| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| H A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux/drivers/nvme/target/ |
| H A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 213 req->sq->authenticated = true; in nvmet_auth_reply() 217 req->sq->authenticated = true; in nvmet_auth_reply() 355 req->sq->authenticated = true; in nvmet_execute_auth_send() 365 req->sq->authenticated = false; in nvmet_execute_auth_send() 373 req->sq->authenticated = false; in nvmet_execute_auth_send() 549 req->sq->authenticated = false; in nvmet_execute_auth_receive() 559 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
| H A D | auth.c | 286 if (!req->sq->authenticated) in nvmet_check_auth_status()
|
| H A D | nvmet.h | 159 bool authenticated; member
|
| /linux/fs/ubifs/ |
| H A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
| H A D | auth.c | 336 c->authenticated = true; in ubifs_init_authentication()
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 34 bool authenticated; member 376 "qid 0: authenticated with hash %s dhgroup %s\n", in nvme_auth_process_dhchap_success1() 400 "qid 0: controller authenticated\n"); in nvme_auth_process_dhchap_success1() 691 chap->authenticated = false; in nvme_auth_free_dhchap() 940 chap->authenticated = true; in nvme_queue_auth_work() 947 chap->authenticated = false; in nvme_queue_auth_work() 1039 * not been authenticated initially. in nvme_ctrl_auth_work() 1041 if (!chap->authenticated) in nvme_ctrl_auth_work() 1054 if (!chap->authenticated) in nvme_ctrl_auth_work() 1096 chap->authenticated in nvme_auth_init_ctrl() [all...] |
| /linux/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 198 client->auth = file_priv->authenticated; in drm_getclient() 607 !file_priv->authenticated)) in drm_ioctl_permit() 872 file_priv->authenticated, ioctl->name); in drm_ioctl() 911 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_auth.c | 124 file->authenticated = 1; in drm_authmagic() 179 fpriv->authenticated = 1; in drm_new_set_master()
|
| H A D | drm_ioc32.c | 384 file_priv->authenticated, in drm_compat_ioctl()
|
| H A D | drm_lease.c | 562 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| H A D | drm_file.c | 148 /* for compatibility root is always authenticated */ in drm_file_alloc() 149 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux/net/bluetooth/ |
| H A D | smp.h | 168 if (key->authenticated) { in smp_ltk_sec_level()
|
| H A D | smp.c | 1285 u8 authenticated; in smp_distribute_keys() local 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1304 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2524 u8 authenticated; in smp_cmd_initiator_ident() local 2541 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2543 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
| H A D | mgmt.c | 7307 u8 type, authenticated; in load_long_term_keys() local 7325 authenticated = 0x00; in load_long_term_keys() 7329 authenticated = 0x01; in load_long_term_keys() 7333 authenticated = 0x00; in load_long_term_keys() 7337 authenticated = 0x01; in load_long_term_keys() 7341 authenticated = 0x00; in load_long_term_keys() 7349 le_addr_type(key->addr.type), type, authenticated, in load_long_term_keys() 9628 if (ltk->authenticated) in mgmt_ltk_type() 9632 if (ltk->authenticated) in mgmt_ltk_type()
|
| H A D | hci_core.c | 1324 u8 addr_type, u8 type, u8 authenticated, in hci_add_ltk() argument 1343 key->authenticated = authenticated; in hci_add_ltk()
|
| H A D | hci_debugfs.c | 846 <k->bdaddr, ltk->bdaddr_type, ltk->authenticated, in long_term_keys_show()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| H A D | verity.rst | 172 has been authenticated in some way (cryptographic signatures, etc).
|
| H A D | dm-integrity.rst | 19 In this mode, the dm-crypt and dm-integrity targets provide authenticated
|
| /linux/drivers/pci/ |
| H A D | tsm.c | 627 static DEVICE_ATTR_RO(authenticated);
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | tsx_async_abort.rst | 30 allow an authenticated user to potentially enable
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-bus-pci | 688 What: /sys/bus/pci/devices/.../authenticated 703 authenticated attribute is an alias for the device 'connect'
|