Searched refs:auth (Results 1 - 25 of 171) sorted by relevance

1234567

/linux-master/drivers/nvme/common/
H A DMakefile5 obj-$(CONFIG_NVME_AUTH) += nvme-auth.o
8 nvme-auth-y += auth.o
/linux-master/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp_log.c57 HDCP_DDC_READ_TRACE(hdcp, "BKSV", hdcp->auth.msg.hdcp1.bksv,
58 sizeof(hdcp->auth.msg.hdcp1.bksv));
59 HDCP_DDC_READ_TRACE(hdcp, "BCAPS", &hdcp->auth.msg.hdcp1.bcaps,
60 sizeof(hdcp->auth.msg.hdcp1.bcaps));
62 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus,
63 sizeof(hdcp->auth.msg.hdcp1.bstatus));
64 HDCP_DDC_WRITE_TRACE(hdcp, "AN", hdcp->auth.msg.hdcp1.an,
65 sizeof(hdcp->auth.msg.hdcp1.an));
66 HDCP_DDC_WRITE_TRACE(hdcp, "AKSV", hdcp->auth.msg.hdcp1.aksv,
67 sizeof(hdcp->auth
[all...]
H A Dhdcp_ddc.c249 hdcp->auth.msg.hdcp1.bksv,
250 sizeof(hdcp->auth.msg.hdcp1.bksv));
256 &hdcp->auth.msg.hdcp1.bcaps,
257 sizeof(hdcp->auth.msg.hdcp1.bcaps));
266 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus,
270 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus,
271 sizeof(hdcp->auth.msg.hdcp1.bstatus));
278 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p,
279 sizeof(hdcp->auth.msg.hdcp1.r0p));
289 hdcp->auth
[all...]
H A Dhdcp_psp.c37 in->session_handle = hdcp->auth.id;
273 hdcp->auth.id = hdcp_cmd->out_msg.hdcp1_create_session.session_handle;
278 hdcp->auth.msg.hdcp1.ainfo = hdcp_cmd->out_msg.hdcp1_create_session.ainfo_primary;
279 memcpy(hdcp->auth.msg.hdcp1.aksv, hdcp_cmd->out_msg.hdcp1_create_session.aksv_primary,
280 sizeof(hdcp->auth.msg.hdcp1.aksv));
281 memcpy(hdcp->auth.msg.hdcp1.an, hdcp_cmd->out_msg.hdcp1_create_session.an_primary,
282 sizeof(hdcp->auth.msg.hdcp1.an));
301 hdcp_cmd->in_msg.hdcp1_destroy_session.session_handle = hdcp->auth.id;
333 hdcp_cmd->in_msg.hdcp1_first_part_authentication.session_handle = hdcp->auth.id;
335 memcpy(hdcp_cmd->in_msg.hdcp1_first_part_authentication.bksv_primary, hdcp->auth
[all...]
H A Dhdcp1_execution.c34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv));
48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ?
51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ?
58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ?
68 status = (hdcp->auth.msg.hdcp1.bstatus &
81 return (hdcp->auth.msg.hdcp1.bstatus &
90 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ?
100 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8)
104 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth
[all...]
H A Dhdcp2_execution.c35 is_ready = HDCP_2_2_DP_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus_dp) ? 1 : 0;
37 is_ready = (HDCP_2_2_HDMI_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus[1]) &&
38 (HDCP_2_2_HDMI_RXSTATUS_MSG_SZ_HI(hdcp->auth.msg.hdcp2.rxstatus[1]) << 8 |
39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0;
49 status = (hdcp->auth.msg.hdcp2.rxcaps_dp[0] == HDCP_2_2_RX_CAPS_VERSION_VAL) &&
50 HDCP_2_2_DP_HDCP_CAPABLE(hdcp->auth.msg.hdcp2.rxcaps_dp[2]) ?
54 status = (hdcp->auth.msg.hdcp2.hdcp2version_hdmi & HDCP_2_2_HDMI_SUPPORT_MASK) ?
66 ret = HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus_dp) ?
70 ret = HDCP_2_2_HDMI_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus[1]) ?
79 return HDCP_2_2_DP_RXSTATUS_LINK_FAILED(hdcp->auth
[all...]
