/kernel/linux/linux-5.10/fs/nfs/ |
H A D | nfs4namespace.c | 190 * @flavors: List of security tuples returned by SECINFO procedure 193 * "flavors" that is locally supported. The "flavors" array 205 struct nfs4_secinfo_flavors *flavors) in nfs_find_best_sec() 211 for (i = 0; i < flavors->num_flavors; i++) { in nfs_find_best_sec() 212 secinfo = &flavors->flavors[i]; in nfs_find_best_sec() 264 struct nfs4_secinfo_flavors *flavors; in nfs4_negotiate_security() local 272 flavors = page_address(page); in nfs4_negotiate_security() 274 err = nfs4_proc_secinfo(inode, name, flavors); in nfs4_negotiate_security() 203 nfs_find_best_sec(struct rpc_clnt *clnt, struct nfs_server *server, struct nfs4_secinfo_flavors *flavors) nfs_find_best_sec() argument [all...] |
H A D | mount_clnt.c | 421 rpc_authflavor_t *flavors = res->auth_flavors; in decode_auth_flavors() local 433 dprintk("NFS: received %u auth flavors\n", entries); in decode_auth_flavors() 445 flavors[i] = be32_to_cpup(p++); in decode_auth_flavors() 446 dprintk("NFS: auth flavor[%u]: %d\n", i, flavors[i]); in decode_auth_flavors()
|
H A D | fs_context.c | 317 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors); in nfs_auth_info_add() 321 if (flavor == auth_info->flavors[i]) in nfs_auth_info_add() 326 return nfs_invalf(fc, "NFS: too many sec= flavors"); in nfs_auth_info_add() 328 auth_info->flavors[auth_info->flavor_len++] = flavor; in nfs_auth_info_add()
|
H A D | nfs4proc.c | 4010 * Retry pseudoroot lookup with various security flavors. We do this when: 4036 server->auth_info.flavors[i]); in nfs4_find_root_sec() 4042 /* no flavors specified by user, try default list */ in nfs4_find_root_sec() 8118 static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity) in _nfs4_proc_secinfo() argument 8128 .flavors = flavors, in _nfs4_proc_secinfo() 8170 struct nfs4_secinfo_flavors *flavors) in nfs4_proc_secinfo() 8181 err = _nfs4_proc_secinfo(dir, name, flavors, true); in nfs4_proc_secinfo() 8190 err = _nfs4_proc_secinfo(dir, name, flavors, false); in nfs4_proc_secinfo() 9859 struct nfs4_secinfo_flavors *flavors, boo in _nfs41_proc_secinfo_no_name() 8169 nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors) nfs4_proc_secinfo() argument 9857 _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors, bool use_integrity) _nfs41_proc_secinfo_no_name() argument 9905 nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) nfs41_proc_secinfo_no_name() argument 9951 struct nfs4_secinfo_flavors *flavors; nfs41_find_root_sec() local [all...] |
H A D | super.c | 740 if (auth_info->flavors[i] == match) in nfs_auth_info_match() 769 * of supported security flavors. In this case, nfs_mount() fabricates in nfs_verify_authflavors() 783 flavor = ctx->auth_info.flavors[0]; in nfs_verify_authflavors() 788 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors()
|
H A D | nfs4client.c | 1109 * other specified flavors */ in nfs4_init_server() 1111 ctx->selected_flavor = ctx->auth_info.flavors[0]; in nfs4_init_server()
|
H A D | nfs4xdr.c | 5481 res->flavors->num_flavors = 0; in decode_secinfo_common() 5485 sec_flavor = &res->flavors->flavors[i]; in decode_secinfo_common() 5486 if ((char *)&sec_flavor[1] - (char *)res->flavors > PAGE_SIZE) in decode_secinfo_common() 5499 res->flavors->num_flavors++; in decode_secinfo_common()
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | nfs4namespace.c | 191 * @flavors: List of security tuples returned by SECINFO procedure 194 * "flavors" that is locally supported. The "flavors" array 206 struct nfs4_secinfo_flavors *flavors) in nfs_find_best_sec() 212 for (i = 0; i < flavors->num_flavors; i++) { in nfs_find_best_sec() 213 secinfo = &flavors->flavors[i]; in nfs_find_best_sec() 265 struct nfs4_secinfo_flavors *flavors; in nfs4_negotiate_security() local 273 flavors = page_address(page); in nfs4_negotiate_security() 275 err = nfs4_proc_secinfo(inode, name, flavors); in nfs4_negotiate_security() 204 nfs_find_best_sec(struct rpc_clnt *clnt, struct nfs_server *server, struct nfs4_secinfo_flavors *flavors) nfs_find_best_sec() argument [all...] |
