| /Linux-v5.4/Documentation/networking/ |
| D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| /Linux-v5.4/fs/ubifs/ |
| D | sb.c | 544 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 548 if (c->authenticated && !authenticated) { in authenticate_sb_node() 553 if (!c->authenticated && authenticated) { in authenticate_sb_node() 559 c->authenticated ? "" : "un"); in authenticate_sb_node() 561 if (!c->authenticated) in authenticate_sb_node()
|
| D | auth.c | 361 c->authenticated = true; in ubifs_init_authentication()
|
| D | ubifs.h | 1296 unsigned int authenticated:1; member 1511 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
| /Linux-v5.4/drivers/gpu/drm/i915/selftests/ |
| D | mock_drm.c | 54 file->authenticated = true; in mock_file()
|
| /Linux-v5.4/Documentation/driver-api/mei/ |
| D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /Linux-v5.4/drivers/gpu/drm/ |
| D | drm_auth.c | 95 file->authenticated = 1; in drm_authmagic() 162 fpriv->authenticated = 1; in drm_new_set_master()
|
| D | drm_ioctl.c | 199 client->auth = file_priv->authenticated; in drm_getclient() 545 !file_priv->authenticated)) in drm_ioctl_permit() 857 file_priv->authenticated, ioctl->name); in drm_ioctl() 895 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| D | drm_debugfs.c | 103 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
| D | drm_file.c | 131 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| D | drm_lease.c | 565 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| D | drm_vm.c | 542 if (!priv->authenticated) in drm_mmap_locked()
|
| /Linux-v5.4/drivers/staging/wusbcore/ |
| D | security.c | 339 usb_dev->authenticated = 1; in wusb_dev_update_address() 494 if (usb_dev->authenticated == 0) { in wusb_dev_4way_handshake() 547 || !wusb_dev->usb_dev->authenticated) in wusbhc_gtk_rekey_work()
|
| D | wa-rpipe.c | 315 unauth = usb_dev->wusb && !usb_dev->authenticated ? 0x80 : 0; in rpipe_aim()
|
| /Linux-v5.4/include/drm/ |
| D | drm_file.h | 168 bool authenticated; member
|
| /Linux-v5.4/Documentation/filesystems/ |
| D | ubifs-authentication.rst | 241 stored on flash are authenticated. That is: 322 The journal is authenticated too. Since the journal is continuously written 324 journal so that in case of a powercut not too much data can't be authenticated. 329 of the hash chain. That way a journal can be authenticated up to the last 331 node cannot be authenticated and is skipped during journal replay. 361 node is authenticated with a HMAC as described above, it is not possible to 376 node. Since the master node itself is authenticated, the LPTs authenticity can 388 to verify authenticated nodes and generate new HMACs for changes. 421 In certain cases where a vendor wants to provide an authenticated filesystem
|
| /Linux-v5.4/net/bluetooth/ |
| D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
| D | smp.c | 1275 u8 authenticated; in smp_distribute_keys() local 1292 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1294 SMP_LTK_SLAVE, authenticated, enc.ltk, in smp_distribute_keys() 2479 u8 authenticated; in smp_cmd_master_ident() local 2496 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_master_ident() 2498 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_master_ident()
|
| D | mgmt.c | 5135 u8 type, authenticated; in load_long_term_keys() local 5139 authenticated = 0x00; in load_long_term_keys() 5143 authenticated = 0x01; in load_long_term_keys() 5147 authenticated = 0x00; in load_long_term_keys() 5151 authenticated = 0x01; in load_long_term_keys() 5155 authenticated = 0x00; in load_long_term_keys() 5163 le_addr_type(key->addr.type), type, authenticated, in load_long_term_keys() 7109 if (ltk->authenticated) in mgmt_ltk_type() 7113 if (ltk->authenticated) in mgmt_ltk_type()
|
| D | hci_debugfs.c | 769 <k->bdaddr, ltk->bdaddr_type, ltk->authenticated, in long_term_keys_show()
|
| /Linux-v5.4/Documentation/admin-guide/device-mapper/ |
| D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| D | verity.rst | 143 has been authenticated in some way (cryptographic signatures, etc).
|
| /Linux-v5.4/drivers/gpu/drm/mga/ |
| D | mga_ioc32.c | 190 file_priv->authenticated, in mga_compat_ioctl()
|
| /Linux-v5.4/Documentation/admin-guide/hw-vuln/ |
| D | tsx_async_abort.rst | 30 allow an authenticated user to potentially enable
|
| /Linux-v5.4/include/net/bluetooth/ |
| D | hci_core.h | 133 u8 authenticated; member 1110 u8 addr_type, u8 type, u8 authenticated,
|