/linux-master/drivers/nvme/common/ |
H A D | Makefile | 5 obj-$(CONFIG_NVME_AUTH) += nvme-auth.o 8 nvme-auth-y += auth.o
|
/linux-master/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp_log.c | 57 HDCP_DDC_READ_TRACE(hdcp, "BKSV", hdcp->auth.msg.hdcp1.bksv, 58 sizeof(hdcp->auth.msg.hdcp1.bksv)); 59 HDCP_DDC_READ_TRACE(hdcp, "BCAPS", &hdcp->auth.msg.hdcp1.bcaps, 60 sizeof(hdcp->auth.msg.hdcp1.bcaps)); 62 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, 63 sizeof(hdcp->auth.msg.hdcp1.bstatus)); 64 HDCP_DDC_WRITE_TRACE(hdcp, "AN", hdcp->auth.msg.hdcp1.an, 65 sizeof(hdcp->auth.msg.hdcp1.an)); 66 HDCP_DDC_WRITE_TRACE(hdcp, "AKSV", hdcp->auth.msg.hdcp1.aksv, 67 sizeof(hdcp->auth [all...] |
H A D | hdcp_ddc.c | 249 hdcp->auth.msg.hdcp1.bksv, 250 sizeof(hdcp->auth.msg.hdcp1.bksv)); 256 &hdcp->auth.msg.hdcp1.bcaps, 257 sizeof(hdcp->auth.msg.hdcp1.bcaps)); 266 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, 270 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, 271 sizeof(hdcp->auth.msg.hdcp1.bstatus)); 278 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p, 279 sizeof(hdcp->auth.msg.hdcp1.r0p)); 289 hdcp->auth [all...] |
H A D | hdcp_psp.c | 37 in->session_handle = hdcp->auth.id; 273 hdcp->auth.id = hdcp_cmd->out_msg.hdcp1_create_session.session_handle; 278 hdcp->auth.msg.hdcp1.ainfo = hdcp_cmd->out_msg.hdcp1_create_session.ainfo_primary; 279 memcpy(hdcp->auth.msg.hdcp1.aksv, hdcp_cmd->out_msg.hdcp1_create_session.aksv_primary, 280 sizeof(hdcp->auth.msg.hdcp1.aksv)); 281 memcpy(hdcp->auth.msg.hdcp1.an, hdcp_cmd->out_msg.hdcp1_create_session.an_primary, 282 sizeof(hdcp->auth.msg.hdcp1.an)); 301 hdcp_cmd->in_msg.hdcp1_destroy_session.session_handle = hdcp->auth.id; 333 hdcp_cmd->in_msg.hdcp1_first_part_authentication.session_handle = hdcp->auth.id; 335 memcpy(hdcp_cmd->in_msg.hdcp1_first_part_authentication.bksv_primary, hdcp->auth [all...] |
H A D | hdcp1_execution.c | 34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); 48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? 51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? 58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? 68 status = (hdcp->auth.msg.hdcp1.bstatus & 81 return (hdcp->auth.msg.hdcp1.bstatus & 90 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? 100 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) 104 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth [all...] |
H A D | hdcp2_execution.c | 35 is_ready = HDCP_2_2_DP_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus_dp) ? 1 : 0; 37 is_ready = (HDCP_2_2_HDMI_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus[1]) && 38 (HDCP_2_2_HDMI_RXSTATUS_MSG_SZ_HI(hdcp->auth.msg.hdcp2.rxstatus[1]) << 8 | 39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0; 49 status = (hdcp->auth.msg.hdcp2.rxcaps_dp[0] == HDCP_2_2_RX_CAPS_VERSION_VAL) && 50 HDCP_2_2_DP_HDCP_CAPABLE(hdcp->auth.msg.hdcp2.rxcaps_dp[2]) ? 54 status = (hdcp->auth.msg.hdcp2.hdcp2version_hdmi & HDCP_2_2_HDMI_SUPPORT_MASK) ? 66 ret = HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus_dp) ? 70 ret = HDCP_2_2_HDMI_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus[1]) ? 79 return HDCP_2_2_DP_RXSTATUS_LINK_FAILED(hdcp->auth [all...] |
/linux-master/include/linux/ceph/ |
H A D | ceph_debug.h | 26 &client->fsid, client->monc.auth->global_id, \ 38 client->monc.auth->global_id, \ 51 client->monc.auth->global_id, __func__, ##__VA_ARGS__) 57 client->monc.auth->global_id, ##__VA_ARGS__) 60 client->monc.auth->global_id, ##__VA_ARGS__) 63 client->monc.auth->global_id, ##__VA_ARGS__) 66 client->monc.auth->global_id, ##__VA_ARGS__) 69 client->monc.auth->global_id, ##__VA_ARGS__) 72 client->monc.auth->global_id, ##__VA_ARGS__) 75 client->monc.auth [all...] |
