| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 16 alt authenticated/authenticating already 43 mac80211->driver: sta_state(AP, authenticated) 49 alt authenticated or associated 53 alt not previously authenticated (FT) 57 mac80211->driver: sta_state(AP, authenticated) 89 mac80211->driver: sta_state(AP,authenticated)
|
| /OK3568_Linux_fs/kernel/fs/ubifs/ |
| H A D | sb.c | 542 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local 546 if (c->authenticated && !authenticated) { in authenticate_sb_node() 551 if (!c->authenticated && authenticated) { in authenticate_sb_node() 557 c->authenticated ? "" : "un"); in authenticate_sb_node() 559 if (!c->authenticated) in authenticate_sb_node()
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.mxc_hab | 3 To enable the authenticated or encrypted boot mode of U-Boot, it is 57 An authenticated U-Boot image is used as starting point for 69 The DEK blob is generated by an authenticated U-Boot image with
|
| H A D | README.ti-secure | 4 Secure TI devices require a boot image that is authenticated by ROM 161 be authenticated, as described above, as part of the particular 163 process, the authenticated SPL must authenticate the main u-boot 172 authenticated by the SPL as they are loaded from the FIT image, the
|
| /OK3568_Linux_fs/external/xserver/hw/xquartz/xpr/ |
| H A D | appledri.c | 161 rep.authenticated = 1; in ProcAppleDRIAuthConnection() 166 rep.authenticated = 0; in ProcAppleDRIAuthConnection() 172 swapl(&rep.authenticated); /* Yes, this is a CARD32 ... sigh */ in ProcAppleDRIAuthConnection()
|
| H A D | appledristr.h | 111 CARD32 authenticated B32;
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0088-libweston-Add-user-authentication-support-via-PAM.patch | 109 + bool authenticated = false; 138 + authenticated = true; 144 + return authenticated;
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0089-libweston-Add-user-authentication-support-via-PAM.patch | 109 + bool authenticated = false; 138 + authenticated = true; 144 + return authenticated;
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 200 client->auth = file_priv->authenticated; in drm_getclient() 553 !file_priv->authenticated)) in drm_ioctl_permit() 870 file_priv->authenticated, ioctl->name); in drm_ioctl() 908 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
| H A D | drm_auth.c | 95 file->authenticated = 1; in drm_authmagic() 150 fpriv->authenticated = 1; in drm_new_set_master()
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | ubifs-authentication.rst | 245 stored on flash are authenticated. That is: 326 The journal is authenticated too. Since the journal is continuously written 328 journal so that in case of a powercut not too much data can't be authenticated. 333 of the hash chain. That way a journal can be authenticated up to the last 335 node cannot be authenticated and is skipped during journal replay. 365 node is authenticated with a HMAC as described above, it is not possible to 380 node. Since the master node itself is authenticated, the LPTs authenticity can 392 to verify authenticated nodes and generate new HMACs for changes. 425 In certain cases where a vendor wants to provide an authenticated filesystem
|
| /OK3568_Linux_fs/kernel/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 18 upon request ME FW will configure the port as authenticated and supply
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/ppp/ppp/ |
| H A D | provider | 1 # example configuration for a dialup connection authenticated with PAP or CHAP
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/gradm/ |
| H A D | gradm_3.1-201903191516.bb | 5 performs several tasks for the RBAC system including authenticated \
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
| H A D | CVE-2021-37750.patch | 16 In MIT krb5 releases 1.14 and later, an authenticated attacker can
|
| /OK3568_Linux_fs/kernel/include/drm/ |
| H A D | drm_file.h | 169 bool authenticated; member
|
| /OK3568_Linux_fs/buildroot/package/libkrb5/ |
| H A D | 0001-Fix-KDC-null-deref-on-TGS-inner-body-null-server.patch | 16 In MIT krb5 releases 1.14 and later, an authenticated attacker can
|
| /OK3568_Linux_fs/kernel/net/bluetooth/ |
| H A D | smp.h | 167 if (key->authenticated) { in smp_ltk_sec_level()
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/amd/display/modules/hdcp/ |
| H A D | hdcp1_execution.c | 246 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 476 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
|
| H A D | hdcp2_execution.c | 553 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function 796 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution() 864 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 32 This format is mainly used for specification of authenticated modes. 43 Examples of authenticated modes::
|
| /OK3568_Linux_fs/external/xserver/hw/xfree86/dri/ |
| H A D | xf86dri.c | 194 .authenticated = 1 in ProcXF86DRIAuthConnection() 206 rep.authenticated = 0; in ProcXF86DRIAuthConnection()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-protocols/radiusclient-ng/radiusclient-ng/ |
| H A D | Modify-configure.in-and-etc-Makefile.am.patch | 80 # program to call for a RADIUS authenticated login
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27782-2.patch | 69 bool authed; /* the connection has been authenticated fine */
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/mga/ |
| H A D | mga_ioc32.c | 190 file_priv->authenticated, in mga_compat_ioctl()
|