/linux-master/include/linux/ceph/
H A Dceph_debug.h26 &client->fsid, client->monc.auth->global_id, \
38 client->monc.auth->global_id, \
51 client->monc.auth->global_id, __func__, ##__VA_ARGS__)
57 client->monc.auth->global_id, ##__VA_ARGS__)
60 client->monc.auth->global_id, ##__VA_ARGS__)
63 client->monc.auth->global_id, ##__VA_ARGS__)
66 client->monc.auth->global_id, ##__VA_ARGS__)
69 client->monc.auth->global_id, ##__VA_ARGS__)
72 client->monc.auth->global_id, ##__VA_ARGS__)
75 client->monc.auth
[all...]
H A Dauth.h28 int (*sign_message)(struct ceph_auth_handshake *auth,
30 int (*check_message_signature)(struct ceph_auth_handshake *auth,
63 struct ceph_auth_handshake *auth);
66 struct ceph_auth_handshake *auth);
84 int (*sign_message)(struct ceph_auth_handshake *auth,
86 int (*check_message_signature)(struct ceph_auth_handshake *auth,
128 struct ceph_auth_handshake *auth,
144 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, argument
147 if (auth->sign_message)
148 return auth
153 ceph_auth_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) argument
[all...]
/linux-master/net/ceph/
H A Dauth_none.h6 #include <linux/ceph/auth.h>
H A Dauth_none.c11 #include <linux/ceph/auth.h>
69 * the generic auth code decode the global_id, and we carry no actual
95 struct ceph_auth_handshake *auth)
112 auth->authorizer = (struct ceph_authorizer *) au;
113 auth->authorizer_buf = au->buf;
114 auth->authorizer_buf_len = au->buf_len;
115 auth->authorizer_reply_buf = NULL;
116 auth->authorizer_reply_buf_len = 0;
93 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) argument
H A Dauth_x.h7 #include <linux/ceph/auth.h>
H A DMakefile13 auth.o auth_none.o \
/linux-master/drivers/crypto/
H A Datmel-authenc.h32 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth);
33 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth,
37 struct atmel_sha_authenc_ctx *auth,
/linux-master/arch/powerpc/platforms/pseries/
H A Dplpks.c173 struct plpks_auth *auth; local
178 // The auth structure must not cross a page boundary and must be
180 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL);
181 if (!auth)
184 auth->version = 1;
185 auth->consumer = consumer;
188 return auth;
190 memcpy(auth->password, ospassword, ospasswordlength);
192 auth
391 plpks_confirm_object_flushed(struct label *label, struct plpks_auth *auth) argument
434 struct plpks_auth *auth; local
487 struct plpks_auth *auth; local
526 struct plpks_auth *auth; local
560 struct plpks_auth *auth; local
[all...]
/linux-master/net/sunrpc/
H A Dauth.c3 * linux/net/sunrpc/auth.c
148 request_module("rpc-auth-%u", flavor);
224 struct rpc_auth *auth = ERR_PTR(-EINVAL); local
232 auth = ops->create(args, clnt);
235 if (IS_ERR(auth))
236 return auth;
239 clnt->cl_auth = auth;
242 return auth;
247 rpcauth_release(struct rpc_auth *auth) argument
249 if (!refcount_dec_and_test(&auth
288 rpcauth_init_credcache(struct rpc_auth *auth) argument
407 rpcauth_destroy_credcache(struct rpc_auth *auth) argument
514 rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, int flags, gfp_t gfp) argument
578 rpcauth_lookupcred(struct rpc_auth *auth, int flags) argument
592 rpcauth_init_cred(struct rpc_cred *cred, const struct auth_cred *acred, struct rpc_auth *auth, const struct rpc_credops *ops) argument
609 struct rpc_auth *auth = task->tk_client->cl_auth; local
625 struct rpc_auth *auth = task->tk_client->cl_auth; local
641 struct rpc_auth *auth = task->tk_client->cl_auth; local
652 struct rpc_auth *auth = task->tk_client->cl_auth; local
[all...]