H A D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 30 int (*check_message_signature)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 84 int (*sign_message)(struct ceph_auth_handshake *auth, 86 int (*check_message_signature)(struct ceph_auth_handshake *auth, 128 struct ceph_auth_handshake *auth, 144 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, argument 147 if (auth->sign_message) 148 return auth 153 ceph_auth_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) argument [all...] |
/linux-master/net/ceph/ |
H A D | auth_none.h | 6 #include <linux/ceph/auth.h>
|
H A D | auth_none.c | 11 #include <linux/ceph/auth.h> 69 * the generic auth code decode the global_id, and we carry no actual 95 struct ceph_auth_handshake *auth) 112 auth->authorizer = (struct ceph_authorizer *) au; 113 auth->authorizer_buf = au->buf; 114 auth->authorizer_buf_len = au->buf_len; 115 auth->authorizer_reply_buf = NULL; 116 auth->authorizer_reply_buf_len = 0; 93 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) argument
|
H A D | auth_x.h | 7 #include <linux/ceph/auth.h>
|
H A D | Makefile | 13 auth.o auth_none.o \
|
/linux-master/drivers/crypto/ |
H A D | atmel-authenc.h | 32 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth); 33 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, 37 struct atmel_sha_authenc_ctx *auth,
|
/linux-master/arch/powerpc/platforms/pseries/ |
H A D | plpks.c | 173 struct plpks_auth *auth; local 178 // The auth structure must not cross a page boundary and must be 180 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL); 181 if (!auth) 184 auth->version = 1; 185 auth->consumer = consumer; 188 return auth; 190 memcpy(auth->password, ospassword, ospasswordlength); 192 auth 391 plpks_confirm_object_flushed(struct label *label, struct plpks_auth *auth) argument 434 struct plpks_auth *auth; local 487 struct plpks_auth *auth; local 526 struct plpks_auth *auth; local 560 struct plpks_auth *auth; local [all...] |
/linux-master/net/sunrpc/ |
H A D | auth.c | 3 * linux/net/sunrpc/auth.c 148 request_module("rpc-auth-%u", flavor); 224 struct rpc_auth *auth = ERR_PTR(-EINVAL); local 232 auth = ops->create(args, clnt); 235 if (IS_ERR(auth)) 236 return auth; 239 clnt->cl_auth = auth; 242 return auth; 247 rpcauth_release(struct rpc_auth *auth) argument 249 if (!refcount_dec_and_test(&auth 288 rpcauth_init_credcache(struct rpc_auth *auth) argument 407 rpcauth_destroy_credcache(struct rpc_auth *auth) argument 514 rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, int flags, gfp_t gfp) argument 578 rpcauth_lookupcred(struct rpc_auth *auth, int flags) argument 592 rpcauth_init_cred(struct rpc_cred *cred, const struct auth_cred *acred, struct rpc_auth *auth, const struct rpc_credops *ops) argument 609 struct rpc_auth *auth = task->tk_client->cl_auth; local 625 struct rpc_auth *auth = task->tk_client->cl_auth; local 641 struct rpc_auth *auth = task->tk_client->cl_auth; local 652 struct rpc_auth *auth = task->tk_client->cl_auth; local [all...] |
H A D | auth_unix.c | 16 #include <linux/sunrpc/auth.h> 36 unx_destroy(struct rpc_auth *auth) argument 43 static struct rpc_cred *unx_lookup_cred(struct rpc_auth *auth, argument 56 rpcauth_init_cred(ret, acred, auth, &unix_credops); 175 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; local 197 auth->au_verfsize = XDR_QUADLEN(size) + 2; 198 auth->au_rslack = XDR_QUADLEN(size) + 2; 199 auth->au_ralign = XDR_QUADLEN(size) + 2;
|
