| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| H A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux/drivers/nvme/target/ |
| H A D | fabrics-cmd-auth.c | 29 sq->authenticated = false; in nvmet_auth_sq_init() 182 pr_debug("%s: ctrl %d qid %d host authenticated\n", in nvmet_auth_reply() 211 req->sq->authenticated = true; in nvmet_auth_reply() 215 req->sq->authenticated = true; in nvmet_auth_reply() 354 req->sq->authenticated = true; in nvmet_execute_auth_send() 355 pr_debug("%s: ctrl %d qid %d ctrl authenticated\n", in nvmet_execute_auth_send() 364 req->sq->authenticated = false; in nvmet_execute_auth_send() 372 req->sq->authenticated = false; in nvmet_execute_auth_send() 549 req->sq->authenticated = false; in nvmet_execute_auth_receive() 559 req->sq->authenticated in nvmet_execute_auth_receive() [all...] |
| H A D | auth.c | 276 if (!req->sq->authenticated) in nvmet_destroy_auth()
|
| H A D | nvmet.h | 159 bool authenticated; member
|
| /linux/fs/ubifs/ |
| H A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
| H A D | auth.c | 336 c->authenticated = true; in ubifs_init_authentication()
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 32 bool authenticated; 356 "qid 0: authenticated with hash %s dhgroup %s\n", in nvme_auth_process_dhchap_success1() 380 "qid 0: controller authenticated\n"); in nvme_auth_process_dhchap_success1() 640 chap->authenticated = false; in nvme_auth_dhchap_exponential() 888 chap->authenticated = true; in nvme_queue_auth_work() 895 chap->authenticated = false; in nvme_queue_auth_work() 987 * not been authenticated initially. 989 if (!chap->authenticated) in nvme_auth_wait() 1002 if (!chap->authenticated) in nvme_ctrl_auth_work() 1043 chap->authenticated in nvme_ctrl_auth_work() 34 bool authenticated; global() member [all...] |
| /linux/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 198 client->auth = file_priv->authenticated; in drm_getclient() 607 !file_priv->authenticated)) in drm_ioctl_permit() 872 file_priv->authenticated, ioctl->name); in drm_ioctl() 911 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_auth.c | 124 file->authenticated = 1; in drm_authmagic() 179 fpriv->authenticated = 1; in drm_new_set_master()
|
| H A D | drm_ioc32.c | 386 file_priv->authenticated, in drm_compat_ioctl()
|
| H A D | drm_lease.c | 562 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| H A D | drm_file.c | 149 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux/net/bluetooth/ |
| H A D | smp.h | 168 if (key->authenticated) { in smp_ltk_sec_level()
|
| H A D | smp.c | 1282 u8 authenticated; in smp_distribute_keys() local 1299 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1301 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2525 u8 authenticated; in smp_cmd_initiator_ident() local 2542 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2544 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
| H A D | mgmt.c | 7315 u8 type, authenticated; in load_long_term_keys() local 7333 authenticated = 0x00; in load_long_term_keys() 7337 authenticated = 0x01; in load_long_term_keys() 7341 authenticated = 0x00; in load_long_term_keys() 7345 authenticated = 0x01; in load_long_term_keys() 7349 authenticated = 0x00; in load_long_term_keys() 7357 le_addr_type(key->addr.type), type, authenticated, in load_long_term_keys() 9636 if (ltk->authenticated) in mgmt_ltk_type() 9640 if (ltk->authenticated) in mgmt_ltk_type()
|
| H A D | hci_core.c | 1324 u8 addr_type, u8 type, u8 authenticated, in hci_add_ltk() argument 1343 key->authenticated = authenticated; in hci_add_ltk()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| H A D | verity.rst | 172 has been authenticated in some way (cryptographic signatures, etc).
|
| /linux/drivers/misc/mei/ |
| H A D | Kconfig | 95 authenticated and versioned, and do not require firmware flashing
|
| /linux/crypto/ |
| H A D | Kconfig | 748 menu "AEAD (authenticated encryption with associated data) ciphers" 785 authenticated encryption mode (NIST SP800-38C) 794 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 844 template, and that the IV appears at the end of the authenticated
|
| /linux/drivers/pci/ |
| H A D | tsm.c | 627 static DEVICE_ATTR_RO(authenticated);
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | tsx_async_abort.rst | 30 allow an authenticated user to potentially enable
|
| /linux/include/linux/ |
| H A D | usb.h | 701 unsigned authenticated:1; member
|