| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| H A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux/drivers/nvme/target/ |
| H A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 184 pr_debug("%s: ctrl %d qid %d host authenticated\n", in nvmet_auth_reply() 213 req->sq->authenticated = true; in nvmet_auth_reply() 217 req->sq->authenticated = true; in nvmet_auth_reply() 355 req->sq->authenticated = true; in nvmet_execute_auth_send() 356 pr_debug("%s: ctrl %d qid %d ctrl authenticated\n", in nvmet_execute_auth_send() 365 req->sq->authenticated = false; in nvmet_execute_auth_send() 373 req->sq->authenticated = false; in nvmet_execute_auth_send() 549 req->sq->authenticated = false; in nvmet_execute_auth_receive() 559 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
| /linux/drivers/net/wireguard/ |
| H A D | timers.c | 26 * - Timer for, if enabled, sending an empty authenticated packet every user- 147 /* Should be called after an authenticated data packet is sent. */ 156 /* Should be called after an authenticated data packet is received. */ 168 /* Should be called after any type of authenticated packet is sent, whether 176 /* Should be called after any type of authenticated packet is received, whether
|
| /linux/fs/ubifs/ |
| H A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 550 ubifs_err(c, "authenticated FS forced, but found FS without authentication"); in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 555 ubifs_err(c, "authenticated FS found, but no key given"); in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node() 583 * The super block node can either be authenticated by a HMAC or in authenticate_sb_node()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes:: 144 For Authenticated Encryption with Additional Data (AEAD)
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 34 bool authenticated; member 376 "qid 0: authenticated with hash %s dhgroup %s\n", in nvme_auth_process_dhchap_success1() 400 "qid 0: controller authenticated\n"); in nvme_auth_process_dhchap_success1() 691 chap->authenticated = false; in nvme_auth_free_dhchap() 940 chap->authenticated = true; in nvme_queue_auth_work() 947 chap->authenticated = false; in nvme_queue_auth_work() 1039 * not been authenticated initially. in nvme_ctrl_auth_work() 1041 if (!chap->authenticated) in nvme_ctrl_auth_work() 1054 if (!chap->authenticated) in nvme_ctrl_auth_work() 1096 chap->authenticated = false; in nvme_auth_init_ctrl()
|
| /linux/include/linux/ |
| H A D | rpmb.h | 65 * struct rpmb_frame - RPMB frame structure for authenticated access 78 * authenticated data write requests made by the host.
|
| /linux/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 193 * attempt to figure out whether they're authenticated or not. Since in drm_getclient() 198 client->auth = file_priv->authenticated; in drm_getclient() 605 /* AUTH is only for authenticated or render client */ in drm_ioctl_permit() 607 !file_priv->authenticated)) in drm_ioctl_permit() 872 file_priv->authenticated, ioctl->name); in drm_ioctl() 911 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_ioc32.c | 168 int auth; /* Is client authenticated? */ 384 file_priv->authenticated, in drm_compat_ioctl()
|
| H A D | drm_auth.c | 124 file->authenticated = 1; in drm_authmagic() 179 fpriv->authenticated = 1; in drm_new_set_master()
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux/tools/crypto/ccp/ |
| H A D | test_dbc.py | 140 """fetch authenticated nonce""" 169 # if already authenticated these may fail
|
| /linux/drivers/pci/ |
| H A D | tsm.c | 539 /* The 'authenticated' attribute is exclusive to the presence of a 'link' TSM */ 554 * Show 'authenticated' and other attributes for the managed in pci_tsm_link_group_visible() 622 * When the SPDM session established via TSM the 'authenticated' state in authenticated_show() 627 static DEVICE_ATTR_RO(authenticated);
|
| /linux/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 87 printf("Authenticated, result (%02x), sig-size (%02x)\n", in main()
|
| /linux/Documentation/target/ |
| H A D | target-export-device | 77 # Allow write access for non authenticated initiators
|
| /linux/include/uapi/linux/ |
| H A D | sctp.h | 819 * 7.1.18. Add a chunk that must be authenticated (SCTP_AUTH_CHUNK) 822 * received only in an authenticated way. Changes to the list of chunks 971 * 7.2.3. Get the list of chunks the peer requires to be authenticated 975 * the peer requires to be received authenticated only.
|
| H A D | rxrpc.h | 73 #define RXRPC_SECURITY_AUTH 1 /* authenticated packets */
|
| /linux/crypto/ |
| H A D | Kconfig | 752 menu "AEAD (authenticated encryption with associated data) ciphers" 789 authenticated encryption mode (NIST SP800-38C) 798 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 848 template, and that the IV appears at the end of the authenticated
|
| /linux/include/drm/intel/ |
| H A D | i915_hdcp_interface.h | 118 * @enable_hdcp_authentication: Mark a port as authenticated. 120 * This also disables the authenticated state of the port.
|
| /linux/include/crypto/internal/ |
| H A D | aead.h | 3 * AEAD: Authenticated Encryption with Associated Data
|
| /linux/net/bluetooth/ |
| H A D | smp.h | 168 if (key->authenticated) { in smp_ltk_sec_level()
|
| /linux/net/sctp/ |
| H A D | auth.c | 546 /* Check to see if the given chunk is supposed to be authenticated */ 582 /* Check if peer requested that this chunk is authenticated */ 661 /* Add a chunk to the endpoint authenticated chunk list */
|
| /linux/security/integrity/platform_certs/ |
| H A D | load_powerpc.c | 85 /* PLPKS authenticated variables ESL data is prefixed with 8 bytes of timestamp */ in load_powerpc_certs()
|
| /linux/include/linux/ceph/ |
| H A D | auth.h | 36 * true if we are authenticated and can connect to
|