H A D | Makefile | 12 auth.o auth_null.o auth_tls.o auth_unix.o \
|
/linux-master/crypto/ |
H A D | authencesn.c | 26 struct crypto_ahash_spawn auth; member in struct:authenc_esn_instance_ctx 32 struct crypto_ahash *auth; member in struct:crypto_authenc_esn_ctx 62 struct crypto_ahash *auth = ctx->auth; local 70 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); 71 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); 121 struct crypto_ahash *auth = ctx->auth; local 141 ahash_request_set_tfm(ahreq, auth); 222 struct crypto_ahash *auth = ctx->auth; local 269 struct crypto_ahash *auth = ctx->auth; local 318 struct crypto_ahash *auth; local 387 struct hash_alg_common *auth; local [all...] |
H A D | authenc.c | 23 struct crypto_ahash_spawn auth; member in struct:authenc_instance_ctx 29 struct crypto_ahash *auth; member in struct:crypto_authenc_ctx 88 struct crypto_ahash *auth = ctx->auth; local 96 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); 97 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); 138 struct crypto_ahash *auth = ctx->auth; local 144 ahash_request_set_tfm(ahreq, auth); 280 struct crypto_ahash *auth = ctx->auth; local 304 struct crypto_ahash *auth; local 371 struct hash_alg_common *auth; local [all...] |
/linux-master/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, 147 if (!(auth->naf_flags & NAF_USERID_SET) || 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { 242 struct iscsi_node_auth *auth, 316 compare_len = strlen(auth->userid) + 1; 317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { 383 ret = crypto_shash_update(desc, (char *)&auth->password, 384 strlen(auth->password)); 412 if (!auth->authenticate_target) { 526 ret = crypto_shash_update(desc, auth 137 chap_server_open( struct iscsit_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) argument 240 chap_server_compute_hash( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) argument 571 chap_main_loop( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) argument [all...] |
/linux-master/Documentation/networking/ |
H A D | mac80211-auth-assoc-deauth.txt | 35 mac80211->driver: TX auth frame 36 driver->mac80211: RX auth frame 38 alt WEP shared key auth 39 mac80211->driver: TX auth frame 40 driver->mac80211: RX auth frame 44 mac80211->userspace: RX auth frame
|
/linux-master/drivers/nvme/target/ |
H A D | Makefile | 16 nvmet-$(CONFIG_NVME_TARGET_AUTH) += fabrics-cmd-auth.o auth.o
|
/linux-master/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 44 auth = ('A' * 15).encode() 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 63 result = self.client.unseal(self.root_key, blob, auth, handle) 72 auth = ('A' * 20).encode() 75 blob = self.client.seal(self.root_key, data, auth, None) 78 auth[:-1] + 'B'.encode(), None) 91 auth [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 198 struct asymmetric_key_id *auth; local 248 auth = sig->auth_ids[0]; 249 if (auth) { 250 pr_debug("- want %*phN\n", auth->len, auth->data); 254 if (asymmetric_key_id_same(p->id, auth)) 258 auth = sig->auth_ids[1]; 259 pr_debug("- want %*phN\n", auth->len, auth->data); 265 if (asymmetric_key_id_same(p->skid, auth)) [all...] |
/linux-master/net/sctp/ |
H A D | output.c | 67 packet->auth = NULL; 240 /* Try to bundle an auth chunk into the packet. */ 246 struct sctp_chunk *auth; local 252 /* See if this is an auth chunk we are bundling or if 253 * auth is already bundled. 261 if (!chunk->auth) 264 auth = sctp_make_auth(asoc, chunk->shkey->key_id); 265 if (!auth) 268 auth->shkey = chunk->shkey; 269 sctp_auth_shkey_hold(auth 440 struct sctp_auth_chunk *auth = NULL; local [all...] |