Home
last modified time | relevance | path

Searched refs:flavors (Results 1 - 21 of 21) sorted by relevance

/kernel/linux/linux-5.10/fs/nfs/
H A Dnfs4namespace.c190 * @flavors: List of security tuples returned by SECINFO procedure
193 * "flavors" that is locally supported. The "flavors" array
205 struct nfs4_secinfo_flavors *flavors) in nfs_find_best_sec()
211 for (i = 0; i < flavors->num_flavors; i++) { in nfs_find_best_sec()
212 secinfo = &flavors->flavors[i]; in nfs_find_best_sec()
264 struct nfs4_secinfo_flavors *flavors; in nfs4_negotiate_security() local
272 flavors = page_address(page); in nfs4_negotiate_security()
274 err = nfs4_proc_secinfo(inode, name, flavors); in nfs4_negotiate_security()
203 nfs_find_best_sec(struct rpc_clnt *clnt, struct nfs_server *server, struct nfs4_secinfo_flavors *flavors) nfs_find_best_sec() argument
[all...]
H A Dmount_clnt.c421 rpc_authflavor_t *flavors = res->auth_flavors; in decode_auth_flavors() local
433 dprintk("NFS: received %u auth flavors\n", entries); in decode_auth_flavors()
445 flavors[i] = be32_to_cpup(p++); in decode_auth_flavors()
446 dprintk("NFS: auth flavor[%u]: %d\n", i, flavors[i]); in decode_auth_flavors()
H A Dfs_context.c317 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors); in nfs_auth_info_add()
321 if (flavor == auth_info->flavors[i]) in nfs_auth_info_add()
326 return nfs_invalf(fc, "NFS: too many sec= flavors"); in nfs_auth_info_add()
328 auth_info->flavors[auth_info->flavor_len++] = flavor; in nfs_auth_info_add()
H A Dnfs4proc.c4010 * Retry pseudoroot lookup with various security flavors. We do this when:
4036 server->auth_info.flavors[i]); in nfs4_find_root_sec()
4042 /* no flavors specified by user, try default list */ in nfs4_find_root_sec()
8118 static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity) in _nfs4_proc_secinfo() argument
8128 .flavors = flavors, in _nfs4_proc_secinfo()
8170 struct nfs4_secinfo_flavors *flavors) in nfs4_proc_secinfo()
8181 err = _nfs4_proc_secinfo(dir, name, flavors, true); in nfs4_proc_secinfo()
8190 err = _nfs4_proc_secinfo(dir, name, flavors, false); in nfs4_proc_secinfo()
9859 struct nfs4_secinfo_flavors *flavors, boo in _nfs41_proc_secinfo_no_name()
8169 nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors) nfs4_proc_secinfo() argument
9857 _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors, bool use_integrity) _nfs41_proc_secinfo_no_name() argument
9905 nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) nfs41_proc_secinfo_no_name() argument
9951 struct nfs4_secinfo_flavors *flavors; nfs41_find_root_sec() local
[all...]
H A Dsuper.c740 if (auth_info->flavors[i] == match) in nfs_auth_info_match()
769 * of supported security flavors. In this case, nfs_mount() fabricates in nfs_verify_authflavors()
783 flavor = ctx->auth_info.flavors[0]; in nfs_verify_authflavors()
788 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors()
H A Dnfs4client.c1109 * other specified flavors */ in nfs4_init_server()
1111 ctx->selected_flavor = ctx->auth_info.flavors[0]; in nfs4_init_server()
H A Dnfs4xdr.c5481 res->flavors->num_flavors = 0; in decode_secinfo_common()
5485 sec_flavor = &res->flavors->flavors[i]; in decode_secinfo_common()
5486 if ((char *)&sec_flavor[1] - (char *)res->flavors > PAGE_SIZE) in decode_secinfo_common()
5499 res->flavors->num_flavors++; in decode_secinfo_common()
/kernel/linux/linux-6.6/fs/nfs/
H A Dnfs4namespace.c191 * @flavors: List of security tuples returned by SECINFO procedure
194 * "flavors" that is locally supported. The "flavors" array
206 struct nfs4_secinfo_flavors *flavors) in nfs_find_best_sec()
212 for (i = 0; i < flavors->num_flavors; i++) { in nfs_find_best_sec()
213 secinfo = &flavors->flavors[i]; in nfs_find_best_sec()
265 struct nfs4_secinfo_flavors *flavors; in nfs4_negotiate_security() local
273 flavors = page_address(page); in nfs4_negotiate_security()
275 err = nfs4_proc_secinfo(inode, name, flavors); in nfs4_negotiate_security()
204 nfs_find_best_sec(struct rpc_clnt *clnt, struct nfs_server *server, struct nfs4_secinfo_flavors *flavors) nfs_find_best_sec() argument
[all...]
H A Dmount_clnt.c425 rpc_authflavor_t *flavors = res->auth_flavors; in decode_auth_flavors() local
