| /linux/drivers/char/tpm/ |
| H A D | tpm2-sessions.c | 253 struct tpm2_auth *auth; in tpm_buf_append_name() local 271 auth = chip->auth; in tpm_buf_append_name() 272 if (auth->session != tpm_buf_length(buf)) { in tpm_buf_append_name() 278 auth->session += 4; in tpm_buf_append_name() 284 ret = tpm2_read_public(chip, handle, auth->name[slot]); in tpm_buf_append_name() 299 auth->name_h[slot] = handle; in tpm_buf_append_name() 301 memcpy(auth->name[slot], name, name_size_alg); in tpm_buf_append_name() 370 struct tpm2_auth *auth; in tpm_buf_append_hmac_session() local 390 auth = chip->auth; in tpm_buf_append_hmac_session() 391 auth->attrs = attributes; in tpm_buf_append_hmac_session() [all …]
|
| /linux/include/linux/ceph/ |
| H A D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 30 int (*check_message_signature)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 84 int (*sign_message)(struct ceph_auth_handshake *auth, 86 int (*check_message_signature)(struct ceph_auth_handshake *auth, 128 struct ceph_auth_handshake *auth, 144 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 147 if (auth->sign_message) in ceph_auth_sign_message() 148 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
| H A D | ceph_debug.h | 26 &client->fsid, client->monc.auth->global_id, \ 35 client->monc.auth->global_id, \ 47 client->monc.auth->global_id, __func__, ##__VA_ARGS__) 53 client->monc.auth->global_id, ##__VA_ARGS__) 56 client->monc.auth->global_id, ##__VA_ARGS__) 59 client->monc.auth->global_id, ##__VA_ARGS__) 62 client->monc.auth->global_id, ##__VA_ARGS__) 65 client->monc.auth->global_id, ##__VA_ARGS__) 68 client->monc.auth->global_id, ##__VA_ARGS__) 71 client->monc.auth->global_id, ##__VA_ARGS__)
|
| /linux/crypto/ |
| H A D | authenc.c | 22 struct crypto_ahash_spawn auth; member 28 struct crypto_ahash *auth; member 86 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 94 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 95 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 97 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 151 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 158 ahash_request_set_tfm(ahreq, auth); in crypto_authenc_genicv() 285 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_decrypt() local 291 ahash_request_set_tfm(ahreq, auth); in crypto_authenc_decrypt() [all …]
|
| /linux/net/sunrpc/ |
| H A D | auth.c | 224 struct rpc_auth *auth = ERR_PTR(-EINVAL); in rpcauth_create() local 232 auth = ops->create(args, clnt); in rpcauth_create() 235 if (IS_ERR(auth)) in rpcauth_create() 236 return auth; in rpcauth_create() 239 clnt->cl_auth = auth; in rpcauth_create() 242 return auth; in rpcauth_create() 247 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument 249 if (!refcount_dec_and_test(&auth->au_count)) in rpcauth_release() 251 auth->au_ops->destroy(auth); in rpcauth_release() 288 rpcauth_init_credcache(struct rpc_auth *auth) in rpcauth_init_credcache() argument [all …]
|
| H A D | auth_unix.c | 36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 43 static struct rpc_cred *unx_lookup_cred(struct rpc_auth *auth, in unx_lookup_cred() argument 56 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred() 175 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local 197 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate() 198 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate() 199 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
|
| /linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
| H A D | hdcp_psp.c | 37 in->session_handle = hdcp->auth.id; in hdcp2_message_init() 276 hdcp->auth.id = hdcp_cmd->out_msg.hdcp1_create_session.session_handle; in mod_hdcp_hdcp1_create_session() 281 hdcp->auth.msg.hdcp1.ainfo = hdcp_cmd->out_msg.hdcp1_create_session.ainfo_primary; in mod_hdcp_hdcp1_create_session() 282 memcpy(hdcp->auth.msg.hdcp1.aksv, hdcp_cmd->out_msg.hdcp1_create_session.aksv_primary, in mod_hdcp_hdcp1_create_session() 283 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_hdcp1_create_session() 284 memcpy(hdcp->auth.msg.hdcp1.an, hdcp_cmd->out_msg.hdcp1_create_session.an_primary, in mod_hdcp_hdcp1_create_session() 285 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_hdcp1_create_session() 304 hdcp_cmd->in_msg.hdcp1_destroy_session.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_destroy_session() 336 hdcp_cmd->in_msg.hdcp1_first_part_authentication.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_validate_rx() 338 memcpy(hdcp_cmd->in_msg.hdcp1_first_part_authentication.bksv_primary, hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_hdcp1_validate_rx() [all …]
