/linux-4.4.14/include/linux/ceph/ |
D | auth.h | 24 int (*sign_message)(struct ceph_auth_handshake *auth, 26 int (*check_message_signature)(struct ceph_auth_handshake *auth, 59 struct ceph_auth_handshake *auth); 62 struct ceph_auth_handshake *auth); 75 int (*sign_message)(struct ceph_auth_handshake *auth, 77 int (*check_message_signature)(struct ceph_auth_handshake *auth, 114 struct ceph_auth_handshake *auth); 126 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 129 if (auth->sign_message) in ceph_auth_sign_message() 130 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
D | mon_client.h | 65 struct ceph_auth_client *auth; member
|
D | ceph_fs.h | 486 __le32 auth; /* auth mds, if this is a delegation point */ member
|
/linux-4.4.14/crypto/ |
D | authencesn.c | 31 struct crypto_ahash_spawn auth; member 37 struct crypto_ahash *auth; member 67 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 75 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey() 76 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey() 78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 79 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey() 106 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local 108 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail() 139 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local [all …]
|
D | authenc.c | 28 struct crypto_ahash_spawn auth; member 34 struct crypto_ahash *auth; member 85 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 93 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 94 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 97 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey() 144 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 150 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv() 151 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv() [all …]
|
/linux-4.4.14/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 111 struct iscsi_node_auth *auth, in chap_server_open() argument 119 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 120 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 172 struct iscsi_node_auth *auth, in chap_server_compute_md5() argument 226 compare_len = strlen(auth->userid) + 1; in chap_server_compute_md5() 227 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_md5() 271 sg_init_one(&sg, &auth->password, strlen(auth->password)); in chap_server_compute_md5() 272 ret = crypto_hash_update(&desc, &sg, strlen(auth->password)); in chap_server_compute_md5() 308 if (!auth->authenticate_target) { in chap_server_compute_md5() 400 sg_init_one(&sg, auth->password_mutual, in chap_server_compute_md5() [all …]
|
D | iscsi_target_configfs.c | 410 struct iscsi_node_auth *auth = &nacl->node_auth; \ 414 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \ 422 struct iscsi_node_auth *auth = &nacl->node_auth; \ 426 if (count >= sizeof(auth->name)) \ 428 snprintf(auth->name, sizeof(auth->name), "%s", page); \ 429 if (!strncmp("NULL", auth->name, 4)) \ 430 auth->naf_flags &= ~flags; \ 432 auth->naf_flags |= flags; \ 434 if ((auth->naf_flags & NAF_USERID_IN_SET) && \ 435 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \ [all …]
|
D | iscsi_target_nego.c | 112 struct iscsi_node_auth *auth; in iscsi_handle_authentication() local 139 auth = &iscsi_tpg->tpg_demo_auth; in iscsi_handle_authentication() 144 auth = &iscsi_nacl->node_auth; in iscsi_handle_authentication() 150 auth = &iscsit_global->discovery_acl.node_auth; in iscsi_handle_authentication() 162 return srp_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication() 166 return chap_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication()
|
/linux-4.4.14/drivers/gpu/drm/ |
D | drm_auth.c | 48 struct drm_auth *auth = data; in drm_getmagic() local 58 auth->magic = file_priv->magic; in drm_getmagic() 61 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic() 79 struct drm_auth *auth = data; in drm_authmagic() local 82 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic() 85 file = idr_find(&file_priv->master->magic_map, auth->magic); in drm_authmagic() 88 idr_replace(&file_priv->master->magic_map, NULL, auth->magic); in drm_authmagic()
