Home
last modified time | relevance | path

Searched refs:auth (Results 501 - 525 of 649) sorted by relevance

1...<<212223242526

/kernel/linux/linux-5.10/net/ipv6/
H A Desp6.c1159 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc()
1164 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
/kernel/linux/linux-6.6/net/sctp/
H A Dassociola.c1019 chunk->auth = 1; in sctp_assoc_bh_rcv()
1032 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_assoc_bh_rcv()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
H A Dwps_validate.c926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) in wps_validate_key_wrap_auth() argument
928 if (auth == NULL) { in wps_validate_key_wrap_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
H A Dwps_validate.c926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) in wps_validate_key_wrap_auth() argument
928 if (auth == NULL) { in wps_validate_key_wrap_auth()
/kernel/linux/linux-5.10/net/wireless/
H A Dsme.c26 * Software SME in cfg80211, using auth/assoc/deauth calls to the
168 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work()
340 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth()
528 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect()
1235 /* If given a WEP key we may need it for shared key auth */ in cfg80211_connect()
/kernel/linux/linux-5.10/fs/nfs/
H A Dwrite.c1235 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local
1247 cred = auth->au_ops->lookup_cred(auth, &acred, 0); in nfs_ctx_key_to_expire()
/kernel/linux/linux-6.6/fs/nfs/
H A Dwrite.c1252 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local
1266 new = auth->au_ops->lookup_cred(auth, &acred, 0); in nfs_ctx_key_to_expire()
/kernel/linux/linux-6.6/net/wireless/
H A Dsme.c26 * Software SME in cfg80211, using auth/assoc/deauth calls to the
168 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work()
356 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth()
573 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect()
1489 /* If given a WEP key we may need it for shared key auth */ in cfg80211_connect()
/third_party/backends/backend/
H A Dplustek_pp.c228 static SANE_Auth_Callback auth = NULL; variable
1156 auth = authorize; in sane_init()
1276 auth = NULL; in sane_exit()
H A Du12.c168 static SANE_Auth_Callback auth = NULL; variable
935 auth = authorize; in sane_init()
1055 auth = NULL; in sane_exit()
H A Dsnapscan.c139 static SANE_Auth_Callback auth = NULL; variable
708 auth = authorize; in sane_init()
800 auth = NULL; in sane_exit()
/kernel/linux/linux-5.10/drivers/net/wireless/ath/wil6210/
H A Dwmi.c1633 struct auth_no_hdr *auth = (struct auth_no_hdr *)data->ie_info; in wmi_evt_auth_status() local
1637 wil_err(wil, "FT: auth failed. status %d\n", data->status); in wmi_evt_auth_status()
1642 wil_err(wil, "FT: auth event too short, len %d\n", len); in wmi_evt_auth_status()
1649 "FT: auth ie length mismatch, d_len %d should be %d\n", in wmi_evt_auth_status()
1659 if (le16_to_cpu(auth->auth_transaction) != 2) { in wmi_evt_auth_status()
1660 wil_err(wil, "FT: auth error. auth_transaction %d\n", in wmi_evt_auth_status()
1661 le16_to_cpu(auth->auth_transaction)); in wmi_evt_auth_status()
1665 if (le16_to_cpu(auth->auth_alg) != WLAN_AUTH_FT) { in wmi_evt_auth_status()
1666 wil_err(wil, "FT: auth error. auth_alg %d\n", in wmi_evt_auth_status()
1667 le16_to_cpu(auth in wmi_evt_auth_status()
[all...]
/kernel/linux/linux-6.6/drivers/net/wireless/ath/wil6210/
