/Linux-v6.1/Documentation/networking/ |
D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
/Linux-v6.1/drivers/nvme/target/ |
D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 168 req->sq->authenticated = true; in nvmet_auth_reply() 300 req->sq->authenticated = true; in nvmet_execute_auth_send() 311 req->sq->authenticated = false; in nvmet_execute_auth_send() 321 req->sq->authenticated = false; in nvmet_execute_auth_send() 501 req->sq->authenticated = false; in nvmet_execute_auth_receive() 511 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
D | auth.c | 258 !req->sq->authenticated) in nvmet_check_auth_status()
|
D | nvmet.h | 113 bool authenticated; member
|
/Linux-v6.1/fs/ubifs/ |
D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
D | auth.c | 337 c->authenticated = true; in ubifs_init_authentication()
|
D | ubifs.h | 1326 unsigned int authenticated:1; member 1543 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
/Linux-v6.1/Documentation/driver-api/mei/ |
D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
/Linux-v6.1/drivers/gpu/drm/ |
D | drm_ioctl.c | 199 client->auth = file_priv->authenticated; in drm_getclient() 539 !file_priv->authenticated)) in drm_ioctl_permit() 862 file_priv->authenticated, ioctl->name); in drm_ioctl() 900 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
D | drm_auth.c | 125 file->authenticated = 1; in drm_authmagic() 182 fpriv->authenticated = 1; in drm_new_set_master()
|
D | drm_debugfs.c | 104 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
D | drm_vm.c | 534 if (!priv->authenticated) in drm_mmap_locked()
|
D | drm_file.c | 163 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
D | drm_lease.c | 560 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
/Linux-v6.1/Documentation/filesystems/ |
D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
D | fsverity.rst | 50 read-only partition that is itself authenticated by dm-verity) can 285 to be authenticated against the file digest that would be returned by 753 extremely inefficient. Alternatively, a different authenticated 754 dictionary structure such as an "authenticated skiplist" could
|
/Linux-v6.1/include/drm/ |
D | drm_file.h | 169 bool authenticated; member
|
/Linux-v6.1/net/bluetooth/ |
D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
D | smp.c | 1277 u8 authenticated; in smp_distribute_keys() local 1294 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1296 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2525 u8 authenticated; in smp_cmd_initiator_ident() local 2542 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2544 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
/Linux-v6.1/drivers/gpu/drm/amd/display/modules/hdcp/ |
D | hdcp1_execution.c | 255 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 484 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
D | hdcp2_execution.c | 561 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 801 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 869 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
/Linux-v6.1/drivers/gpu/drm/mga/ |
D | mga_ioc32.c | 191 file_priv->authenticated, in mga_compat_ioctl()
|
/Linux-v6.1/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
/Linux-v6.1/crypto/ |
D | Kconfig | 712 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F 787 menu "AEAD (authenticated encryption with associated data) ciphers" 824 authenticated encryption mode (NIST SP800-38C) 834 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 885 template, and that the IV appears at the end of the authenticated
|
/Linux-v6.1/arch/arm64/crypto/ |
D | Kconfig | 265 authenticated encryption mode (NIST SP800-38C)
|