OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-197
/
include
/
linux
/
ceph
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/17/2022 06:42:23 AM
rwxr-xr-x
📄
auth.h
4.85 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
buffer.h
833 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
ceph_debug.h
907 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ceph_features.h
8.53 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ceph_frag.h
1.97 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ceph_fs.h
25.36 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ceph_hash.h
472 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cls_lock_client.h
1.59 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
debugfs.h
769 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
decode.h
9.06 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
libceph.h
9.48 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
mdsmap.h
1.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
messenger.h
9.04 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
mon_client.h
3.82 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
msgpool.h
775 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
msgr.h
5.65 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
osd_client.h
14.35 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
osdmap.h
8.34 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pagelist.h
2.11 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
rados.h
16.94 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
string_table.h
1.3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
types.h
547 bytes
01/28/2018 09:20:33 PM
rw-r--r--
Editing: auth.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _FS_CEPH_AUTH_H #define _FS_CEPH_AUTH_H #include <linux/ceph/types.h> #include <linux/ceph/buffer.h> /* * Abstract interface for communicating with the authenticate module. * There is some handshake that takes place between us and the monitor * to acquire the necessary keys. These are used to generate an * 'authorizer' that we use when connecting to a service (mds, osd). */ struct ceph_auth_client; struct ceph_msg; struct ceph_authorizer { void (*destroy)(struct ceph_authorizer *); }; struct ceph_auth_handshake { struct ceph_authorizer *authorizer; void *authorizer_buf; size_t authorizer_buf_len; void *authorizer_reply_buf; size_t authorizer_reply_buf_len; int (*sign_message)(struct ceph_auth_handshake *auth, struct ceph_msg *msg); int (*check_message_signature)(struct ceph_auth_handshake *auth, struct ceph_msg *msg); }; struct ceph_auth_client_ops { const char *name; /* * true if we are authenticated and can connect to * services. */ int (*is_authenticated)(struct ceph_auth_client *ac); /* * true if we should (re)authenticate, e.g., when our tickets * are getting old and crusty. */ int (*should_authenticate)(struct ceph_auth_client *ac); /* * build requests and process replies during monitor * handshake. if handle_reply returns -EAGAIN, we build * another request. */ int (*build_request)(struct ceph_auth_client *ac, void *buf, void *end); int (*handle_reply)(struct ceph_auth_client *ac, int result, void *buf, void *end); /* * Create authorizer for connecting to a service, and verify * the response to authenticate the service. */ int (*create_authorizer)(struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth); /* ensure that an existing authorizer is up to date */ int (*update_authorizer)(struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth); int (*add_authorizer_challenge)(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *challenge_buf, int challenge_buf_len); int (*verify_authorizer_reply)(struct ceph_auth_client *ac, struct ceph_authorizer *a); void (*invalidate_authorizer)(struct ceph_auth_client *ac, int peer_type); /* reset when we (re)connect to a monitor */ void (*reset)(struct ceph_auth_client *ac); void (*destroy)(struct ceph_auth_client *ac); int (*sign_message)(struct ceph_auth_handshake *auth, struct ceph_msg *msg); int (*check_message_signature)(struct ceph_auth_handshake *auth, struct ceph_msg *msg); }; struct ceph_auth_client { u32 protocol; /* CEPH_AUTH_* */ void *private; /* for use by protocol implementation */ const struct ceph_auth_client_ops *ops; /* null iff protocol==0 */ bool negotiating; /* true if negotiating protocol */ const char *name; /* entity name */ u64 global_id; /* our unique id in system */ const struct ceph_crypto_key *key; /* our secret key */ unsigned want_keys; /* which services we want */ struct mutex mutex; }; extern struct ceph_auth_client *ceph_auth_init(const char *name, const struct ceph_crypto_key *key); extern void ceph_auth_destroy(struct ceph_auth_client *ac); extern void ceph_auth_reset(struct ceph_auth_client *ac); extern int ceph_auth_build_hello(struct ceph_auth_client *ac, void *buf, size_t len); extern int ceph_handle_auth_reply(struct ceph_auth_client *ac, void *buf, size_t len, void *reply_buf, size_t reply_len); int ceph_auth_entity_name_encode(const char *name, void **p, void *end); extern int ceph_build_auth(struct ceph_auth_client *ac, void *msg_buf, size_t msg_len); extern int ceph_auth_is_authenticated(struct ceph_auth_client *ac); extern int ceph_auth_create_authorizer(struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth); void ceph_auth_destroy_authorizer(struct ceph_authorizer *a); extern int ceph_auth_update_authorizer(struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *a); int ceph_auth_add_authorizer_challenge(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *challenge_buf, int challenge_buf_len); extern int ceph_auth_verify_authorizer_reply(struct ceph_auth_client *ac, struct ceph_authorizer *a); extern void ceph_auth_invalidate_authorizer(struct ceph_auth_client *ac, int peer_type); static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, struct ceph_msg *msg) { if (auth->sign_message) return auth->sign_message(auth, msg); return 0; } static inline int ceph_auth_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) { if (auth->check_message_signature) return auth->check_message_signature(auth, msg); return 0; } #endif