|
D | drm_ioc32.c | 292 int auth; /**< Is client authenticated? */ member 321 || __get_user(c32.auth, &client->auth) in compat_drm_getclient()
|
D | drm_ioctl.c | 234 client->auth = file_priv->authenticated; in drm_getclient()
|
/linux-4.4.14/net/sunrpc/ |
D | auth.c | 259 struct rpc_auth *auth; in rpcauth_create() local 263 auth = ERR_PTR(-EINVAL); in rpcauth_create() 276 auth = ops->create(args, clnt); in rpcauth_create() 278 if (IS_ERR(auth)) in rpcauth_create() 279 return auth; in rpcauth_create() 282 clnt->cl_auth = auth; in rpcauth_create() 285 return auth; in rpcauth_create() 290 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument 292 if (!atomic_dec_and_test(&auth->au_count)) in rpcauth_release() 294 auth->au_ops->destroy(auth); in rpcauth_release() [all …]
|
D | auth_generic.c | 68 struct rpc_auth *auth = task->tk_client->cl_auth; in generic_bind_cred() local 71 return auth->au_ops->lookup_cred(auth, acred, lookupflags); in generic_bind_cred() 78 generic_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_lookup_cred() argument 84 generic_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in generic_create_cred() argument 211 generic_key_timeout(struct rpc_auth *auth, struct rpc_cred *cred) in generic_key_timeout() argument 228 tcred = auth->au_ops->lookup_cred(auth, acred, 0); in generic_key_timeout()
|
D | auth_unix.c | 45 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 47 dprintk("RPC: destroying UNIX authenticator %p\n", auth); in unx_destroy() 48 rpcauth_clear_credcache(auth->au_credcache); in unx_destroy() 55 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument 57 return rpcauth_lookup_credcache(auth, acred, flags); in unx_lookup_cred() 61 unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_create_cred() argument 74 rpcauth_init_cred(&cred->uc_base, acred, auth, &unix_credops); in unx_create_cred()
|
D | auth_null.c | 28 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 36 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
D | Makefile | 11 auth.o auth_null.o auth_unix.o auth_generic.o \
|
D | clnt.c | 301 struct rpc_auth *auth; in rpc_client_register() local 319 auth = rpcauth_create(&auth_args, clnt); in rpc_client_register() 320 if (IS_ERR(auth)) { in rpc_client_register() 323 err = PTR_ERR(auth); in rpc_client_register()
|
/linux-4.4.14/net/ceph/ |
D | auth_none.c | 67 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() argument 88 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 89 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 90 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 91 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer() 92 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer()
|
D | auth_x.c | 438 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 439 void *p = auth + 1; in ceph_x_build_request() 451 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 452 tmp.client_challenge = auth->client_challenge; in ceph_x_build_request() 459 auth->struct_v = 1; in ceph_x_build_request() 460 auth->key = 0; in ceph_x_build_request() 462 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 464 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 465 le64_to_cpu(auth->key)); in ceph_x_build_request() 555 struct ceph_auth_handshake *auth) in ceph_x_create_authorizer() argument [all …]
|
D | mon_client.c | 127 ceph_auth_reset(monc->auth); in __close_session() 157 ret = ceph_auth_build_hello(monc->auth, in __open_session() 363 (int)monc->client->have_fsid, monc->auth->global_id); in have_debugfs_info() 364 return monc->client->have_fsid && monc->auth->global_id > 0; in have_debugfs_info() 756 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 822 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init() 824 if (IS_ERR(monc->auth)) { in ceph_monc_init() 825 err = PTR_ERR(monc->auth); in ceph_monc_init() 828 monc->auth->want_keys = in ceph_monc_init() 880 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all …]
|
D | Makefile | 10 auth.o auth_none.o \
|
