/linux-4.19.296/include/linux/ceph/ |
D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 30 int (*check_message_signature)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 81 int (*sign_message)(struct ceph_auth_handshake *auth, 83 int (*check_message_signature)(struct ceph_auth_handshake *auth, 120 struct ceph_auth_handshake *auth); 134 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 137 if (auth->sign_message) in ceph_auth_sign_message() 138 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
D | mon_client.h | 77 struct ceph_auth_client *auth; member
|
D | messenger.h | 292 struct ceph_auth_handshake *auth; member
|
D | ceph_fs.h | 529 __le32 auth; /* auth mds, if this is a delegation point */ member
|
/linux-4.19.296/crypto/ |
D | authencesn.c | 31 struct crypto_ahash_spawn auth; member 37 struct crypto_ahash *auth; member 67 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 75 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey() 76 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey() 78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 79 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey() 107 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local 109 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail() 140 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local [all …]
|
D | authenc.c | 28 struct crypto_ahash_spawn auth; member 34 struct crypto_ahash *auth; member 93 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 101 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 102 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 104 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 105 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey() 153 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 159 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv() 160 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv() [all …]
|
/linux-4.19.296/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 177 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 230 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 231 if (auth) { in pkcs7_verify_sig_chain() 232 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 236 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 240 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 241 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 247 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
|
D | asymmetric_type.c | 442 void *auth = key->payload.data[asym_auth]; in asymmetric_key_destroy() local 450 subtype->destroy(data, auth); in asymmetric_key_destroy()
|
/linux-4.19.296/fs/nfsd/ |
D | Makefile | 14 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
|
D | nfs4callback.c | 761 struct rpc_auth *auth = client->cl_auth; in get_backchannel_cred() local 766 return auth->au_ops->lookup_cred(client->cl_auth, &acred, 0); in get_backchannel_cred()
|
/linux-4.19.296/include/net/sctp/ |
D | auth.h | 108 struct sk_buff *skb, struct sctp_auth_chunk *auth,
|
D | structs.h | 670 auth:1, /* IN: was auth'ed | OUT: needs auth */ member 738 struct sctp_chunk *auth; member
|
/linux-4.19.296/drivers/s390/cio/ |
D | device_status.c | 178 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth; in ccw_device_accumulate_esw()
|
/linux-4.19.296/fs/ceph/ |
D | mds_client.c | 4226 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in get_authorizer() 4227 struct ceph_auth_handshake *auth = &s->s_auth; in get_authorizer() local 4229 if (force_new && auth->authorizer) { in get_authorizer() 4230 ceph_auth_destroy_authorizer(auth->authorizer); in get_authorizer() 4231 auth->authorizer = NULL; in get_authorizer() 4233 if (!auth->authorizer) { in get_authorizer() 4235 auth); in get_authorizer() 4240 auth); in get_authorizer() 4246 return auth; in get_authorizer() 4254 struct ceph_auth_client *ac = mdsc->fsc->client->monc.auth; in add_authorizer_challenge() [all …]
|
D | debugfs.c | 163 struct ceph_auth_client *ac = fsc->client->monc.auth; in mds_sessions_show()
|
/linux-4.19.296/fs/nfs/ |
D | write.c | 1239 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_key_timeout_notify() local 1241 return rpcauth_key_timeout_notify(auth, ctx->cred); in nfs_key_timeout_notify() 1249 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local 1251 return rpcauth_cred_key_to_expire(auth, ctx->cred); in nfs_ctx_key_to_expire()
|
D | nfs2xdr.c | 75 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 78 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
D | super.c | 806 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local 847 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats() 848 if (auth->au_flavor) in nfs_show_stats() 849 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats()
|
D | nfs3xdr.c | 115 struct rpc_auth *auth = req->rq_cred->cr_auth; in prepare_reply_buffer() local 118 replen = RPC_REPHDRSIZE + auth->au_rslack + bufsize; in prepare_reply_buffer()
|
/linux-4.19.296/block/ |
D | sed-opal.c | 1258 enum opal_uid auth, in start_generic_opal_session() argument 1266 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session() 1284 switch (auth) { in start_generic_opal_session() 1296 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session() 1302 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session()
|
/linux-4.19.296/drivers/s390/block/ |
D | dasd_eckd.h | 153 unsigned char auth:2; /* Access authorization */ member
|
/linux-4.19.296/include/uapi/drm/ |
D | drm.h | 238 int auth; /**< Is client authenticated? */ member
|
/linux-4.19.296/include/linux/ |
D | ieee80211.h | 908 } __packed auth; member
|
/linux-4.19.296/include/net/ |
D | xfrm.h | 1488 struct xfrm_algo_auth_info auth; member
|
D | cfg80211.h | 3237 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member
|