|
| /linux/net/sctp/ |
| H A D | output.c | 67 packet->auth = NULL; in sctp_packet_reset() 246 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 261 if (!chunk->auth) in sctp_packet_bundle_auth() 264 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth() 265 if (!auth) in sctp_packet_bundle_auth() 268 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth() 269 sctp_auth_shkey_hold(auth->shkey); in sctp_packet_bundle_auth() 271 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth() 274 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 368 packet->auth = chunk; in __sctp_packet_append_chunk() [all …]
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, in chap_server_open() argument 147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 242 struct iscsi_node_auth *auth, in chap_server_compute_hash() argument 316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash() 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash() 412 if (!auth->authenticate_target) { in chap_server_compute_hash() 526 ret = crypto_shash_update(desc, auth->password_mutual, in chap_server_compute_hash() [all …]
|
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 44 auth = ('A' * 15).encode() 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 63 result = self.client.unseal(self.root_key, blob, auth, handle) 72 auth = ('A' * 20).encode() 75 blob = self.client.seal(self.root_key, data, auth, None) 78 auth[:-1] + 'B'.encode(), None) 91 auth = ('A' * 17).encode() [all …]
|
| /linux/net/ceph/ |
| H A D | auth_none.c | 95 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() argument 112 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 113 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 114 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 115 auth->authorizer_reply_buf = NULL; in ceph_auth_none_create_authorizer() 116 auth->authorizer_reply_buf_len = 0; in ceph_auth_none_create_authorizer()
|
| H A D | auth.c | 309 struct ceph_auth_handshake *auth, in __ceph_auth_get_authorizer() argument 316 if (force_new && auth->authorizer) { in __ceph_auth_get_authorizer() 317 ceph_auth_destroy_authorizer(auth->authorizer); in __ceph_auth_get_authorizer() 318 auth->authorizer = NULL; in __ceph_auth_get_authorizer() 320 if (!auth->authorizer) in __ceph_auth_get_authorizer() 321 ret = ac->ops->create_authorizer(ac, peer_type, auth); in __ceph_auth_get_authorizer() 323 ret = ac->ops->update_authorizer(ac, peer_type, auth); in __ceph_auth_get_authorizer() 548 struct ceph_auth_handshake *auth, in ceph_auth_get_authorizer() argument 557 ret = __ceph_auth_get_authorizer(ac, auth, peer_type, true, &proto, in ceph_auth_get_authorizer() 568 ceph_encode_32_safe(&p, end, auth->authorizer_buf_len, e_range); in ceph_auth_get_authorizer() [all …]
|
| H A D | auth_x.c | 507 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 513 p = auth + 1; in ceph_x_build_request() 521 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 522 blob->client_challenge = auth->client_challenge; in ceph_x_build_request() 529 auth->struct_v = 3; /* nautilus+ */ in ceph_x_build_request() 530 auth->key = 0; in ceph_x_build_request() 532 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 534 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 535 le64_to_cpu(auth->key)); in ceph_x_build_request() 738 struct ceph_auth_handshake *auth) in ceph_x_create_authorizer() argument [all …]
|
| H A D | messenger_v1.c | 326 struct ceph_auth_handshake *auth; in get_connect_authorizer() local 330 con->v1.auth = NULL; in get_connect_authorizer() 336 auth = con->ops->get_authorizer(con, &auth_proto, con->v1.auth_retry); in get_connect_authorizer() 337 if (IS_ERR(auth)) in get_connect_authorizer() 338 return PTR_ERR(auth); in get_connect_authorizer() 340 con->v1.auth = auth; in get_connect_authorizer() 343 cpu_to_le32(auth->authorizer_buf_len); in get_connect_authorizer() 364 if (con->v1.auth) in __prepare_write_connect() 365 con_out_kvec_add(con, con->v1.auth->authorizer_buf_len, in __prepare_write_connect() 366 con->v1.auth->authorizer_buf); in __prepare_write_connect() [all …]
|
| /linux/drivers/nvme/common/ |
| H A D | Makefile | 5 obj-$(CONFIG_NVME_AUTH) += nvme-auth.o 8 nvme-auth-y += auth.o
|
| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 35 mac80211->driver: TX auth frame 36 driver->mac80211: RX auth frame 38 alt WEP shared key auth 39 mac80211->driver: TX auth frame 40 driver->mac80211: RX auth frame 44 mac80211->userspace: RX auth frame