D | messenger.c | 1403 struct ceph_auth_handshake *auth; in get_connect_authorizer() local 1413 auth = con->ops->get_authorizer(con, auth_proto, con->auth_retry); in get_connect_authorizer() 1416 if (IS_ERR(auth)) in get_connect_authorizer() 1417 return auth; in get_connect_authorizer() 1421 con->auth_reply_buf = auth->authorizer_reply_buf; in get_connect_authorizer() 1422 con->auth_reply_buf_len = auth->authorizer_reply_buf_len; in get_connect_authorizer() 1423 return auth; in get_connect_authorizer() 1444 struct ceph_auth_handshake *auth; in prepare_write_connect() local 1472 auth = get_connect_authorizer(con, &auth_proto); in prepare_write_connect() 1473 if (IS_ERR(auth)) in prepare_write_connect() [all …]
|
D | osd_client.c | 1055 struct ceph_auth_client *ac = osd->o_osdc->client->monc.auth; in put_osd() 2936 struct ceph_auth_client *ac = osdc->client->monc.auth; in get_authorizer() 2937 struct ceph_auth_handshake *auth = &o->o_auth; in get_authorizer() local 2939 if (force_new && auth->authorizer) { in get_authorizer() 2940 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer() 2941 auth->authorizer = NULL; in get_authorizer() 2943 if (!auth->authorizer) { in get_authorizer() 2945 auth); in get_authorizer() 2950 auth); in get_authorizer() 2956 return auth; in get_authorizer() [all …]
|
D | auth.c | 284 struct ceph_auth_handshake *auth) in ceph_auth_create_authorizer() argument 290 ret = ac->ops->create_authorizer(ac, peer_type, auth); in ceph_auth_create_authorizer()
|
D | debugfs.c | 219 client->monc.auth->global_id); in ceph_debugfs_client_init()
|
D | ceph_common.c | 572 return client->monc.auth->global_id; in ceph_client_id()
|
/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 180 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 229 auth = x509->akid_id; in pkcs7_verify_sig_chain() 230 if (auth) { in pkcs7_verify_sig_chain() 231 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 235 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 239 auth = x509->akid_skid; in pkcs7_verify_sig_chain() 240 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 246 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
|
/linux-4.4.14/net/sctp/ |
D | output.c | 78 packet->auth = NULL; in sctp_packet_reset() 193 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 209 if (!chunk->auth) in sctp_packet_bundle_auth() 212 auth = sctp_make_auth(asoc); in sctp_packet_bundle_auth() 213 if (!auth) in sctp_packet_bundle_auth() 216 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth() 219 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 307 packet->auth = chunk; in __sctp_packet_append_chunk() 391 unsigned char *auth = NULL; /* pointer to auth in skb data */ in sctp_packet_transmit() local 492 if (chunk == packet->auth) in sctp_packet_transmit() [all …]
|
D | auth.c | 419 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 709 struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() argument 724 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 725 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 745 sg_init_one(&sg, auth, end - (unsigned char *)auth); in sctp_auth_calculate_hmac() 750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
|
D | Makefile | 13 output.o input.o debug.o ssnmap.o auth.o
|
D | endpointola.c | 449 chunk->auth = 1; in sctp_endpoint_bh_rcv() 469 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_endpoint_bh_rcv()
|
D | sm_statefuns.c | 761 struct sctp_chunk auth; in sctp_sf_do_5_1D_ce() local 771 auth.skb = chunk->auth_chunk; in sctp_sf_do_5_1D_ce() 772 auth.asoc = chunk->asoc; in sctp_sf_do_5_1D_ce() 773 auth.sctp_hdr = chunk->sctp_hdr; in sctp_sf_do_5_1D_ce() 774 auth.chunk_hdr = (sctp_chunkhdr_t *)skb_push(chunk->auth_chunk, in sctp_sf_do_5_1D_ce() 777 auth.transport = chunk->transport; in sctp_sf_do_5_1D_ce() 779 ret = sctp_sf_authenticate(net, ep, new_asoc, type, &auth); in sctp_sf_do_5_1D_ce() 3611 if (!net->sctp.addip_noauth && !chunk->auth) in sctp_sf_do_asconf() 3728 if (!net->sctp.addip_noauth && !asconf_ack->auth) in sctp_sf_do_asconf_ack() 4055 chunk->auth = 1; in sctp_sf_authenticate()
|
D | associola.c | 1023 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_assoc_bh_rcv()
|
D | sm_make_chunk.c | 1395 retval->auth = 1; in _sctp_make_chunk()
