/linux-master/include/linux/ceph/ |
H A D | mon_client.h | 77 struct ceph_auth_client *auth; member in struct:ceph_mon_client
|
/linux-master/net/sunrpc/ |
H A D | sunrpc_syms.c | 21 #include <linux/sunrpc/auth.h>
|
/linux-master/net/bluetooth/ |
H A D | smp.c | 850 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, argument 863 bt_dev_dbg(hcon->hdev, "auth:%u lcl:%u rem:%u", auth, local_io, 872 if (!(auth & SMP_AUTH_MITM)) 1011 u8 stk[16], auth; local 1021 auth = 1; 1023 auth = 0; 1030 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); 1142 u8 key_type, auth; local 1150 auth 1750 u8 key_size, auth, sec_level; local 1941 u8 key_size, auth; local 2063 u8 auth; local 2305 u8 sec_level, auth; local [all...] |
/linux-master/drivers/net/wireless/ti/wl1251/ |
H A D | acx.c | 118 struct acx_sleep_auth *auth; local 121 wl1251_debug(DEBUG_ACX, "acx sleep auth"); 123 auth = kzalloc(sizeof(*auth), GFP_KERNEL); 124 if (!auth) 127 auth->sleep_auth = sleep_auth; 129 ret = wl1251_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); 131 kfree(auth);
|
/linux-master/net/sctp/ |
H A D | auth.c | 20 #include <net/sctp/auth.h> 416 chunk->auth = 1; 708 struct sk_buff *skb, struct sctp_auth_chunk *auth, 722 key_id = ntohs(auth->auth_hdr.shkey_id); 723 hmac_id = ntohs(auth->auth_hdr.hmac_id); 741 digest = (u8 *)(&auth->auth_hdr + 1); 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, 707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) argument
|
H A D | endpointola.c | 370 chunk->auth = 1; 390 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth)
|
/linux-master/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp2_transition.c | 334 hdcp->auth.count.stream_management_retry_count++; 348 if (hdcp->auth.count.stream_management_retry_count > 10) { 351 hdcp->auth.count.stream_management_retry_count++; 657 if (hdcp->auth.count.stream_management_retry_count > 10) { 660 hdcp->auth.count.stream_management_retry_count++;
|
/linux-master/fs/ubifs/ |
H A D | gc.c | 411 struct ubifs_auth_node *auth; local 413 auth = kmalloc(ubifs_auth_node_sz(c), GFP_NOFS); 414 if (!auth) { 419 err = ubifs_prepare_auth_node(c, auth, 422 kfree(auth); 426 err = ubifs_wbuf_write_nolock(wbuf, auth, 429 kfree(auth);
|
/linux-master/arch/s390/kernel/ |
H A D | perf_cpum_cf.c | 361 unsigned int caca:1; /* Counter auth. change alert */ 515 static size_t cfdiag_getctr(void *data, size_t sz, unsigned long auth, argument 527 if (!(auth & cpumf_ctr_ctl[i])) 554 static int cfdiag_diffctr(struct cpu_cf_events *cpuhw, unsigned long auth) argument 560 auth &= (1 << CPUMF_LCCTL_ENABLE_SHIFT) - 1; 570 auth &= ~cpumf_ctr_ctl[ctrstart->set]; 577 } while (ctrstart->def && auth); 1744 unsigned long auth = 0; local 1749 auth |= cpumf_ctr_ctl[i]; 1751 return auth; [all...] |
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.c | 414 0, ctx->auth.alg, ctx->auth.mode, 703 hash_parms.alg = ctx->auth.alg; 704 hash_parms.mode = ctx->auth.mode; 777 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, 844 hash_parms.pad_len, ctx->auth.alg, 845 ctx->auth.mode, rctx->total_sent, 904 switch (ctx->auth.alg) { 957 if (ctx->auth.alg == HASH_ALG_MD5) { 976 if (rctx->is_sw_hmac || ctx->auth [all...] |
/linux-master/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | commands.h | 55 struct cfg80211_external_auth_params *auth);
|
/linux-master/drivers/crypto/qce/ |
H A D | common.c | 156 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; local 190 memcpy(auth, rctx->digest, digestsize); 192 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); 195 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words);
|
/linux-master/drivers/crypto/ |
H A D | sa2ul.h | 310 struct sa_ctx_info auth; member in struct:sa_tfm_ctx
|
H A D | atmel-sha.c | 2168 struct atmel_sha_authenc_ctx *auth; local 2208 auth = kzalloc(sizeof(*auth), GFP_KERNEL); 2209 if (!auth) { 2213 auth->tfm = tfm; 2215 return auth; 2224 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) argument 2226 if (auth) 2227 crypto_free_ahash(auth->tfm); 2228 kfree(auth); 2232 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) argument 2243 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) argument [all...] |
