in ff_layout_update_mirror_cred()
/linux-4.4.14/fs/ceph/
Dmds_client.c382 s->s_mdsc->fsc->client->monc.auth, in ceph_put_mds_session()
3880 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in get_authorizer()
3881 struct ceph_auth_handshake *auth = &s->s_auth; in get_authorizer() local
3883 if (force_new && auth->authorizer) { in get_authorizer()
3884 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer()
3885 auth->authorizer = NULL; in get_authorizer()
3887 if (!auth->authorizer) { in get_authorizer()
3889 auth); in get_authorizer()
3894 auth); in get_authorizer()
3900 return auth; in get_authorizer()
[all …]
Ddebugfs.c163 struct ceph_auth_client *ac = fsc->client->monc.auth; in mds_sessions_show()
Dinode.c245 int mds = le32_to_cpu(dirinfo->auth); in ceph_fill_dirfrag()
/linux-4.4.14/arch/s390/include/asm/
Dcio.h74 __u32 auth : 1; member
/linux-4.4.14/net/ipv6/
Dah6.c707 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state()
711 aalg_desc->uinfo.auth.icv_fullbits/8); in ah6_init_state()
715 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
Desp6.c592 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc()
597 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
/linux-4.4.14/drivers/s390/cio/
Ddevice_status.c176 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth; in ccw_device_accumulate_esw()
/linux-4.4.14/Documentation/DocBook/
D80211.xml.db43 API-struct-cfg80211-auth-request
51 API-cfg80211-auth-timeout
Dnetworking.xml.db248 API-rpc-clone-client-set-auth
/linux-4.4.14/drivers/staging/rtl8723au/core/
Drtw_mlme_ext.c935 pframe = mgmt->u.auth.variable; in OnAuth23a()
936 len = skb->len - offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23a()
938 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23a()
939 algorithm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23a()
1117 pie = mgmt->u.auth.variable; in OnAuth23aClient23a()
1118 plen -= offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23aClient23a()
1120 algthm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23aClient23a()
1121 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23aClient23a()
1122 status = le16_to_cpu(mgmt->u.auth.status_code); in OnAuth23aClient23a()
2848 pattrib->pktlen = offsetof(struct ieee80211_mgmt, u.auth.variable); in issue_auth()
[all …]
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/
Dmain.c63 u8 ucipher, u8 auth, u8 apsd_info) in ath6kl_add_new_sta() argument
78 sta->auth = auth; in ath6kl_add_new_sta()
424 u8 keymgmt, u8 ucipher, u8 auth, in ath6kl_connect_ap_mode_sta() argument
482 keymgmt, ucipher, auth, apsd_info); in ath6kl_connect_ap_mode_sta()
Dcore.h418 u8 auth; member
945 u8 keymgmt, u8 ucipher, u8 auth,
Dwmi.h1533 u8 auth; member
Dwmi.c882 ev->u.ap_sta.auth, in ath6kl_wmi_connect_event_rx()
891 ev->u.ap_sta.auth, ev->assoc_req_len, in ath6kl_wmi_connect_event_rx()
/linux-4.4.14/drivers/staging/rtl8188eu/include/
Dieee80211_ext.h189 } __packed auth; member
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/
Dcfg80211.h283 __le32 auth; member
Dcfg80211.c3530 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_cfg80211_sched_scan_start()
3605 u32 auth = 0; /* d11 open authentication */ in brcmf_configure_wpaie() local
3757 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); in brcmf_configure_wpaie()
/linux-4.4.14/drivers/net/wireless/ipw2x00/
Dlibipw.h809 struct libipw_auth * auth);
811 struct libipw_deauth * auth);
Dipw2200.c4581 struct notif_authenticate *auth in ipw_rx_notification() local
4582 = &notif->u.auth; in ipw_rx_notification()
4590 le16_to_cpu(auth->status), in ipw_rx_notification()
4593 (auth->status))); in ipw_rx_notification()
4666 struct notif_authenticate *auth = &notif->u.auth; in ipw_rx_notification() local
4667 switch (auth->state) { in ipw_rx_notification()
4681 le16_to_cpu(auth->status), in ipw_rx_notification()
4683 (auth-> in ipw_rx_notification()
4746 auth->state); in ipw_rx_notification()
Dipw2200.h659 struct notif_authenticate auth; member
/linux-4.4.14/Documentation/
Dcoccinelle.txt205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth
323 …linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
Demail-clients.txt239 - Won't do TLS SMTP auth over a non-SSL connection.
/linux-4.4.14/fs/nfs/
Dnfs2xdr.c74 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local
77 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
Dsuper.c811 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local
852 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats()
853 if (auth->au_flavor) in nfs_show_stats()
854 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats()
Dwrite.c1162 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_key_timeout_notify() local
1164 return rpcauth_key_timeout_notify(auth, ctx->cred); in nfs_key_timeout_notify()
Dnfs3xdr.c113 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local
116 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
Dnfs4proc.c3175 struct rpc_auth *auth; in nfs4_lookup_root_sec() local
3178 auth = rpcauth_create(&auth_args, server->client); in nfs4_lookup_root_sec()
3179 if (IS_ERR(auth)) { in nfs4_lookup_root_sec()
Dnfs4xdr.c963 struct rpc_auth *auth = req->rq_cred->cr_auth; in encode_compound_hdr() local
968 hdr->replen = RPC_REPHDRSIZE + auth->au_rslack + 3 + hdr->taglen; in encode_compound_hdr()
/linux-4.4.14/drivers/s390/block/
Ddasd_eckd.h145 unsigned char auth:2; /* Access authorization */ member
Ddasd_eckd.c283 data->mask.auth = 0x1; in define_extent()
564 dedata->mask.auth = 0x1; in prefix_LRE()
/linux-4.4.14/include/uapi/drm/
Ddrm.h227 int auth; /**< Is client authenticated? */ member
/linux-4.4.14/net/mac80211/
Dibss.c965 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth_ibss()
966 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth_ibss()
Dutil.c1242 mgmt->u.auth.auth_alg = cpu_to_le16(auth_alg); in ieee80211_send_auth()
1243 mgmt->u.auth.auth_transaction = cpu_to_le16(transaction); in ieee80211_send_auth()
1244 mgmt->u.auth.status_code = cpu_to_le16(status); in ieee80211_send_auth()
Dmlme.c2557 pos = mgmt->u.auth.variable; in ieee80211_auth_challenge()
2598 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth()
2599 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth()
2600 status_code = le16_to_cpu(mgmt->u.auth.status_code); in ieee80211_rx_mgmt_auth()
Dcfg.c3846 .auth = ieee80211_auth,
/linux-4.4.14/include/linux/
Dieee80211.h871 } __packed auth; member
/linux-4.4.14/drivers/gpu/drm/radeon/
Dr100.c1367 const unsigned *auth, unsigned n, in r100_cs_parse_packet0() argument
1393 if (auth[j] & m) { in r100_cs_parse_packet0()
1400 if (!(auth[j] & m)) { in r100_cs_parse_packet0()
Dradeon_asic.h126 const unsigned *auth, unsigned n,
/linux-4.4.14/include/net/
Dxfrm.h1352 struct xfrm_algo_auth_info auth; member
Dcfg80211.h2597 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member
/linux-4.4.14/Documentation/filesystems/cifs/
DCHANGES134 Fix oops on second mount to server when null auth is used.
/linux-4.4.14/net/key/
Daf_key.c1157 x->aalg->alg_trunc_len = a->uinfo.auth.icv_truncbits; in pfkey_msg2xfrm_state()