|
/linux-4.4.14/Documentation/networking/ |
D | mac80211-auth-assoc-deauth.txt | 35 mac80211->driver: TX auth frame 36 driver->mac80211: RX auth frame 38 alt WEP shared key auth 39 mac80211->driver: TX auth frame 40 driver->mac80211: RX auth frame 44 mac80211->userspace: RX auth frame
|
D | 00-INDEX | 137 mac80211-auth-assoc-deauth.txt
|
/linux-4.4.14/net/xfrm/ |
D | xfrm_algo.c | 181 .auth = { 201 .auth = { 221 .auth = { 241 .auth = { 260 .auth = { 279 .auth = { 299 .auth = { 318 .auth = { 338 .auth = {
|
D | xfrm_user.c | 341 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth() 362 if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits) in attach_auth_trunc() 372 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; in attach_auth_trunc() 772 static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb) in copy_to_user_auth() argument 778 sizeof(*algo) + (auth->alg_key_len + 7) / 8); in copy_to_user_auth() 783 strncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name)); in copy_to_user_auth() 784 memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8); in copy_to_user_auth() 785 algo->alg_key_len = auth->alg_key_len; in copy_to_user_auth()
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_crypt_ccmp.c | 111 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument 174 rtllib_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 175 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 176 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 177 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 178 rtllib_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | rtllib_softmac.c | 778 struct rtllib_authentication *auth; in rtllib_authentication_req() local 790 auth = (struct rtllib_authentication *) in rtllib_authentication_req() 793 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH); in rtllib_authentication_req() 795 auth->header.frame_ctl |= cpu_to_le16(RTLLIB_FCTL_WEP); in rtllib_authentication_req() 797 auth->header.duration_id = cpu_to_le16(0x013a); in rtllib_authentication_req() 798 ether_addr_copy(auth->header.addr1, beacon->bssid); in rtllib_authentication_req() 799 ether_addr_copy(auth->header.addr2, ieee->dev->dev_addr); in rtllib_authentication_req() 800 ether_addr_copy(auth->header.addr3, beacon->bssid); in rtllib_authentication_req() 802 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req() 804 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in rtllib_authentication_req() [all …]
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_ccmp.c | 116 u8 *pn, size_t dlen, u8 *b0, u8 *auth, in ccmp_init_blocks() argument 182 ieee80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 183 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 184 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 185 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 186 ieee80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | ieee80211_softmac.c | 646 struct ieee80211_authentication *auth; in ieee80211_authentication_req() local 654 auth = (struct ieee80211_authentication *) in ieee80211_authentication_req() 658 auth->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_AUTH in ieee80211_authentication_req() 661 auth->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_AUTH); in ieee80211_authentication_req() 663 auth->header.duration_id = cpu_to_le16(0x013a); in ieee80211_authentication_req() 665 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req() 666 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN); in ieee80211_authentication_req() 667 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN); in ieee80211_authentication_req() 671 auth->algorithm = WLAN_AUTH_OPEN; in ieee80211_authentication_req() 673 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in ieee80211_authentication_req() [all …]
