| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| H A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux/drivers/nvme/target/ |
| H A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 213 req->sq->authenticated = true; in nvmet_auth_reply() 217 req->sq->authenticated = true; in nvmet_auth_reply() 355 req->sq->authenticated = true; in nvmet_execute_auth_send() 365 req->sq->authenticated = false; in nvmet_execute_auth_send() 373 req->sq->authenticated = false; in nvmet_execute_auth_send() 549 req->sq->authenticated = false; in nvmet_execute_auth_receive() 559 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
| H A D | auth.c | 286 if (!req->sq->authenticated) in nvmet_check_auth_status()
|
| /linux/fs/ubifs/ |
| H A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
| H A D | auth.c | 336 c->authenticated = true; in ubifs_init_authentication()
|
| H A D | ubifs.h | 1315 unsigned int authenticated:1; member 1532 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
| /linux/arch/arm64/crypto/ |
| H A D | Kconfig | 184 authenticated encryption mode (NIST SP800-38C) 200 authenticated encryption mode (NIST SP800-38C) 215 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 34 bool authenticated; member 691 chap->authenticated = false; in nvme_auth_free_dhchap() 940 chap->authenticated = true; in nvme_queue_auth_work() 947 chap->authenticated = false; in nvme_queue_auth_work() 1041 if (!chap->authenticated) in nvme_ctrl_auth_work() 1054 if (!chap->authenticated) in nvme_ctrl_auth_work() 1097 chap->authenticated = false; in nvme_auth_init_ctrl()
|
| /linux/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 198 client->auth = file_priv->authenticated; in drm_getclient() 607 !file_priv->authenticated)) in drm_ioctl_permit() 872 file_priv->authenticated, ioctl->name); in drm_ioctl() 911 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_ioc32.c | 384 file_priv->authenticated, in drm_compat_ioctl()
|
| H A D | drm_lease.c | 563 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| H A D | drm_file.c | 149 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux/net/bluetooth/ |
| H A D | smp.h | 168 if (key->authenticated) { in smp_ltk_sec_level()
|
| H A D | smp.c | 1285 u8 authenticated; in smp_distribute_keys() local 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1304 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2524 u8 authenticated; in smp_cmd_initiator_ident() local 2541 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2543 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
| /linux/include/drm/ |
| H A D | drm_file.h | 174 bool authenticated; member
|
| /linux/arch/powerpc/crypto/ |
| H A D | Kconfig | 37 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| H A D | verity.rst | 172 has been authenticated in some way (cryptographic signatures, etc).
|
| /linux/drivers/misc/mei/ |
| H A D | Kconfig | 94 authenticated and versioned, and do not require firmware flashing
|
| /linux/crypto/ |
| H A D | Kconfig | 770 menu "AEAD (authenticated encryption with associated data) ciphers" 807 authenticated encryption mode (NIST SP800-38C) 816 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 866 template, and that the IV appears at the end of the authenticated
|
| /linux/drivers/pci/ |
| H A D | tsm.c | 627 static DEVICE_ATTR_RO(authenticated);
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 75 is already authenticated in a different way, such as by being loaded 304 to be authenticated against the file digest that would be returned by 841 extremely inefficient. Alternatively, a different authenticated 842 dictionary structure such as an "authenticated skiplist" could
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | tsx_async_abort.rst | 30 allow an authenticated user to potentially enable
|