Home
last modified time | relevance | path

Searched full:authenticated (Results 1 – 25 of 107) sorted by relevance

12345

/linux/Documentation/networking/
H A Dmac80211-auth-assoc-deauth.txt16 alt authenticated/authenticating already
43 mac80211->driver: sta_state(AP, authenticated)
49 alt authenticated or associated
53 alt not previously authenticated (FT)
57 mac80211->driver: sta_state(AP, authenticated)
89 mac80211->driver: sta_state(AP,authenticated)
H A Dtls-handshake.rst91 To request an x.509-authenticated TLS session, the consumer fills in
201 authenticated.
/linux/drivers/nvme/target/
H A Dfabrics-cmd-auth.c30 sq->authenticated = false; in nvmet_auth_sq_init()
184 pr_debug("%s: ctrl %d qid %d host authenticated\n", in nvmet_auth_reply()
213 req->sq->authenticated = true; in nvmet_auth_reply()
217 req->sq->authenticated = true; in nvmet_auth_reply()
355 req->sq->authenticated = true; in nvmet_execute_auth_send()
356 pr_debug("%s: ctrl %d qid %d ctrl authenticated\n", in nvmet_execute_auth_send()
365 req->sq->authenticated = false; in nvmet_execute_auth_send()
373 req->sq->authenticated = false; in nvmet_execute_auth_send()
549 req->sq->authenticated = false; in nvmet_execute_auth_receive()
559 req->sq->authenticated = false; in nvmet_execute_auth_receive()
/linux/drivers/net/wireguard/
H A Dtimers.c26 * - Timer for, if enabled, sending an empty authenticated packet every user-
147 /* Should be called after an authenticated data packet is sent. */
156 /* Should be called after an authenticated data packet is received. */
168 /* Should be called after any type of authenticated packet is sent, whether
176 /* Should be called after any type of authenticated packet is received, whether
/linux/fs/ubifs/
H A Dsb.c545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local
549 if (c->authenticated && !authenticated) { in authenticate_sb_node()
550 ubifs_err(c, "authenticated FS forced, but found FS without authentication"); in authenticate_sb_node()
554 if (!c->authenticated && authenticated) { in authenticate_sb_node()
555 ubifs_err(c, "authenticated FS found, but no key given"); in authenticate_sb_node()
560 c->authenticated ? "" : "un"); in authenticate_sb_node()
562 if (!c->authenticated) in authenticate_sb_node()
583 * The super block node can either be authenticated by a HMAC or in authenticate_sb_node()
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst32 This format is mainly used for specification of authenticated modes.
43 Examples of authenticated modes::
144 For Authenticated Encryption with Additional Data (AEAD)
/linux/drivers/nvme/host/
H A Dauth.c34 bool authenticated; member
376 "qid 0: authenticated with hash %s dhgroup %s\n", in nvme_auth_process_dhchap_success1()
400 "qid 0: controller authenticated\n"); in nvme_auth_process_dhchap_success1()
691 chap->authenticated = false; in nvme_auth_free_dhchap()
940 chap->authenticated = true; in nvme_queue_auth_work()
947 chap->authenticated = false; in nvme_queue_auth_work()
1039 * not been authenticated initially. in nvme_ctrl_auth_work()
1041 if (!chap->authenticated) in nvme_ctrl_auth_work()
1054 if (!chap->authenticated) in nvme_ctrl_auth_work()
1096 chap->authenticated = false; in nvme_auth_init_ctrl()
/linux/include/linux/
H A Drpmb.h65 * struct rpmb_frame - RPMB frame structure for authenticated access
78 * authenticated data write requests made by the host.
/linux/drivers/gpu/drm/
H A Ddrm_ioctl.c193 * attempt to figure out whether they're authenticated or not. Since in drm_getclient()
198 client->auth = file_priv->authenticated; in drm_getclient()
605 /* AUTH is only for authenticated or render client */ in drm_ioctl_permit()
607 !file_priv->authenticated)) in drm_ioctl_permit()
872 file_priv->authenticated, ioctl->name); in drm_ioctl()
911 file_priv->authenticated, cmd, nr); in drm_ioctl()
H A Ddrm_ioc32.c168 int auth; /* Is client authenticated? */
384 file_priv->authenticated, in drm_compat_ioctl()
H A Ddrm_auth.c124 file->authenticated = 1; in drm_authmagic()
179 fpriv->authenticated = 1; in drm_new_set_master()
/linux/Documentation/driver-api/mei/
H A Dhdcp.rst18 upon request ME FW will configure the port as authenticated and supply
/linux/tools/crypto/ccp/
H A Dtest_dbc.py140 """fetch authenticated nonce"""
169 # if already authenticated these may fail
/linux/drivers/pci/
H A Dtsm.c539 /* The 'authenticated' attribute is exclusive to the presence of a 'link' TSM */
554 * Show 'authenticated' and other attributes for the managed in pci_tsm_link_group_visible()
622 * When the SPDM session established via TSM the 'authenticated' state in authenticated_show()
627 static DEVICE_ATTR_RO(authenticated);
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c87 printf("Authenticated, result (%02x), sig-size (%02x)\n", in main()
/linux/Documentation/target/
H A Dtarget-export-device77 # Allow write access for non authenticated initiators
/linux/include/uapi/linux/
H A Dsctp.h819 * 7.1.18. Add a chunk that must be authenticated (SCTP_AUTH_CHUNK)
822 * received only in an authenticated way. Changes to the list of chunks
971 * 7.2.3. Get the list of chunks the peer requires to be authenticated
975 * the peer requires to be received authenticated only.
H A Drxrpc.h73 #define RXRPC_SECURITY_AUTH 1 /* authenticated packets */
/linux/crypto/
H A DKconfig752 menu "AEAD (authenticated encryption with associated data) ciphers"
789 authenticated encryption mode (NIST SP800-38C)
798 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC
848 template, and that the IV appears at the end of the authenticated
/linux/include/drm/intel/
H A Di915_hdcp_interface.h118 * @enable_hdcp_authentication: Mark a port as authenticated.
120 * This also disables the authenticated state of the port.
/linux/include/crypto/internal/
H A Daead.h3 * AEAD: Authenticated Encryption with Associated Data
/linux/net/bluetooth/
H A Dsmp.h168 if (key->authenticated) { in smp_ltk_sec_level()
/linux/net/sctp/
H A Dauth.c546 /* Check to see if the given chunk is supposed to be authenticated */
582 /* Check if peer requested that this chunk is authenticated */
661 /* Add a chunk to the endpoint authenticated chunk list */
/linux/security/integrity/platform_certs/
H A Dload_powerpc.c85 /* PLPKS authenticated variables ESL data is prefixed with 8 bytes of timestamp */ in load_powerpc_certs()
/linux/include/linux/ceph/
H A Dauth.h36 * true if we are authenticated and can connect to

12345