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | auth_gss.c | 294 struct gss_auth *auth; member 330 struct net *net = gss_msg->auth->net; in gss_release_msg() 338 gss_put_auth(gss_msg->auth); in gss_release_msg() 447 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 509 gss_msg->auth = gss_auth; in gss_alloc_msg() 725 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 986 struct rpc_auth * auth; in gss_create_new() local 1015 auth = &gss_auth->rpc_auth; in gss_create_new() 1016 auth->au_cslack = GSS_CRED_SLACK >> 2; in gss_create_new() 1017 auth->au_rslack = GSS_VERF_SLACK >> 2; in gss_create_new() [all …]
|
/linux-4.4.14/net/wireless/ |
D | lib80211_crypt_ccmp.c | 113 u8 * pn, size_t dlen, u8 * b0, u8 * auth, u8 * s0) in ccmp_init_blocks() argument 171 lib80211_ccmp_aes_encrypt(tfm, b0, auth); in ccmp_init_blocks() 172 xor_block(auth, aad, AES_BLOCK_LEN); in ccmp_init_blocks() 173 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks() 174 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); in ccmp_init_blocks() 175 lib80211_ccmp_aes_encrypt(tfm, auth, auth); in ccmp_init_blocks()
|
D | sme.c | 161 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work() 317 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth() 490 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect()
|
D | core.c | 348 WARN_ON(ops->auth && (!ops->assoc || !ops->deauth || !ops->disassoc)); in wiphy_new_nm()
|
D | rdev-ops.h | 436 ret = rdev->ops->auth(&rdev->wiphy, dev, req); in rdev_auth()
|
D | nl80211.c | 1496 CMD(auth, AUTHENTICATE); in nl80211_send_wiphy() 1553 if (rdev->ops->connect || rdev->ops->auth) { in nl80211_send_wiphy() 7031 if (!rdev->ops->auth) in nl80211_authenticate()
|
/linux-4.4.14/fs/ncpfs/ |
D | ioctl.c | 591 user.auth_type = server->auth.auth_type; in __ncp_ioctl() 593 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl() 599 server->auth.object_name, in __ncp_ioctl() 618 user.auth_type = server->auth.auth_type; in __ncp_ioctl() 620 user.object_name_len = server->auth.object_name_len; in __ncp_ioctl() 626 server->auth.object_name, in __ncp_ioctl() 672 oldname = server->auth.object_name; in __ncp_ioctl() 673 oldnamelen = server->auth.object_name_len; in __ncp_ioctl() 676 server->auth.auth_type = user.auth_type; in __ncp_ioctl() 677 server->auth.object_name_len = user.object_name_len; in __ncp_ioctl() [all …]
|
D | ncp_fs_sb.h | 92 } auth; member
|
D | inode.c | 591 server->auth.auth_type = NCP_AUTH_NONE; in ncp_fill_super() 793 kfree(server->auth.object_name); in ncp_put_super()
|
/linux-4.4.14/net/bluetooth/ |
D | smp.c | 859 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 872 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io); in tk_request() 880 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1013 u8 stk[16], auth; in smp_random() local 1023 auth = 1; in smp_random() 1025 auth = 0; in smp_random() 1032 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1132 u8 key_type, auth; in sc_add_ltk() local 1140 auth = 1; in sc_add_ltk() 1142 auth = 0; in sc_add_ltk() [all …]
|
D | hci_conn.c | 1241 goto auth; in hci_conn_security() 1272 auth: in hci_conn_security()
|
D | hci_core.c | 1018 __u8 auth = opt; in hci_auth_req() local 1020 BT_DBG("%s %x", req->hdev->name, auth); in hci_auth_req() 1023 hci_req_add(req, HCI_OP_WRITE_AUTH_ENABLE, 1, &auth); in hci_auth_req()
|
/linux-4.4.14/drivers/net/wireless/ti/wl1251/ |
D | acx.c | 117 struct acx_sleep_auth *auth; in wl1251_acx_sleep_auth() local 122 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1251_acx_sleep_auth() 123 if (!auth) in wl1251_acx_sleep_auth() 126 auth->sleep_auth = sleep_auth; in wl1251_acx_sleep_auth() 128 ret = wl1251_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1251_acx_sleep_auth() 130 kfree(auth); in wl1251_acx_sleep_auth()
|
/linux-4.4.14/Documentation/security/ |
D | keys-request-key.txt | 94 keyring that contains a link to auth key V. 103 search notes that the session keyring has auth key V in its bottom level. 113 (9) Upon instantiating key U, auth key V is automatically revoked so that it 120 be created uninstantiated, another auth key (X) would be created (as per step 122 context specified by auth key X will still be process A, as it was in auth key
|
D | keys-trusted-encrypted.txt | 31 keyauth= ascii hex auth for sealing key default 0x00...i 33 blobauth= ascii hex auth for sealed data default 0x00... 35 blobauth= ascii hex auth for sealed data default 0x00...
