/Linux-v5.4/crypto/ |
D | authencesn.c | 26 struct crypto_ahash_spawn auth; member 32 struct crypto_ahash *auth; member 62 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 70 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey() 71 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey() 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 74 crypto_aead_set_flags(authenc_esn, crypto_ahash_get_flags(auth) & in crypto_authenc_esn_setkey() 102 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local 104 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail() 135 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local [all …]
|
D | authenc.c | 23 struct crypto_ahash_spawn auth; member 29 struct crypto_ahash *auth; member 88 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 96 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 97 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 100 crypto_aead_set_flags(authenc, crypto_ahash_get_flags(auth) & in crypto_authenc_setkey() 148 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 154 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv() 155 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv() [all …]
|
/Linux-v5.4/include/linux/ceph/ |
D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 30 int (*check_message_signature)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 81 int (*sign_message)(struct ceph_auth_handshake *auth, 83 int (*check_message_signature)(struct ceph_auth_handshake *auth, 120 struct ceph_auth_handshake *auth); 134 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 137 if (auth->sign_message) in ceph_auth_sign_message() 138 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
/Linux-v5.4/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 92 struct iscsi_node_auth *auth, in chap_server_open() argument 100 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 101 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 151 struct iscsi_node_auth *auth, in chap_server_compute_md5() argument 204 compare_len = strlen(auth->userid) + 1; in chap_server_compute_md5() 205 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_md5() 260 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_md5() 261 strlen(auth->password)); in chap_server_compute_md5() 287 if (!auth->authenticate_target) { in chap_server_compute_md5() 370 ret = crypto_shash_update(desc, auth->password_mutual, in chap_server_compute_md5() [all …]
|
D | iscsi_target_configfs.c | 342 struct iscsi_node_auth *auth = &nacl->node_auth; \ 346 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \ 354 struct iscsi_node_auth *auth = &nacl->node_auth; \ 358 if (count >= sizeof(auth->name)) \ 360 snprintf(auth->name, sizeof(auth->name), "%s", page); \ 361 if (!strncmp("NULL", auth->name, 4)) \ 362 auth->naf_flags &= ~flags; \ 364 auth->naf_flags |= flags; \ 366 if ((auth->naf_flags & NAF_USERID_IN_SET) && \ 367 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \ [all …]
|
/Linux-v5.4/net/sunrpc/ |
D | auth.c | 276 struct rpc_auth *auth = ERR_PTR(-EINVAL); in rpcauth_create() local 284 auth = ops->create(args, clnt); in rpcauth_create() 287 if (IS_ERR(auth)) in rpcauth_create() 288 return auth; in rpcauth_create() 291 clnt->cl_auth = auth; in rpcauth_create() 294 return auth; in rpcauth_create() 299 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument 301 if (!refcount_dec_and_test(&auth->au_count)) in rpcauth_release() 303 auth->au_ops->destroy(auth); in rpcauth_release() 340 rpcauth_init_credcache(struct rpc_auth *auth) in rpcauth_init_credcache() argument [all …]
|
D | auth_unix.c | 36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 44 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument 48 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred() 167 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local 189 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate() 190 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate() 191 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
|
D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
/Linux-v5.4/net/sctp/ |
D | output.c | 67 packet->auth = NULL; in sctp_packet_reset() 220 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 235 if (!chunk->auth) in sctp_packet_bundle_auth() 238 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth() 239 if (!auth) in sctp_packet_bundle_auth() 242 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth() 243 sctp_auth_shkey_hold(auth->shkey); in sctp_packet_bundle_auth() 245 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth() 248 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 342 packet->auth = chunk; in __sctp_packet_append_chunk() [all …]
|
D | auth.c | 416 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 707 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() argument 721 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 722 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 740 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac() 748 crypto_shash_digest(desc, (u8 *)auth, in sctp_auth_calculate_hmac() 749 end - (unsigned char *)auth, digest); in sctp_auth_calculate_hmac()
|
/Linux-v5.4/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 24 auth = 'A' * 15 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 34 auth = 'A' * 15 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 53 result = self.client.unseal(self.root_key, blob, auth, handle) 62 auth = 'A' * 20 65 blob = self.client.seal(self.root_key, data, auth, None) 67 result = self.client.unseal(self.root_key, blob, auth[:-1] + 'B', None) 77 auth = 'A' * 17 [all …]
|
/Linux-v5.4/net/ceph/ |
D | auth_none.c | 92 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() argument 109 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 110 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 111 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 112 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer() 113 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer()
|
