summaryrefslogtreecommitdiffstats
path: root/sound/soc/mediatek
AgeCommit message (Expand)Author
2018-11-16ASoC: Convert a few more users to using %pOFn instead of device_node.nameRob Herring
2018-09-21ASoC: tidyup for_each_card_prelinks() dai_linkKuninori Morimoto
2018-09-20ASoC: add for_each_card_prelinks() macroKuninori Morimoto
2018-09-12ASoC: remove unneeded static set .owner field in platform_driverzhong jiang
2018-09-04ASoC: add for_each_rtd_codec_dai() macroKuninori Morimoto
2018-06-29ASoC: mt6797: sub dai use list_headKaiChieh Chuang
2018-06-29ASoC: mediatek: sub dai use list_headKaiChieh Chuang
2018-06-12treewide: devm_kzalloc() -> devm_kcalloc()Kees Cook
2018-05-31ASoC: mt6797-mt6351: add hostless phone call pathKai Chieh Chuang
2018-05-31ASoC: mt6797: add Hostless DAIKai Chieh Chuang
2018-05-31ASoC: mt6797: add PCM interfaceKai Chieh Chuang
2018-05-31ASoC: mediatek: export mtk-afe symbols as neededArnd Bergmann
2018-05-25ASoC: mt6797: combine DAI to register componentKaiChieh Chuang
2018-05-25ASoC: mt6797: extract DAI adda in separate fileKaiChieh Chuang
2018-05-25ASoC: mediatek: add sub dai to mtk_base_afeKaiChieh Chuang
2018-05-02ASoC: mediatek: add the .probe() callback in mt2701_afe_pcm_dai_componentRyder Lee
2018-05-02ASoC: mediatek: avoid using snd_soc_platformKai Chieh Chuang
2018-04-27ASoC: mediatek: preallocate pages use platform deviceKai Chieh Chuang
2018-04-27ASoC: mt6797: switch to SPDX license tagKai Chieh Chuang
2018-04-27ASoC: mt6797: add structure define and clock control function for 6797Kai Chieh Chuang
2018-04-27ASoC: add mt6797-mt6351 driver and config optionKai Chieh Chuang
2018-04-26ASoC: mediatek: switch to SPDX license tagRyder Lee
2018-04-26ASoC: mediatek: add MT7622 AFE supportRyder Lee
2018-04-26ASoC: mediatek: Add MTK_STREAM_NUM to mtk-base-afe.hRyder Lee
2018-04-26ASoC: mediatek: simplify the control logic of MT2701 I2SRyder Lee
2018-04-25ASoC: mediatek: use snd_soc_dai_get_drvdata() to get the private dataRyder Lee
2018-04-25ASoC: mt6797: add mt6797 platform driverKai Chieh Chuang
2018-03-28Merge remote-tracking branches 'asoc/topic/rt5645', 'asoc/topic/rt5651', 'aso...Mark Brown
2018-03-28Merge remote-tracking branches 'asoc/topic/max98927', 'asoc/topic/mc13783', '...Mark Brown
2018-03-28Merge remote-tracking branches 'asoc/topic/max98090', 'asoc/topic/max98095', ...Mark Brown
2018-03-21ASoC: mediatek: mt2701: Fix a typo in printkMasanari Iida
2018-03-18ASoC: mediatek: mt2701: drop unnessary snd_soc_unregister_component()Wei Yongjun
2018-02-12ASoC: mt2701/mt8173: replace platform to componentKuninori Morimoto
2018-02-12ASoC: rt5645/rt5677: replace codec to componentKuninori Morimoto
2018-02-12ASoC: max98090: replace codec to componentKuninori Morimoto
2018-02-07Merge remote-tracking branches 'asoc/topic/max98373', 'asoc/topic/mtk', 'asoc...Mark Brown
2018-02-07Merge remote-tracking branches 'asoc/fix/compress', 'asoc/fix/core', 'asoc/fi...Mark Brown
2018-02-07ASoC: mt8173-rt5650: fix child-node lookupJohan Hovold
2018-01-22ASoC: mediatek: fix double free in mt2701_afe_pcm_dev_probe()Ryder Lee
2018-01-12Merge remote-tracking branches 'asoc/topic/mtk', 'asoc/topic/nau8540', 'asoc/...Mark Brown
2018-01-12Merge remote-tracking branches 'asoc/topic/max98926', 'asoc/topic/max98927', ...Mark Brown