|
/linux-4.4.14/drivers/crypto/qce/ |
D | common.c | 240 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local 274 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 276 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 279 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
|
/linux-4.4.14/fs/nfsd/ |
D | Makefile | 13 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
|
D | nfs4callback.c | 704 struct rpc_auth *auth = client->cl_auth; in get_backchannel_cred() local 709 return auth->au_ops->lookup_cred(client->cl_auth, &acred, 0); in get_backchannel_cred()
|
/linux-4.4.14/drivers/net/wireless/hostap/ |
D | hostap_80211.h | 22 } __packed auth; member
|
/linux-4.4.14/include/net/sctp/ |
D | auth.h | 104 struct sctp_auth_chunk *auth, gfp_t gfp);
|
D | structs.h | 646 auth:1, /* IN: was auth'ed | OUT: needs auth */ member 708 struct sctp_chunk *auth; member
|
/linux-4.4.14/drivers/net/wireless/ |
D | atmel.c | 2870 struct auth_body auth; in send_authentication_request() local 2883 auth.alg = cpu_to_le16(system); in send_authentication_request() 2885 auth.status = 0; in send_authentication_request() 2886 auth.trans_seq = cpu_to_le16(priv->CurrentAuthentTransactionSeqNum); in send_authentication_request() 2891 auth.el_id = 16; /* challenge_text */ in send_authentication_request() 2892 auth.chall_text_len = challenge_len; in send_authentication_request() 2893 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request() 2894 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 8 + challenge_len); in send_authentication_request() 2896 atmel_transmit_management_frame(priv, &header, (u8 *)&auth, 6); in send_authentication_request() 3050 struct auth_body *auth = (struct auth_body *)priv->rx_buf; in authenticate() local [all …]
|
/linux-4.4.14/drivers/net/wireless/ti/wlcore/ |
D | acx.c | 70 struct acx_sleep_auth *auth; in wl1271_acx_sleep_auth() local 75 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1271_acx_sleep_auth() 76 if (!auth) { in wl1271_acx_sleep_auth() 81 auth->sleep_auth = sleep_auth; in wl1271_acx_sleep_auth() 83 ret = wl1271_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1271_acx_sleep_auth() 92 kfree(auth); in wl1271_acx_sleep_auth()
|
/linux-4.4.14/drivers/net/wireless/libertas/ |
D | cfg.c | 346 struct mrvl_ie_auth_type *auth = (void *) tlv; in lbs_add_auth_type_tlv() local 353 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); in lbs_add_auth_type_tlv() 354 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); in lbs_add_auth_type_tlv() 355 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); in lbs_add_auth_type_tlv() 356 return sizeof(*auth); in lbs_add_auth_type_tlv()
|
D | types.h | 177 __le16 auth; member
|
/linux-4.4.14/net/ipv4/ |
D | ah4.c | 498 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state() 503 aalg_desc->uinfo.auth.icv_fullbits / 8); in ah_init_state() 507 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
|
D | esp4.c | 650 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc() 655 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
|
/linux-4.4.14/fs/nfs/flexfilelayout/ |
D | flexfilelayoutdev.c | 339 struct rpc_auth *auth = ds->ds_clp->cl_rpcclient->cl_auth; in ff_layout_update_mirror_cred() local 347 cred = auth->au_ops->lookup_cred(auth, &acred, 0); in ff_layout_update_mirror_cred()
|
/linux-4.4.14/fs/ceph/ |
D | mds_client.c | 382 s->s_mdsc->fsc->client->monc.auth, in ceph_put_mds_session() 3880 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in get_authorizer() 3881 struct ceph_auth_handshake *auth = &s->s_auth; in get_authorizer() local 3883 if (force_new && auth->authorizer) { in get_authorizer() 3884 ceph_auth_destroy_authorizer(ac, auth->authorizer); in get_authorizer() 3885 auth->authorizer = NULL; in get_authorizer() 3887 if (!auth->authorizer) { in get_authorizer() 3889 auth); in get_authorizer() 3894 auth); in get_authorizer() 3900 return auth; in get_authorizer() [all …]