D | auth_x.c | 502 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 503 void *p = auth + 1; in ceph_x_build_request() 516 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 517 blob->client_challenge = auth->client_challenge; in ceph_x_build_request() 524 auth->struct_v = 1; in ceph_x_build_request() 525 auth->key = 0; in ceph_x_build_request() 527 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 529 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 530 le64_to_cpu(auth->key)); in ceph_x_build_request() 628 struct ceph_auth_handshake *auth) in ceph_x_create_authorizer() argument [all …]
|
D | mon_client.c | 131 ceph_auth_reset(monc->auth); in __close_session() 199 ret = ceph_auth_build_hello(monc->auth, in __open_session() 984 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 1055 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init() 1057 if (IS_ERR(monc->auth)) { in ceph_monc_init() 1058 err = PTR_ERR(monc->auth); in ceph_monc_init() 1061 monc->auth->want_keys = in ceph_monc_init() 1110 ceph_auth_destroy(monc->auth); in ceph_monc_init() 1136 ceph_auth_destroy(monc->auth); in ceph_monc_stop() 1167 was_auth = ceph_auth_is_authenticated(monc->auth); in handle_auth_reply() [all …]
|
/Linux-v5.4/net/sunrpc/auth_gss/ |
D | auth_gss.c | 275 struct gss_auth *auth; member 311 struct net *net = gss_msg->auth->net; in gss_release_msg() 319 gss_put_auth(gss_msg->auth); in gss_release_msg() 325 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument 331 if (auth && pos->auth->service != auth->service) in __gss_find_upcall() 350 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg() 446 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 524 gss_msg->auth->target_name, in gss_v1_upcall() 553 gss_msg->auth = gss_auth; in gss_alloc_msg() 767 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() [all …]
|
/Linux-v5.4/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 205 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 258 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 259 if (auth) { in pkcs7_verify_sig_chain() 260 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 264 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 268 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 269 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 275 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
|
/Linux-v5.4/Documentation/networking/ |
D | mac80211-auth-assoc-deauth.txt | 35 mac80211->driver: TX auth frame 36 driver->mac80211: RX auth frame 38 alt WEP shared key auth 39 mac80211->driver: TX auth frame 40 driver->mac80211: RX auth frame 44 mac80211->userspace: RX auth frame
|
/Linux-v5.4/drivers/crypto/ |
D | atmel-authenc.h | 31 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth); 32 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, 37 struct atmel_sha_authenc_ctx *auth,
|
/Linux-v5.4/net/xfrm/ |
D | xfrm_algo.c | 179 .auth = { 199 .auth = { 219 .auth = { 239 .auth = { 258 .auth = { 277 .auth = { 297 .auth = { 316 .auth = { 336 .auth = {
|
/Linux-v5.4/drivers/gpu/drm/ |
D | drm_auth.c | 66 struct drm_auth *auth = data; in drm_getmagic() local 76 auth->magic = file_priv->magic; in drm_getmagic() 79 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic() 87 struct drm_auth *auth = data; in drm_authmagic() local 90 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic() 93 file = idr_find(&file_priv->master->magic_map, auth->magic); in drm_authmagic() 96 idr_replace(&file_priv->master->magic_map, NULL, auth->magic); in drm_authmagic()
|
/Linux-v5.4/drivers/net/wireless/quantenna/qtnfmac/ |
D | event.c | 588 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 601 memcpy(auth.ssid.ssid, ev->ssid, ev->ssid_len); in qtnf_event_handle_external_auth() 602 auth.ssid.ssid_len = ev->ssid_len; in qtnf_event_handle_external_auth() 605 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 606 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 607 auth.action = ev->action; in qtnf_event_handle_external_auth() 610 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 611 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 613 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL); in qtnf_event_handle_external_auth()
|
/Linux-v5.4/arch/s390/kernel/ |
D | perf_cpum_cf_diag.c | 402 static size_t cf_diag_getctr(void *data, size_t sz, unsigned long auth) in cf_diag_getctr() argument 413 if (!(auth & cpumf_ctr_ctl[i])) in cf_diag_getctr() 443 static int cf_diag_diffctr(struct cf_diag_csd *csd, unsigned long auth) in cf_diag_diffctr() argument 449 auth &= (1 << CPUMF_LCCTL_ENABLE_SHIFT) - 1; in cf_diag_diffctr() 459 auth &= ~cpumf_ctr_ctl[ctrstart->set]; in cf_diag_diffctr() 469 offset, auth); in cf_diag_diffctr() 470 } while (ctrstart->def && auth); in cf_diag_diffctr()
|
/Linux-v5.4/net/bluetooth/ |
D | smp.c | 856 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 869 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io); in tk_request() 877 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1008 u8 stk[16], auth; in smp_random() local 1018 auth = 1; in smp_random() 1020 auth = 0; in smp_random() 1027 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1127 u8 key_type, auth; in sc_add_ltk() local 1135 auth = 1; in sc_add_ltk() 1137 auth = 0; in sc_add_ltk() [all …]
|
/Linux-v5.4/tools/testing/selftests/bpf/ |
D | test_tunnel.sh | 558 auth=0x$(printf '1%.0s' {1..40}) 567 auth-trunc 'hmac(sha1)' $auth 96 enc 'cbc(aes)' $enc 576 auth-trunc 'hmac(sha1)' $auth 96 enc 'cbc(aes)' $enc 592 auth-trunc 'hmac(sha1)' $auth 96 enc 'cbc(aes)' $enc 599 auth-trunc 'hmac(sha1)' $auth 96 enc 'cbc(aes)' $enc
|
/Linux-v5.4/drivers/net/wireless/ti/wl1251/ |
D | acx.c | 118 struct acx_sleep_auth *auth; in wl1251_acx_sleep_auth() local 123 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in wl1251_acx_sleep_auth() 124 if (!auth) in wl1251_acx_sleep_auth() 127 auth->sleep_auth = sleep_auth; in wl1251_acx_sleep_auth() 129 ret = wl1251_cmd_configure(wl, ACX_SLEEP_AUTH, auth, sizeof(*auth)); in wl1251_acx_sleep_auth() 131 kfree(auth); in wl1251_acx_sleep_auth()
|