/linux/Documentation/networking/ |
A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
/linux/fs/ubifs/ |
A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
A D | auth.c | 337 c->authenticated = true; in ubifs_init_authentication()
|
A D | ubifs.h | 1298 unsigned int authenticated:1; member 1514 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
/linux/drivers/gpu/drm/ |
A D | drm_ioctl.c | 199 client->auth = file_priv->authenticated; in drm_getclient() 533 !file_priv->authenticated)) in drm_ioctl_permit() 856 file_priv->authenticated, ioctl->name); in drm_ioctl() 894 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
A D | drm_auth.c | 125 file->authenticated = 1; in drm_authmagic() 182 fpriv->authenticated = 1; in drm_new_set_master()
|
A D | drm_debugfs.c | 104 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
A D | drm_lease.c | 560 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
A D | drm_vm.c | 534 if (!priv->authenticated) in drm_mmap_locked()
|
A D | drm_file.c | 168 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
A D | drm_ioc32.c | 992 file_priv->authenticated, in drm_compat_ioctl()
|
/linux/Documentation/filesystems/ |
A D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
A D | fsverity.rst | 50 read-only partition that is itself authenticated by dm-verity) can 274 to be authenticated against the file digest that would be returned by 735 extremely inefficient. Alternatively, a different authenticated 736 dictionary structure such as an "authenticated skiplist" could
|
/linux/Documentation/driver-api/mei/ |
A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
/linux/include/drm/ |
A D | drm_file.h | 169 bool authenticated; member
|
/linux/net/bluetooth/ |
A D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
A D | smp.c | 1277 u8 authenticated; in smp_distribute_keys() local 1294 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1296 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2525 u8 authenticated; in smp_cmd_initiator_ident() local 2542 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2544 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
A D | mgmt.c | 6463 u8 type, authenticated; in load_long_term_keys() local 6475 authenticated = 0x00; in load_long_term_keys() 6479 authenticated = 0x01; in load_long_term_keys() 6483 authenticated = 0x00; in load_long_term_keys() 6487 authenticated = 0x01; in load_long_term_keys() 6491 authenticated = 0x00; in load_long_term_keys() 6499 le_addr_type(key->addr.type), type, authenticated, in load_long_term_keys() 8884 if (ltk->authenticated) in mgmt_ltk_type() 8888 if (ltk->authenticated) in mgmt_ltk_type()
|
/linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
A D | hdcp1_execution.c | 255 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 484 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
A D | hdcp2_execution.c | 561 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 801 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 869 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
/linux/Documentation/admin-guide/device-mapper/ |
A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
A D | verity.rst | 152 has been authenticated in some way (cryptographic signatures, etc).
|
/linux/drivers/gpu/drm/mga/ |
A D | mga_ioc32.c | 191 file_priv->authenticated, in mga_compat_ioctl()
|
/linux/Documentation/admin-guide/hw-vuln/ |
A D | tsx_async_abort.rst | 30 allow an authenticated user to potentially enable
|
/linux/include/net/bluetooth/ |
A D | hci_core.h | 196 u8 authenticated; member 1341 u8 addr_type, u8 type, u8 authenticated,
|