/linux-6.3-rc2/Documentation/networking/ |
A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
/linux-6.3-rc2/drivers/nvme/target/ |
A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 168 req->sq->authenticated = true; in nvmet_auth_reply() 300 req->sq->authenticated = true; in nvmet_execute_auth_send() 311 req->sq->authenticated = false; in nvmet_execute_auth_send() 321 req->sq->authenticated = false; in nvmet_execute_auth_send() 501 req->sq->authenticated = false; in nvmet_execute_auth_receive() 511 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
A D | auth.c | 258 !req->sq->authenticated) in nvmet_check_auth_status()
|
A D | nvmet.h | 113 bool authenticated; member
|
/linux-6.3-rc2/fs/ubifs/ |
A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
A D | auth.c | 337 c->authenticated = true; in ubifs_init_authentication()
|
A D | ubifs.h | 1326 unsigned int authenticated:1; member 1543 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
/linux-6.3-rc2/Documentation/driver-api/mei/ |
A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
/linux-6.3-rc2/drivers/gpu/drm/ |
A D | drm_ioctl.c | 199 client->auth = file_priv->authenticated; in drm_getclient() 539 !file_priv->authenticated)) in drm_ioctl_permit() 862 file_priv->authenticated, ioctl->name); in drm_ioctl() 901 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
A D | drm_auth.c | 125 file->authenticated = 1; in drm_authmagic() 182 fpriv->authenticated = 1; in drm_new_set_master()
|
A D | drm_debugfs.c | 104 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
A D | drm_file.c | 163 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
A D | drm_vm.c | 534 if (!priv->authenticated) in drm_mmap_locked()
|
A D | drm_lease.c | 563 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
A D | fsverity.rst | 50 read-only partition that is itself authenticated by dm-verity) can 287 to be authenticated against the file digest that would be returned by 751 extremely inefficient. Alternatively, a different authenticated 752 dictionary structure such as an "authenticated skiplist" could
|
/linux-6.3-rc2/include/drm/ |
A D | drm_file.h | 173 bool authenticated; member
|
/linux-6.3-rc2/arch/arm64/crypto/ |
A D | Kconfig | 278 authenticated encryption mode (NIST SP800-38C) 294 authenticated encryption mode (NIST SP800-38C) 309 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
/linux-6.3-rc2/net/bluetooth/ |
A D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
A D | smp.c | 1277 u8 authenticated; in smp_distribute_keys() local 1294 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1296 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2525 u8 authenticated; in smp_cmd_initiator_ident() local 2542 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2544 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
/linux-6.3-rc2/drivers/gpu/drm/amd/display/modules/hdcp/ |
A D | hdcp1_execution.c | 255 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 484 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
A D | hdcp2_execution.c | 561 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 801 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 869 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/ |
A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
A D | verity.rst | 156 has been authenticated in some way (cryptographic signatures, etc).
|
/linux-6.3-rc2/crypto/ |
A D | Kconfig | 709 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F 784 menu "AEAD (authenticated encryption with associated data) ciphers" 821 authenticated encryption mode (NIST SP800-38C) 831 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 882 template, and that the IV appears at the end of the authenticated
|