Home
last modified time | relevance | path

Searched refs:authenticated (Results 1 – 25 of 65) sorted by relevance

123

/OK3568_Linux_fs/kernel/Documentation/networking/
H A Dmac80211-auth-assoc-deauth.txt16 alt authenticated/authenticating already
43 mac80211->driver: sta_state(AP, authenticated)
49 alt authenticated or associated
53 alt not previously authenticated (FT)
57 mac80211->driver: sta_state(AP, authenticated)
89 mac80211->driver: sta_state(AP,authenticated)
/OK3568_Linux_fs/kernel/fs/ubifs/
H A Dsb.c542 int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); in authenticate_sb_node() local
546 if (c->authenticated && !authenticated) { in authenticate_sb_node()
551 if (!c->authenticated && authenticated) { in authenticate_sb_node()
557 c->authenticated ? "" : "un"); in authenticate_sb_node()
559 if (!c->authenticated) in authenticate_sb_node()
/OK3568_Linux_fs/u-boot/doc/
H A DREADME.mxc_hab3 To enable the authenticated or encrypted boot mode of U-Boot, it is
57 An authenticated U-Boot image is used as starting point for
69 The DEK blob is generated by an authenticated U-Boot image with
H A DREADME.ti-secure4 Secure TI devices require a boot image that is authenticated by ROM
161 be authenticated, as described above, as part of the particular
163 process, the authenticated SPL must authenticate the main u-boot
172 authenticated by the SPL as they are loaded from the FIT image, the
/OK3568_Linux_fs/external/xserver/hw/xquartz/xpr/
H A Dappledri.c161 rep.authenticated = 1; in ProcAppleDRIAuthConnection()
166 rep.authenticated = 0; in ProcAppleDRIAuthConnection()
172 swapl(&rep.authenticated); /* Yes, this is a CARD32 ... sigh */ in ProcAppleDRIAuthConnection()
H A Dappledristr.h111 CARD32 authenticated B32;
/OK3568_Linux_fs/buildroot/package/weston/
H A D0088-libweston-Add-user-authentication-support-via-PAM.patch109 + bool authenticated = false;
138 + authenticated = true;
144 + return authenticated;
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/
H A D0089-libweston-Add-user-authentication-support-via-PAM.patch109 + bool authenticated = false;
138 + authenticated = true;
144 + return authenticated;
/OK3568_Linux_fs/kernel/drivers/gpu/drm/
H A Ddrm_ioctl.c200 client->auth = file_priv->authenticated; in drm_getclient()
553 !file_priv->authenticated)) in drm_ioctl_permit()
870 file_priv->authenticated, ioctl->name); in drm_ioctl()
908 file_priv->authenticated, cmd, nr); in drm_ioctl()
H A Ddrm_auth.c95 file->authenticated = 1; in drm_authmagic()
150 fpriv->authenticated = 1; in drm_new_set_master()
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dubifs-authentication.rst245 stored on flash are authenticated. That is:
326 The journal is authenticated too. Since the journal is continuously written
328 journal so that in case of a powercut not too much data can't be authenticated.
333 of the hash chain. That way a journal can be authenticated up to the last
335 node cannot be authenticated and is skipped during journal replay.
365 node is authenticated with a HMAC as described above, it is not possible to
380 node. Since the master node itself is authenticated, the LPTs authenticity can
392 to verify authenticated nodes and generate new HMACs for changes.
425 In certain cases where a vendor wants to provide an authenticated filesystem
/OK3568_Linux_fs/kernel/Documentation/driver-api/mei/
H A Dhdcp.rst18 upon request ME FW will configure the port as authenticated and supply
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/ppp/ppp/
H A Dprovider1 # example configuration for a dialup connection authenticated with PAP or CHAP
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/gradm/
H A Dgradm_3.1-201903191516.bb5 performs several tasks for the RBAC system including authenticated \
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/
H A DCVE-2021-37750.patch16 In MIT krb5 releases 1.14 and later, an authenticated attacker can
/OK3568_Linux_fs/kernel/include/drm/
H A Ddrm_file.h169 bool authenticated; member
/OK3568_Linux_fs/buildroot/package/libkrb5/
H A D0001-Fix-KDC-null-deref-on-TGS-inner-body-null-server.patch16 In MIT krb5 releases 1.14 and later, an authenticated attacker can
/OK3568_Linux_fs/kernel/net/bluetooth/
H A Dsmp.h167 if (key->authenticated) { in smp_ltk_sec_level()
/OK3568_Linux_fs/kernel/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp1_execution.c246 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function
476 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp1_execution()
H A Dhdcp2_execution.c553 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, in authenticated() function
796 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_execution()
864 status = authenticated(hdcp, event_ctx, input); in mod_hdcp_hdcp2_dp_execution()
/OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst32 This format is mainly used for specification of authenticated modes.
43 Examples of authenticated modes::
/OK3568_Linux_fs/external/xserver/hw/xfree86/dri/
H A Dxf86dri.c194 .authenticated = 1 in ProcXF86DRIAuthConnection()
206 rep.authenticated = 0; in ProcXF86DRIAuthConnection()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-protocols/radiusclient-ng/radiusclient-ng/
H A DModify-configure.in-and-etc-Makefile.am.patch80 # program to call for a RADIUS authenticated login
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/
H A DCVE-2022-27782-2.patch69 bool authed; /* the connection has been authenticated fine */
/OK3568_Linux_fs/kernel/drivers/gpu/drm/mga/
H A Dmga_ioc32.c190 file_priv->authenticated, in mga_compat_ioctl()

123