|
D | debugfs.c | 163 struct ceph_auth_client *ac = fsc->client->monc.auth; in mds_sessions_show()
|
D | inode.c | 245 int mds = le32_to_cpu(dirinfo->auth); in ceph_fill_dirfrag()
|
/linux-4.4.14/arch/s390/include/asm/ |
D | cio.h | 74 __u32 auth : 1; member
|
/linux-4.4.14/net/ipv6/ |
D | ah6.c | 707 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state() 711 aalg_desc->uinfo.auth.icv_fullbits/8); in ah6_init_state() 715 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
|
D | esp6.c | 592 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc() 597 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
|
/linux-4.4.14/drivers/s390/cio/ |
D | device_status.c | 176 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth; in ccw_device_accumulate_esw()
|
/linux-4.4.14/Documentation/DocBook/ |
D | 80211.xml.db | 43 API-struct-cfg80211-auth-request 51 API-cfg80211-auth-timeout
|
D | networking.xml.db | 248 API-rpc-clone-client-set-auth
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
D | rtw_mlme_ext.c | 935 pframe = mgmt->u.auth.variable; in OnAuth23a() 936 len = skb->len - offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23a() 938 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23a() 939 algorithm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23a() 1117 pie = mgmt->u.auth.variable; in OnAuth23aClient23a() 1118 plen -= offsetof(struct ieee80211_mgmt, u.auth.variable); in OnAuth23aClient23a() 1120 algthm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23aClient23a() 1121 seq = le16_to_cpu(mgmt->u.auth.auth_transaction); in OnAuth23aClient23a() 1122 status = le16_to_cpu(mgmt->u.auth.status_code); in OnAuth23aClient23a() 2848 pattrib->pktlen = offsetof(struct ieee80211_mgmt, u.auth.variable); in issue_auth() [all …]
|
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/ |
D | main.c | 63 u8 ucipher, u8 auth, u8 apsd_info) in ath6kl_add_new_sta() argument 78 sta->auth = auth; in ath6kl_add_new_sta() 424 u8 keymgmt, u8 ucipher, u8 auth, in ath6kl_connect_ap_mode_sta() argument 482 keymgmt, ucipher, auth, apsd_info); in ath6kl_connect_ap_mode_sta()
|
D | core.h | 418 u8 auth; member 945 u8 keymgmt, u8 ucipher, u8 auth,
|
D | wmi.h | 1533 u8 auth; member
|
D | wmi.c | 882 ev->u.ap_sta.auth, in ath6kl_wmi_connect_event_rx() 891 ev->u.ap_sta.auth, ev->assoc_req_len, in ath6kl_wmi_connect_event_rx()
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
D | ieee80211_ext.h | 189 } __packed auth; member
|
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/ |
D | cfg80211.h | 283 __le32 auth; member
|
D | cfg80211.c | 3530 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_cfg80211_sched_scan_start() 3605 u32 auth = 0; /* d11 open authentication */ in brcmf_configure_wpaie() local 3757 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); in brcmf_configure_wpaie()
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | libipw.h | 809 struct libipw_auth * auth); 811 struct libipw_deauth * auth);
|
D | ipw2200.c | 4581 struct notif_authenticate *auth in ipw_rx_notification() local 4582 = ¬if->u.auth; in ipw_rx_notification() 4590 le16_to_cpu(auth->status), in ipw_rx_notification() 4593 (auth->status))); in ipw_rx_notification() 4666 struct notif_authenticate *auth = ¬if->u.auth; in ipw_rx_notification() local 4667 switch (auth->state) { in ipw_rx_notification() 4681 le16_to_cpu(auth->status), in ipw_rx_notification() 4683 (auth-> in ipw_rx_notification() 4746 auth->state); in ipw_rx_notification()
|
D | ipw2200.h | 659 struct notif_authenticate auth; member
|
/linux-4.4.14/Documentation/ |
D | coccinelle.txt | 205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth 323 …linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
|
D | email-clients.txt | 239 - Won't do TLS SMTP auth over a non-SSL connection.