H A D | mount_clnt.c | 425 rpc_authflavor_t *flavors = res->auth_flavors; in decode_auth_flavors() local 437 dprintk("NFS: received %u auth flavors\n", entries); in decode_auth_flavors() 449 flavors[i] = be32_to_cpup(p++); in decode_auth_flavors() 450 dprintk("NFS: auth flavor[%u]: %d\n", i, flavors[i]); in decode_auth_flavors()
|
H A D | fs_context.c | 387 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors); in nfs_auth_info_add() 391 if (flavor == auth_info->flavors[i]) in nfs_auth_info_add() 396 return nfs_invalf(fc, "NFS: too many sec= flavors"); in nfs_auth_info_add() 398 auth_info->flavors[auth_info->flavor_len++] = flavor; in nfs_auth_info_add()
|
H A D | nfs4proc.c | 4139 * Retry pseudoroot lookup with various security flavors. We do this when: 4165 server->auth_info.flavors[i]); in nfs4_find_root_sec() 4171 /* no flavors specified by user, try default list */ in nfs4_find_root_sec() 8335 static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity) in _nfs4_proc_secinfo() argument 8345 .flavors = flavors, in _nfs4_proc_secinfo() 8387 struct nfs4_secinfo_flavors *flavors) in nfs4_proc_secinfo() 8398 err = _nfs4_proc_secinfo(dir, name, flavors, true); in nfs4_proc_secinfo() 8407 err = _nfs4_proc_secinfo(dir, name, flavors, false); in nfs4_proc_secinfo() 10067 struct nfs4_secinfo_flavors *flavors, boo in _nfs41_proc_secinfo_no_name() 8386 nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors) nfs4_proc_secinfo() argument 10065 _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors, bool use_integrity) _nfs41_proc_secinfo_no_name() argument 10112 nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) nfs41_proc_secinfo_no_name() argument 10158 struct nfs4_secinfo_flavors *flavors; nfs41_find_root_sec() local [all...] |
H A D | super.c | 760 if (auth_info->flavors[i] == match) in nfs_auth_info_match() 789 * of supported security flavors. In this case, nfs_mount() fabricates in nfs_verify_authflavors() 803 flavor = ctx->auth_info.flavors[0]; in nfs_verify_authflavors() 808 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors()
|
H A D | nfs4client.c | 1164 * other specified flavors */ in nfs4_init_server() 1166 ctx->selected_flavor = ctx->auth_info.flavors[0]; in nfs4_init_server()
|
H A D | nfs4xdr.c | 5589 res->flavors->num_flavors = 0; in decode_secinfo_common() 5593 sec_flavor = &res->flavors->flavors[i]; in decode_secinfo_common() 5594 if ((char *)&sec_flavor[1] - (char *)res->flavors > PAGE_SIZE) in decode_secinfo_common() 5607 res->flavors->num_flavors++; in decode_secinfo_common()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | srv6_end_x_next_csid_l3vpn_test.sh | 644 flavors next-csid lblen "${LCBLOCK_BLEN}" \ 1082 flavors next-csid ${layout} \
|
H A D | srv6_end_next_csid_l3vpn_test.sh | 628 encap seg6local action End flavors next-csid \ 1014 encap seg6local action End flavors next-csid ${layout} \
|
H A D | srv6_end_flavors_test.sh | 7 # This script is designed to test the support for "flavors" in the SRv6 End 12 # convenience, we report the list of flavors described in [1] hereafter: 17 # The End, End.X, and End.T behaviors can support these flavors either 21 # flavors will be supported in the kernel. 402 # withouth flavors) configured for the node. 405 # flavors, the output is the ordered version of that list. 412 # return the lexicographically ordered flavors 537 behavior_cfg="End flavors psp" 785 echo "SKIP: Cannot set up netns to test kernel support for flavors" 791 echo "SKIP: Cannot set up dummy dev to test kernel support for flavors" [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | nfs_xdr.h | 738 rpc_authflavor_t flavors[NFS_AUTH_INFO_MAX_FLAVORS]; member 1236 struct nfs4_secinfo4 flavors[]; member 1247 struct nfs4_secinfo_flavors *flavors; member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | nfs_xdr.h | 741 rpc_authflavor_t flavors[NFS_AUTH_INFO_MAX_FLAVORS]; member 1257 struct nfs4_secinfo4 flavors[]; member 1268 struct nfs4_secinfo_flavors *flavors; member
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | core_reloc.c | 465 /* validate BPF program can use multiple flavors to match against 468 FLAVORS_CASE(flavors),
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | core_reloc.c | 569 /* validate BPF program can use multiple flavors to match against 572 FLAVORS_CASE(flavors),
|