H A Dauth_unix.c16 #include <linux/sunrpc/auth.h>
36 unx_destroy(struct rpc_auth *auth) argument
43 static struct rpc_cred *unx_lookup_cred(struct rpc_auth *auth, argument
56 rpcauth_init_cred(ret, acred, auth, &unix_credops);
175 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; local
197 auth->au_verfsize = XDR_QUADLEN(size) + 2;
198 auth->au_rslack = XDR_QUADLEN(size) + 2;
199 auth->au_ralign = XDR_QUADLEN(size) + 2;
H A DMakefile12 auth.o auth_null.o auth_tls.o auth_unix.o \
/linux-master/crypto/
H A Dauthencesn.c26 struct crypto_ahash_spawn auth; member in struct:authenc_esn_instance_ctx
32 struct crypto_ahash *auth; member in struct:crypto_authenc_esn_ctx
62 struct crypto_ahash *auth = ctx->auth; local
70 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK);
71 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) &
73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen);
121 struct crypto_ahash *auth = ctx->auth; local
141 ahash_request_set_tfm(ahreq, auth);
222 struct crypto_ahash *auth = ctx->auth; local
269 struct crypto_ahash *auth = ctx->auth; local
318 struct crypto_ahash *auth; local
387 struct hash_alg_common *auth; local
[all...]
H A Dauthenc.c23 struct crypto_ahash_spawn auth; member in struct:authenc_instance_ctx
29 struct crypto_ahash *auth; member in struct:crypto_authenc_ctx
88 struct crypto_ahash *auth = ctx->auth; local
96 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK);
97 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) &
99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen);
138 struct crypto_ahash *auth = ctx->auth; local
144 ahash_request_set_tfm(ahreq, auth);
280 struct crypto_ahash *auth = ctx->auth; local
304 struct crypto_ahash *auth; local
371 struct hash_alg_common *auth; local
[all...]
/linux-master/drivers/target/iscsi/
H A Discsi_target_auth.c139 struct iscsi_node_auth *auth,
147 if (!(auth->naf_flags & NAF_USERID_SET) ||
148 !(auth->naf_flags & NAF_PASSWORD_SET)) {
242 struct iscsi_node_auth *auth,
316 compare_len = strlen(auth->userid) + 1;
317 if (strncmp(chap_n, auth->userid, compare_len) != 0) {
383 ret = crypto_shash_update(desc, (char *)&auth->password,
384 strlen(auth->password));
412 if (!auth->authenticate_target) {
526 ret = crypto_shash_update(desc, auth
137 chap_server_open( struct iscsit_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) argument
240 chap_server_compute_hash( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) argument
571 chap_main_loop( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) argument
[all...]
/linux-master/Documentation/networking/
H A Dmac80211-auth-assoc-deauth.txt35 mac80211->driver: TX auth frame
36 driver->mac80211: RX auth frame
38 alt WEP shared key auth
39 mac80211->driver: TX auth frame
40 driver->mac80211: RX auth frame
44 mac80211->userspace: RX auth frame
/linux-master/drivers/nvme/target/
H A DMakefile16 nvmet-$(CONFIG_NVME_TARGET_AUTH) += fabrics-cmd-auth.o auth.o
/linux-master/tools/testing/selftests/tpm2/
H A Dtpm2_tests.py24 auth = ('A' * 15).encode()
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
44 auth = ('A' * 15).encode()
55 blob = self.client.seal(self.root_key, data, auth, policy_dig)
63 result = self.client.unseal(self.root_key, blob, auth, handle)
72 auth = ('A' * 20).encode()
75 blob = self.client.seal(self.root_key, data, auth, None)
78 auth[:-1] + 'B'.encode(), None)
91 auth
[all...]
/linux-master/crypto/asymmetric_keys/
H A Dpkcs7_verify.c198 struct asymmetric_key_id *auth; local
248 auth = sig->auth_ids[0];
249 if (auth) {
250 pr_debug("- want %*phN\n", auth->len, auth->data);
254 if (asymmetric_key_id_same(p->id, auth))
258 auth = sig->auth_ids[1];
259 pr_debug("- want %*phN\n", auth->len, auth->data);
265 if (asymmetric_key_id_same(p->skid, auth))
[all...]
/linux-master/net/sctp/
H A Doutput.c67 packet->auth = NULL;
240 /* Try to bundle an auth chunk into the packet. */
246 struct sctp_chunk *auth; local
252 /* See if this is an auth chunk we are bundling or if
253 * auth is already bundled.
261 if (!chunk->auth)
264 auth = sctp_make_auth(asoc, chunk->shkey->key_id);
265 if (!auth)
268 auth->shkey = chunk->shkey;
269 sctp_auth_shkey_hold(auth
440 struct sctp_auth_chunk *auth = NULL; local
[all...]

Completed in 446 milliseconds

1234567