| /linux/Documentation/networking/ |
| A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux/drivers/nvme/target/ |
| A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 167 req->sq->authenticated = true; in nvmet_auth_reply() 301 req->sq->authenticated = true; in nvmet_execute_auth_send() 311 req->sq->authenticated = false; in nvmet_execute_auth_send() 319 req->sq->authenticated = false; in nvmet_execute_auth_send() 490 req->sq->authenticated = false; in nvmet_execute_auth_receive() 500 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
| A D | auth.c | 269 !req->sq->authenticated) in nvmet_check_auth_status()
|
| A D | nvmet.h | 113 bool authenticated; member
|
| /linux/fs/ubifs/ |
| A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
| A D | auth.c | 336 c->authenticated = true; in ubifs_init_authentication()
|
| A D | ubifs.h | 1320 unsigned int authenticated:1; member 1537 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
| /linux/drivers/gpu/drm/ |
| A D | drm_ioctl.c | 198 client->auth = file_priv->authenticated; in drm_getclient() 551 !file_priv->authenticated)) in drm_ioctl_permit() 813 file_priv->authenticated, ioctl->name); in drm_ioctl() 852 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| A D | drm_auth.c | 124 file->authenticated = 1; in drm_authmagic() 180 fpriv->authenticated = 1; in drm_new_set_master()
|
| A D | drm_ioc32.c | 384 file_priv->authenticated, in drm_compat_ioctl()
|
| A D | drm_lease.c | 563 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| A D | drm_file.c | 147 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| A D | drm_debugfs.c | 106 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
| /linux/Documentation/driver-api/mei/ |
| A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux/Documentation/filesystems/ |
| A D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
| /linux/arch/arm64/crypto/ |
| A D | Kconfig | 277 authenticated encryption mode (NIST SP800-38C) 293 authenticated encryption mode (NIST SP800-38C) 308 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux/net/bluetooth/ |
| A D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
| A D | smp.c | 1285 u8 authenticated; in smp_distribute_keys() local 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1304 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2541 u8 authenticated; in smp_cmd_initiator_ident() local 2558 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2560 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
| /linux/include/drm/ |
| A D | drm_file.h | 174 bool authenticated; member
|
| /linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
| A D | hdcp1_execution.c | 255 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 484 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
| A D | hdcp2_execution.c | 560 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 799 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 867 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| /linux/arch/powerpc/crypto/ |
| A D | Kconfig | 118 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux/crypto/ |
| A D | Kconfig | 691 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F 752 menu "AEAD (authenticated encryption with associated data) ciphers" 789 authenticated encryption mode (NIST SP800-38C) 799 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 850 template, and that the IV appears at the end of the authenticated
|