Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 29) sorted by relevance

12

/linux-4.19.296/include/linux/ceph/
Dauth.h28 int (*sign_message)(struct ceph_auth_handshake *auth,
30 int (*check_message_signature)(struct ceph_auth_handshake *auth,
63 struct ceph_auth_handshake *auth);
66 struct ceph_auth_handshake *auth);
81 int (*sign_message)(struct ceph_auth_handshake *auth,
83 int (*check_message_signature)(struct ceph_auth_handshake *auth,
120 struct ceph_auth_handshake *auth);
134 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument
137 if (auth->sign_message) in ceph_auth_sign_message()
138 return auth->sign_message(auth, msg); in ceph_auth_sign_message()
[all …]
Dmon_client.h77 struct ceph_auth_client *auth; member
Dmessenger.h292 struct ceph_auth_handshake *auth; member
Dceph_fs.h529 __le32 auth; /* auth mds, if this is a delegation point */ member
/linux-4.19.296/crypto/
Dauthencesn.c31 struct crypto_ahash_spawn auth; member
37 struct crypto_ahash *auth; member
67 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local
75 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey()
76 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey()
78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
79 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey()
107 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local
109 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail()
140 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local
[all …]
Dauthenc.c28 struct crypto_ahash_spawn auth; member
34 struct crypto_ahash *auth; member
93 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local
101 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey()
102 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey()
104 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
105 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey()
153 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local
159 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv()
160 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv()
[all …]
/linux-4.19.296/crypto/asymmetric_keys/
Dpkcs7_verify.c177 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local
230 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain()
231 if (auth) { in pkcs7_verify_sig_chain()
232 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
236 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain()
240 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain()
241 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
247 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
Dasymmetric_type.c442 void *auth = key->payload.data[asym_auth]; in asymmetric_key_destroy() local
450 subtype->destroy(data, auth); in asymmetric_key_destroy()
/linux-4.19.296/fs/nfsd/
DMakefile14 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
Dnfs4callback.c761 struct rpc_auth *auth = client->cl_auth; in get_backchannel_cred() local
766 return auth->au_ops->lookup_cred(client->cl_auth, &acred, 0); in get_backchannel_cred()
/linux-4.19.296/include/net/sctp/
Dauth.h108 struct sk_buff *skb, struct sctp_auth_chunk *auth,
Dstructs.h670 auth:1, /* IN: was auth'ed | OUT: needs auth */ member
738 struct sctp_chunk *auth; member
/linux-4.19.296/drivers/s390/cio/
Ddevice_status.c178 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth; in ccw_device_accumulate_esw()
/linux-4.19.296/fs/ceph/
Dmds_client.c4226 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in get_authorizer()
4227 struct ceph_auth_handshake *auth = &s->s_auth; in get_authorizer() local
4229 if (force_new && auth->authorizer) { in get_authorizer()
4230 ceph_auth_destroy_authorizer(auth->authorizer); in get_authorizer()
4231 auth->authorizer = NULL; in get_authorizer()
4233 if (!auth->authorizer) { in get_authorizer()
4235 auth); in get_authorizer()
4240 auth); in get_authorizer()
4246 return auth; in get_authorizer()
4254 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in add_authorizer_challenge()
[all …]
Ddebugfs.c163 struct ceph_auth_client *ac = fsc->client->monc.auth; in mds_sessions_show()
/linux-4.19.296/fs/nfs/
Dwrite.c1239 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_key_timeout_notify() local
1241 return rpcauth_key_timeout_notify(auth, ctx->cred); in nfs_key_timeout_notify()
1249 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local
1251 return rpcauth_cred_key_to_expire(auth, ctx->cred); in nfs_ctx_key_to_expire()
Dnfs2xdr.c75 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local
78 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
Dsuper.c806 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local
847 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats()
848 if (auth->au_flavor) in nfs_show_stats()
849 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats()
Dnfs3xdr.c115 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local
118 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
/linux-4.19.296/block/
Dsed-opal.c1258 enum opal_uid auth, in start_generic_opal_session() argument
1266 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session()
1284 switch (auth) { in start_generic_opal_session()
1296 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session()
1302 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session()
/linux-4.19.296/drivers/s390/block/
Ddasd_eckd.h153 unsigned char auth:2; /* Access authorization */ member
/linux-4.19.296/include/uapi/drm/
Ddrm.h238 int auth; /**< Is client authenticated? */ member
/linux-4.19.296/include/linux/
Dieee80211.h908 } __packed auth; member
/linux-4.19.296/include/net/
Dxfrm.h1488 struct xfrm_algo_auth_info auth; member
Dcfg80211.h3237 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member

12