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | auth_gss.c | 265 struct gss_auth *auth; member 301 struct net *net = gss_msg->auth->net; in gss_release_msg() 309 gss_put_auth(gss_msg->auth); in gss_release_msg() 315 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument 321 if (pos->auth->service != auth->service) in __gss_find_upcall() 340 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg() 436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 514 gss_msg->auth->target_name, in gss_v1_upcall() 543 gss_msg->auth = gss_auth; in gss_alloc_msg() 774 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() [all …]
|
| /linux/net/xfrm/ |
| H A D | xfrm_algo.c | 180 .auth = { 200 .auth = { 220 .auth = { 240 .auth = { 259 .auth = { 278 .auth = { 298 .auth = { 317 .auth = { 337 .auth = { 350 .auth [all...] |
| /linux/drivers/crypto/ |
| H A D | atmel-authenc.h | 32 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth); 33 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, 37 struct atmel_sha_authenc_ctx *auth,
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| H A D | spmobj-attributes.c | 71 u16 *auth = authbuf; in hp_populate_security_buffer() local 81 auth = hp_ascii_to_utf16_unicode(auth, authentication); in hp_populate_security_buffer() 82 if (!auth) in hp_populate_security_buffer() 97 auth = hp_ascii_to_utf16_unicode(auth, strprefix); in hp_populate_security_buffer() 100 if (!auth) { in hp_populate_security_buffer()
|
| /linux/drivers/thunderbolt/ |
| H A D | icm.c | 2227 struct usb4_switch_nvm_auth *auth = data; in icm_usb4_switch_nvm_auth_complete() local 2228 struct icm *icm = auth->icm; in icm_usb4_switch_nvm_auth_complete() 2232 get_route(auth->reply.route_hi, auth->reply.route_lo), in icm_usb4_switch_nvm_auth_complete() 2233 auth->reply.hdr.flags, auth->reply.status); in icm_usb4_switch_nvm_auth_complete() 2238 icm->last_nvm_auth = auth; in icm_usb4_switch_nvm_auth_complete() 2244 struct usb4_switch_nvm_auth *auth; in icm_usb4_switch_nvm_authenticate() local 2249 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in icm_usb4_switch_nvm_authenticate() 2250 if (!auth) in icm_usb4_switch_nvm_authenticate() 2253 auth->icm = icm; in icm_usb4_switch_nvm_authenticate() 2254 auth->request.hdr.code = ICM_USB4_SWITCH_OP; in icm_usb4_switch_nvm_authenticate() [all …]
|
| /linux/include/trace/events/ |
| H A D | rpcgss.h | 457 const struct rpc_auth *auth 460 TP_ARGS(task, auth), 466 __field(const void *, auth) 476 __entry->auth = auth; 477 __entry->rslack = auth->au_rslack; 478 __entry->ralign = auth->au_ralign; 479 __entry->verfsize = auth->au_verfsize; 485 __entry->auth, __entry->rslack, __entry->ralign,
|
| /linux/tools/testing/selftests/net/ |
| H A D | vrf-xfrm-tests.sh | 262 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 269 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 277 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 284 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 292 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 299 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 307 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 314 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
| /linux/drivers/net/wireless/quantenna/qtnfmac/ |
| H A D | event.c | 561 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 576 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth() 577 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth() 580 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 581 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 582 auth.action = ev->action; in qtnf_event_handle_external_auth() 585 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 586 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 588 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL); in qtnf_event_handle_external_auth()
|
| /linux/net/bluetooth/ |
| H A D | smp.c | 850 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 863 bt_dev_dbg(hcon->hdev, "auth:%u lcl:%u rem:%u", auth, local_io, in tk_request() 872 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1012 u8 stk[16], auth; in smp_random() local 1022 auth = 1; in smp_random() 1024 auth = 0; in smp_random() 1031 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1136 u8 key_type, auth; in sc_add_ltk() local 1144 auth = 1; in sc_add_ltk() 1146 auth = 0; in sc_add_ltk() [all …]
|