|
/linux-4.4.14/fs/nfs/ |
D | nfs2xdr.c | 74 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 77 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
D | super.c | 811 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local 852 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats() 853 if (auth->au_flavor) in nfs_show_stats() 854 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats()
|
D | write.c | 1162 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_key_timeout_notify() local 1164 return rpcauth_key_timeout_notify(auth, ctx->cred); in nfs_key_timeout_notify()
|
D | nfs3xdr.c | 113 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 116 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
D | nfs4proc.c | 3175 struct rpc_auth *auth; in nfs4_lookup_root_sec() local 3178 auth = rpcauth_create(&auth_args, server->client); in nfs4_lookup_root_sec() 3179 if (IS_ERR(auth)) { in nfs4_lookup_root_sec()
|
D | nfs4xdr.c | 963 struct rpc_auth *auth = req->rq_cred->cr_auth; in encode_compound_hdr() local 968 hdr->replen = RPC_REPHDRSIZE + auth->au_rslack + 3 + hdr->taglen; in encode_compound_hdr()
|
/linux-4.4.14/drivers/s390/block/ |
D | dasd_eckd.h | 145 unsigned char auth:2; /* Access authorization */ member
|
D | dasd_eckd.c | 283 data->mask.auth = 0x1; in define_extent() 564 dedata->mask.auth = 0x1; in prefix_LRE()
|
/linux-4.4.14/include/uapi/drm/ |
D | drm.h | 227 int auth; /**< Is client authenticated? */ member
|
/linux-4.4.14/net/mac80211/ |
D | ibss.c | 965 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth_ibss() 966 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth_ibss()
|
D | util.c | 1242 mgmt->u.auth.auth_alg = cpu_to_le16(auth_alg); in ieee80211_send_auth() 1243 mgmt->u.auth.auth_transaction = cpu_to_le16(transaction); in ieee80211_send_auth() 1244 mgmt->u.auth.status_code = cpu_to_le16(status); in ieee80211_send_auth()
|
D | mlme.c | 2557 pos = mgmt->u.auth.variable; in ieee80211_auth_challenge() 2598 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth() 2599 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth() 2600 status_code = le16_to_cpu(mgmt->u.auth.status_code); in ieee80211_rx_mgmt_auth()
|
D | cfg.c | 3846 .auth = ieee80211_auth,
|
/linux-4.4.14/include/linux/ |
D | ieee80211.h | 871 } __packed auth; member
|
/linux-4.4.14/drivers/gpu/drm/radeon/ |
D | r100.c | 1367 const unsigned *auth, unsigned n, in r100_cs_parse_packet0() argument 1393 if (auth[j] & m) { in r100_cs_parse_packet0() 1400 if (!(auth[j] & m)) { in r100_cs_parse_packet0()
|
D | radeon_asic.h | 126 const unsigned *auth, unsigned n,
|
/linux-4.4.14/include/net/ |
D | xfrm.h | 1352 struct xfrm_algo_auth_info auth; member
|
D | cfg80211.h | 2597 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | CHANGES | 134 Fix oops on second mount to server when null auth is used.
|
/linux-4.4.14/net/key/ |
D | af_key.c | 1157 x->aalg->alg_trunc_len = a->uinfo.auth.icv_truncbits; in pfkey_msg2xfrm_state()
|