| /linux-6.15/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| H A D | tls-handshake.rst | 91 To request an x.509-authenticated TLS session, the consumer fills in 201 authenticated.
|
| /linux-6.15/drivers/nvme/target/ |
| H A D | fabrics-cmd-auth.c | 30 sq->authenticated = false; in nvmet_auth_sq_init() 212 req->sq->authenticated = true; in nvmet_auth_reply() 216 req->sq->authenticated = true; in nvmet_auth_reply() 354 req->sq->authenticated = true; in nvmet_execute_auth_send() 364 req->sq->authenticated = false; in nvmet_execute_auth_send() 372 req->sq->authenticated = false; in nvmet_execute_auth_send() 548 req->sq->authenticated = false; in nvmet_execute_auth_receive() 558 req->sq->authenticated = false; in nvmet_execute_auth_receive()
|
| H A D | auth.c | 284 !req->sq->authenticated) in nvmet_check_auth_status()
|
| /linux-6.15/fs/ubifs/ |
| H A D | sb.c | 545 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 549 if (c->authenticated && !authenticated) { in authenticate_sb_node() 554 if (!c->authenticated && authenticated) { in authenticate_sb_node() 560 c->authenticated ? "" : "un"); in authenticate_sb_node() 562 if (!c->authenticated) in authenticate_sb_node()
|
| H A D | auth.c | 336 c->authenticated = true; in ubifs_init_authentication()
|
| H A D | ubifs.h | 1311 unsigned int authenticated:1; member 1528 return (IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) && c->authenticated; in ubifs_authenticated()
|
| /linux-6.15/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /linux-6.15/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 198 client->auth = file_priv->authenticated; in drm_getclient() 600 !file_priv->authenticated)) in drm_ioctl_permit() 864 file_priv->authenticated, ioctl->name); in drm_ioctl() 903 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_auth.c | 124 file->authenticated = 1; in drm_authmagic() 180 fpriv->authenticated = 1; in drm_new_set_master()
|
| H A D | drm_ioc32.c | 384 file_priv->authenticated, in drm_compat_ioctl()
|
| H A D | drm_lease.c | 563 lessee_priv->authenticated = 1; in drm_mode_create_lease_ioctl()
|
| H A D | drm_file.c | 147 file->authenticated = capable(CAP_SYS_ADMIN); in drm_file_alloc()
|
| H A D | drm_debugfs.c | 108 priv->authenticated ? 'y' : 'n', in drm_clients_info()
|
| /linux-6.15/Documentation/filesystems/ |
| H A D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
| /linux-6.15/arch/arm64/crypto/ |
| H A D | Kconfig | 279 authenticated encryption mode (NIST SP800-38C) 295 authenticated encryption mode (NIST SP800-38C) 310 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux-6.15/net/bluetooth/ |
| H A D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
| H A D | smp.c | 1285 u8 authenticated; in smp_distribute_keys() local 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1304 SMP_LTK_RESPONDER, authenticated, enc.ltk, in smp_distribute_keys() 2541 u8 authenticated; in smp_cmd_initiator_ident() local 2558 authenticated = (hcon->sec_level == BT_SECURITY_HIGH); in smp_cmd_initiator_ident() 2560 authenticated, smp->tk, smp->enc_key_size, in smp_cmd_initiator_ident()
|
| /linux-6.15/include/drm/ |
| H A D | drm_file.h | 174 bool authenticated; member
|
| /linux-6.15/drivers/gpu/drm/amd/display/modules/hdcp/ |
| H A D | hdcp1_execution.c | 255 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 484 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
| H A D | hdcp2_execution.c | 553 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 792 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 860 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
| /linux-6.15/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| /linux-6.15/arch/powerpc/crypto/ |
| H A D | Kconfig | 87 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux-6.15/crypto/ |
| H A D | Kconfig | 765 menu "AEAD (authenticated encryption with associated data) ciphers" 802 authenticated encryption mode (NIST SP800-38C) 812 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 863 template, and that the IV appears at the end of the authenticated
|
| /linux-6.15/Documentation/driver-api/media/drivers/ |
| H A D | ipu6.rst | 67 authenticating the IPU6 firmware. The authenticated firmware binary is copied
|