/linux-master/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 584 struct rtllib_authentication *auth; local 596 auth = skb_put(skb, sizeof(struct rtllib_authentication)); 598 auth->header.frame_control = cpu_to_le16(IEEE80211_STYPE_AUTH); 600 auth->header.frame_control |= cpu_to_le16(IEEE80211_FCTL_PROTECTED); 602 auth->header.duration_id = cpu_to_le16(0x013a); 603 ether_addr_copy(auth->header.addr1, beacon->bssid); 604 ether_addr_copy(auth->header.addr2, ieee->dev->dev_addr); 605 ether_addr_copy(auth->header.addr3, beacon->bssid); 607 auth->algorithm = WLAN_AUTH_OPEN; 609 auth [all...] |
/linux-master/drivers/acpi/ |
H A D | pfr_update.c | 278 const struct efi_image_auth *auth; local 305 auth = data + size; 306 size += sizeof(u64) + auth->auth_info.hdr.len;
|
/linux-master/drivers/net/wireless/ti/wlcore/ |
H A D | acx.c | 55 struct acx_sleep_auth *auth; local 58 wl1271_debug(DEBUG_ACX, "acx sleep auth %d", sleep_auth); 60 auth = kzalloc(sizeof(*auth), GFP_KERNEL); 61 if (!auth) { 66 auth->sleep_auth = sleep_auth; 68 ret = wl1271_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); 77 kfree(auth);
|
/linux-master/drivers/net/wireless/marvell/libertas/ |
H A D | cfg.c | 342 * Add auth type TLV. 351 struct mrvl_ie_auth_type *auth = (void *) tlv; local 356 * 01 auth type 358 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); 359 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); 360 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); 361 return sizeof(*auth); [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | asymmetric_type.c | 471 void *auth = key->payload.data[asym_auth]; local 479 subtype->destroy(data, auth);
|
/linux-master/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_skcipher.c | 156 memzero_explicit(&fctx->auth, sizeof(struct auth_keys)); 356 memcpy(fctx->auth.u.key2, (key + keylen), keylen);
|
/linux-master/drivers/platform/x86/dell/dell-wmi-sysman/ |
H A D | sysman.c | 94 char *auth = buffer + sizeof(u32) * 2; local 103 memcpy(auth, authentication, *seclen);
|
/linux-master/drivers/s390/cio/ |
H A D | device_status.c | 179 cdev_irb->esw.esw0.erw.auth = irb->esw.esw0.erw.auth;
|
/linux-master/net/xfrm/ |
H A D | xfrm_user.c | 448 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; 471 if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits) { 483 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits; 973 static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb) argument 981 sizeof(*algo) + (auth->alg_key_len + 7) / 8); 985 strncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name)); 987 if (redact_secret && auth->alg_key_len) 988 memset(algo->alg_key, 0, (auth->alg_key_len + 7) / 8); 990 memcpy(algo->alg_key, auth->alg_key, 991 (auth [all...] |
/linux-master/net/ceph/ |
H A D | osd_client.c | 21 #include <linux/ceph/auth.h> 5604 struct ceph_auth_client *ac = osdc->client->monc.auth; 5605 struct ceph_auth_handshake *auth = &o->o_auth; local 5608 ret = __ceph_auth_get_authorizer(ac, auth, CEPH_ENTITY_TYPE_OSD, 5613 return auth; 5621 struct ceph_auth_client *ac = osdc->client->monc.auth; 5631 struct ceph_auth_client *ac = osdc->client->monc.auth; 5632 struct ceph_auth_handshake *auth = &o->o_auth; local 5634 return ceph_auth_verify_authorizer_reply(ac, auth->authorizer, 5635 auth 5655 struct ceph_auth_handshake *auth = &o->o_auth; local 5675 struct ceph_auth_handshake *auth = &o->o_auth; local 5695 struct ceph_auth_handshake *auth = &o->o_auth; local 5734 struct ceph_auth_handshake *auth = &o->o_auth; local 5742 struct ceph_auth_handshake *auth = &o->o_auth; local [all...] |
/linux-master/fs/ceph/ |
H A D | mds_client.c | 25 #include <linux/ceph/auth.h> 1393 /* choose auth mds */ 1395 doutc(cl, "%p %llx.%llx frag %u mds%d (auth)\n", 1422 cap == ci->i_auth_cap ? "auth " : "", cap); 1582 /* flags, mds auth caps and oldest_client_tid */ 1644 /* version == 6, mds auth caps */ 2203 * after dropping auth caps. It doesn't hurt because reply 2204 * of lock mds request will re-add auth caps. */ 3524 * For async create we will choose the auth MDS of frag in parent 3529 * And then the auth ca 6003 struct ceph_auth_handshake *auth = &s->s_auth; local 6030 struct ceph_auth_handshake *auth = &s->s_auth; local 6054 struct ceph_auth_handshake *auth = &s->s_auth; local 6074 struct ceph_auth_handshake *auth = &s->s_auth; local 6094 struct ceph_auth_handshake *auth = &s->s_auth; local 6146 struct ceph_auth_handshake *auth = &s->s_auth; local 6154 struct ceph_auth_handshake *auth = &s->s_auth; local [all...] |