2018-01-10ASoC: mt8173: remove unnecessary micbias widget in routeBard Liao
2018-01-08ASoC: mediatek: mt2701: fix return value check in mt2701_afe_pcm_dev_probe()Wei Yongjun
2018-01-04ASoC: mediatek: modify MT2701 AFE driver to adapt mfd deviceRyder Lee
2018-01-04ASoC: mediatek: add some core clocks for MT2701 AFERyder Lee
2018-01-03ASoC: mediatek: cleanup audio driver for MT2701Ryder Lee
2018-01-03ASoC: mediatek: rework clock functions for MT2701Ryder Lee
2018-01-03ASoC: mediatek: fix error handling in mt2701_afe_pcm_dev_probe()Ryder Lee
2017-12-01ASoC: mt8173: Fix platform_get_irq's error checkingArvind Yadav
2017-11-02License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman
pan>const char *client_user, unsigned int client_host_key_bits, BIGNUM *client_host_key_e, BIGNUM *client_host_key_n) { extern ServerOptions options; const char *canonical_hostname; HostStatus host_status; BIGNUM *ke, *kn; debug("Trying rhosts with RSA host authentication for %.100s", client_user); /* Check if we would accept it using rhosts authentication. */ if (!auth_rhosts(pw, client_user)) return 0; canonical_hostname = get_canonical_hostname(); debug("Rhosts RSA authentication: canonical host %.900s", canonical_hostname); /* Check if we know the host and its host key. */ /* Check system-wide host file. */ ke = BN_new(); kn = BN_new(); host_status = check_host_in_hostfile(SSH_SYSTEM_HOSTFILE, canonical_hostname, client_host_key_bits, client_host_key_e, client_host_key_n, ke, kn); /* Check user host file unless ignored. */ if (host_status != HOST_OK && !options.ignore_user_known_hosts) { struct stat st; char *user_hostfile = tilde_expand_filename(SSH_USER_HOSTFILE, pw->pw_uid); /* Check file permissions of SSH_USER_HOSTFILE, auth_rsa() did already check pw->pw_dir, but there is a race XXX */ if (options.strict_modes && (stat(user_hostfile, &st) == 0) && ((st.st_uid != 0 && st.st_uid != pw->pw_uid) || (st.st_mode & 022) != 0)) { log("Rhosts RSA authentication refused for %.100s: bad owner or modes for %.200s", pw->pw_name, user_hostfile); } else { /* XXX race between stat and the following open() */ temporarily_use_uid(pw->pw_uid); host_status = check_host_in_hostfile(user_hostfile, canonical_hostname, client_host_key_bits, client_host_key_e, client_host_key_n, ke, kn); restore_uid(); } xfree(user_hostfile); } BN_free(ke); BN_free(kn); if (host_status != HOST_OK) { /* The host key was not found. */ debug("Rhosts with RSA host authentication denied: unknown or invalid host key"); packet_send_debug("Your host key cannot be verified: unknown or invalid host key."); return 0; } /* A matching host key was found and is known. */ /* Perform the challenge-response dialog with the client for the host key. */ if (!auth_rsa_challenge_dialog(client_host_key_bits, client_host_key_e, client_host_key_n)) { log("Client on %.800s failed to respond correctly to host authentication.", canonical_hostname); return 0; } /* We have authenticated the user using .rhosts or /etc/hosts.equiv, and the host using RSA. We accept the authentication. */ log("Rhosts with RSA host authentication accepted for %.100s, %.100s on %.700s.", pw->pw_name, client_user, canonical_hostname); packet_send_debug("Rhosts with RSA host authentication accepted."); return 1; }