H A Dwmi.c1634 struct auth_no_hdr *auth = (struct auth_no_hdr *)data->ie_info; in wmi_evt_auth_status() local
1638 wil_err(wil, "FT: auth failed. status %d\n", data->status); in wmi_evt_auth_status()
1643 wil_err(wil, "FT: auth event too short, len %d\n", len); in wmi_evt_auth_status()
1650 "FT: auth ie length mismatch, d_len %d should be %d\n", in wmi_evt_auth_status()
1660 if (le16_to_cpu(auth->auth_transaction) != 2) { in wmi_evt_auth_status()
1661 wil_err(wil, "FT: auth error. auth_transaction %d\n", in wmi_evt_auth_status()
1662 le16_to_cpu(auth->auth_transaction)); in wmi_evt_auth_status()
1666 if (le16_to_cpu(auth->auth_alg) != WLAN_AUTH_FT) { in wmi_evt_auth_status()
1667 wil_err(wil, "FT: auth error. auth_alg %d\n", in wmi_evt_auth_status()
1668 le16_to_cpu(auth in wmi_evt_auth_status()
[all...]
/kernel/linux/linux-6.6/block/
H A Dsed-opal.c1692 enum opal_uid auth, in start_generic_opal_session()
1700 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session()
1711 switch (auth) { in start_generic_opal_session()
1723 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session()
1728 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session()
1691 start_generic_opal_session(struct opal_dev *dev, enum opal_uid auth, enum opal_uid sp_type, const char *key, u8 key_len) start_generic_opal_session() argument
/kernel/linux/linux-5.10/drivers/crypto/cavium/nitrox/
H A Dnitrox_aead.c351 memzero_explicit(&fctx->auth, sizeof(struct auth_keys)); in nitrox_aead_exit()
/kernel/linux/linux-5.10/drivers/net/wireless/broadcom/brcm80211/brcmfmac/
H A Dpno.c204 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_pno_add_ssid()
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c19 #include <linux/sunrpc/auth.h>
634 MODULE_ALIAS("rpc-auth-gss-krb5");
635 MODULE_ALIAS("rpc-auth-gss-krb5i");
636 MODULE_ALIAS("rpc-auth-gss-krb5p");
637 MODULE_ALIAS("rpc-auth-gss-390003");
638 MODULE_ALIAS("rpc-auth-gss-390004");
639 MODULE_ALIAS("rpc-auth-gss-390005");
640 MODULE_ALIAS("rpc-auth-gss-1.2.840.113554.1.2.2");
/kernel/linux/linux-5.10/tools/include/uapi/drm/
H A Ddrm.h239 int auth; /**< Is client authenticated? */ member
/kernel/linux/linux-5.10/include/uapi/drm/
H A Ddrm.h239 int auth; /**< Is client authenticated? */ member
/kernel/linux/linux-5.10/drivers/gpu/drm/
H A Ddrm_ioctl.c200 client->auth = file_priv->authenticated; in drm_getclient()
865 DRM_DEBUG("comm=\"%s\" pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_ioctl()
903 DRM_DEBUG("invalid ioctl: comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, cmd=0x%02x, nr=0x%02x\n", in drm_ioctl()
/kernel/linux/linux-5.10/include/linux/ceph/
H A Dceph_fs.h505 #define CEPH_CAP_FLAG_AUTH (1 << 0) /* cap is issued by auth mds */
541 __le32 auth; /* auth mds, if this is a delegation point */ member
/kernel/linux/linux-6.6/include/linux/ceph/
H A Dceph_fs.h572 #define CEPH_CAP_FLAG_AUTH (1 << 0) /* cap is issued by auth mds */
608 __le32 auth; /* auth mds, if this is a delegation point */ member
/kernel/linux/linux-6.6/drivers/crypto/cavium/nitrox/
H A Dnitrox_aead.c350 memzero_explicit(&fctx->auth, sizeof(struct auth_keys)); in nitrox_aead_exit()
/kernel/linux/linux-6.6/include/uapi/drm/
H A Ddrm.h238 int auth; /**< Is client authenticated? */ member
/kernel/linux/linux-6.6/drivers/net/wireless/broadcom/brcm80211/brcmfmac/
H A Dpno.c204 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_pno_add_ssid()

Completed in 51 milliseconds

1...<<212223242526