437 dprintk("NFS: received %u auth flavors\n", entries); in decode_auth_flavors()
449 flavors[i] = be32_to_cpup(p++); in decode_auth_flavors()
450 dprintk("NFS: auth flavor[%u]: %d\n", i, flavors[i]); in decode_auth_flavors()
H A Dfs_context.c387 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors); in nfs_auth_info_add()
391 if (flavor == auth_info->flavors[i]) in nfs_auth_info_add()
396 return nfs_invalf(fc, "NFS: too many sec= flavors"); in nfs_auth_info_add()
398 auth_info->flavors[auth_info->flavor_len++] = flavor; in nfs_auth_info_add()
H A Dnfs4proc.c4139 * Retry pseudoroot lookup with various security flavors. We do this when:
4165 server->auth_info.flavors[i]); in nfs4_find_root_sec()
4171 /* no flavors specified by user, try default list */ in nfs4_find_root_sec()
8335 static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity) in _nfs4_proc_secinfo() argument
8345 .flavors = flavors, in _nfs4_proc_secinfo()
8387 struct nfs4_secinfo_flavors *flavors) in nfs4_proc_secinfo()
8398 err = _nfs4_proc_secinfo(dir, name, flavors, true); in nfs4_proc_secinfo()
8407 err = _nfs4_proc_secinfo(dir, name, flavors, false); in nfs4_proc_secinfo()
10067 struct nfs4_secinfo_flavors *flavors, boo in _nfs41_proc_secinfo_no_name()
8386 nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors) nfs4_proc_secinfo() argument
10065 _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors, bool use_integrity) _nfs41_proc_secinfo_no_name() argument
10112 nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) nfs41_proc_secinfo_no_name() argument
10158 struct nfs4_secinfo_flavors *flavors; nfs41_find_root_sec() local
[all...]
H A Dsuper.c760 if (auth_info->flavors[i] == match) in nfs_auth_info_match()
789 * of supported security flavors. In this case, nfs_mount() fabricates in nfs_verify_authflavors()
803 flavor = ctx->auth_info.flavors[0]; in nfs_verify_authflavors()
808 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors()
H A Dnfs4client.c1164 * other specified flavors */ in nfs4_init_server()
1166 ctx->selected_flavor = ctx->auth_info.flavors[0]; in nfs4_init_server()
H A Dnfs4xdr.c5589 res->flavors->num_flavors = 0; in decode_secinfo_common()
5593 sec_flavor = &res->flavors->flavors[i]; in decode_secinfo_common()
5594 if ((char *)&sec_flavor[1] - (char *)res->flavors > PAGE_SIZE) in decode_secinfo_common()
5607 res->flavors->num_flavors++; in decode_secinfo_common()
/kernel/linux/linux-6.6/tools/testing/selftests/net/
H A Dsrv6_end_x_next_csid_l3vpn_test.sh644 flavors next-csid lblen "${LCBLOCK_BLEN}" \
1082 flavors next-csid ${layout} \
H A Dsrv6_end_next_csid_l3vpn_test.sh628 encap seg6local action End flavors next-csid \
1014 encap seg6local action End flavors next-csid ${layout} \
H A Dsrv6_end_flavors_test.sh7 # This script is designed to test the support for "flavors" in the SRv6 End
12 # convenience, we report the list of flavors described in [1] hereafter:
17 # The End, End.X, and End.T behaviors can support these flavors either
21 # flavors will be supported in the kernel.
402 # withouth flavors) configured for the node.
405 # flavors, the output is the ordered version of that list.
412 # return the lexicographically ordered flavors
537 behavior_cfg="End flavors psp"
785 echo "SKIP: Cannot set up netns to test kernel support for flavors"
791 echo "SKIP: Cannot set up dummy dev to test kernel support for flavors"
[all...]
/kernel/linux/linux-5.10/include/linux/
H A Dnfs_xdr.h738 rpc_authflavor_t flavors[NFS_AUTH_INFO_MAX_FLAVORS]; member
1236 struct nfs4_secinfo4 flavors[]; member
1247 struct nfs4_secinfo_flavors *flavors; member
/kernel/linux/linux-6.6/include/linux/
H A Dnfs_xdr.h741 rpc_authflavor_t flavors[NFS_AUTH_INFO_MAX_FLAVORS]; member
1257 struct nfs4_secinfo4 flavors[]; member
1268 struct nfs4_secinfo_flavors *flavors; member
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/
H A Dcore_reloc.c465 /* validate BPF program can use multiple flavors to match against
468 FLAVORS_CASE(flavors),
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/
H A Dcore_reloc.c569 /* validate BPF program can use multiple flavors to match against
572 FLAVORS_CASE(flavors),

Completed in 75 milliseconds