/kernel/linux/linux-5.10/net/ipv6/ |
H A D | esp6.c | 1159 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc() 1164 aalg_desc->uinfo.auth.icv_fullbits / 8); in esp_init_authenc()
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | associola.c | 1019 chunk->auth = 1; in sctp_assoc_bh_rcv() 1032 if (sctp_auth_recv_cid(subtype.chunk, asoc) && !chunk->auth) in sctp_assoc_bh_rcv()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) in wps_validate_key_wrap_auth() argument 928 if (auth == NULL) { in wps_validate_key_wrap_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) in wps_validate_key_wrap_auth() argument 928 if (auth == NULL) { in wps_validate_key_wrap_auth()
|
/kernel/linux/linux-5.10/net/wireless/ |
H A D | sme.c | 26 * Software SME in cfg80211, using auth/assoc/deauth calls to the 168 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work() 340 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth() 528 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect() 1235 /* If given a WEP key we may need it for shared key auth */ in cfg80211_connect()
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | write.c | 1235 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local 1247 cred = auth->au_ops->lookup_cred(auth, &acred, 0); in nfs_ctx_key_to_expire()
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | write.c | 1252 struct rpc_auth *auth = NFS_SERVER(inode)->client->cl_auth; in nfs_ctx_key_to_expire() local 1266 new = auth->au_ops->lookup_cred(auth, &acred, 0); in nfs_ctx_key_to_expire()
|
/kernel/linux/linux-6.6/net/wireless/ |
H A D | sme.c | 26 * Software SME in cfg80211, using auth/assoc/deauth calls to the 168 if (WARN_ON(!rdev->ops->auth)) in cfg80211_conn_do_work() 356 u16 status_code = le16_to_cpu(mgmt->u.auth.status_code); in cfg80211_sme_rx_auth() 573 if (!rdev->ops->auth || !rdev->ops->assoc) in cfg80211_sme_connect() 1489 /* If given a WEP key we may need it for shared key auth */ in cfg80211_connect()
|
/third_party/backends/backend/ |
H A D | plustek_pp.c | 228 static SANE_Auth_Callback auth = NULL; variable 1156 auth = authorize; in sane_init() 1276 auth = NULL; in sane_exit()
|
H A D | u12.c | 168 static SANE_Auth_Callback auth = NULL; variable 935 auth = authorize; in sane_init() 1055 auth = NULL; in sane_exit()
|
H A D | snapscan.c | 139 static SANE_Auth_Callback auth = NULL; variable 708 auth = authorize; in sane_init() 800 auth = NULL; in sane_exit()
|
/kernel/linux/linux-5.10/drivers/net/wireless/ath/wil6210/ |
H A D | wmi.c | 1633 struct auth_no_hdr *auth = (struct auth_no_hdr *)data->ie_info; in wmi_evt_auth_status() local 1637 wil_err(wil, "FT: auth failed. status %d\n", data->status); in wmi_evt_auth_status() 1642 wil_err(wil, "FT: auth event too short, len %d\n", len); in wmi_evt_auth_status() 1649 "FT: auth ie length mismatch, d_len %d should be %d\n", in wmi_evt_auth_status() 1659 if (le16_to_cpu(auth->auth_transaction) != 2) { in wmi_evt_auth_status() 1660 wil_err(wil, "FT: auth error. auth_transaction %d\n", in wmi_evt_auth_status() 1661 le16_to_cpu(auth->auth_transaction)); in wmi_evt_auth_status() 1665 if (le16_to_cpu(auth->auth_alg) != WLAN_AUTH_FT) { in wmi_evt_auth_status() 1666 wil_err(wil, "FT: auth error. auth_alg %d\n", in wmi_evt_auth_status() 1667 le16_to_cpu(auth in wmi_evt_auth_status() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/ath/wil6210/ |
H A D | wmi.c | 1634 struct auth_no_hdr *auth = (struct auth_no_hdr *)data->ie_info; in wmi_evt_auth_status() local 1638 wil_err(wil, "FT: auth failed. status %d\n", data->status); in wmi_evt_auth_status() 1643 wil_err(wil, "FT: auth event too short, len %d\n", len); in wmi_evt_auth_status() 1650 "FT: auth ie length mismatch, d_len %d should be %d\n", in wmi_evt_auth_status() 1660 if (le16_to_cpu(auth->auth_transaction) != 2) { in wmi_evt_auth_status() 1661 wil_err(wil, "FT: auth error. auth_transaction %d\n", in wmi_evt_auth_status() 1662 le16_to_cpu(auth->auth_transaction)); in wmi_evt_auth_status() 1666 if (le16_to_cpu(auth->auth_alg) != WLAN_AUTH_FT) { in wmi_evt_auth_status() 1667 wil_err(wil, "FT: auth error. auth_alg %d\n", in wmi_evt_auth_status() 1668 le16_to_cpu(auth in wmi_evt_auth_status() [all...] |
/kernel/linux/linux-6.6/block/ |
H A D | sed-opal.c | 1692 enum opal_uid auth, in start_generic_opal_session() 1700 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session() 1711 switch (auth) { in start_generic_opal_session() 1723 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session() 1728 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session() 1691 start_generic_opal_session(struct opal_dev *dev, enum opal_uid auth, enum opal_uid sp_type, const char *key, u8 key_len) start_generic_opal_session() argument
|
/kernel/linux/linux-5.10/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_aead.c | 351 memzero_explicit(&fctx->auth, sizeof(struct auth_keys)); in nitrox_aead_exit()
|
/kernel/linux/linux-5.10/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | pno.c | 204 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_pno_add_ssid()
|
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 19 #include <linux/sunrpc/auth.h> 634 MODULE_ALIAS("rpc-auth-gss-krb5"); 635 MODULE_ALIAS("rpc-auth-gss-krb5i"); 636 MODULE_ALIAS("rpc-auth-gss-krb5p"); 637 MODULE_ALIAS("rpc-auth-gss-390003"); 638 MODULE_ALIAS("rpc-auth-gss-390004"); 639 MODULE_ALIAS("rpc-auth-gss-390005"); 640 MODULE_ALIAS("rpc-auth-gss-1.2.840.113554.1.2.2");
|
/kernel/linux/linux-5.10/tools/include/uapi/drm/ |
H A D | drm.h | 239 int auth; /**< Is client authenticated? */ member
|
/kernel/linux/linux-5.10/include/uapi/drm/ |
H A D | drm.h | 239 int auth; /**< Is client authenticated? */ member
|
/kernel/linux/linux-5.10/drivers/gpu/drm/ |
H A D | drm_ioctl.c | 200 client->auth = file_priv->authenticated; in drm_getclient() 865 DRM_DEBUG("comm=\"%s\" pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_ioctl() 903 DRM_DEBUG("invalid ioctl: comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, cmd=0x%02x, nr=0x%02x\n", in drm_ioctl()
|
/kernel/linux/linux-5.10/include/linux/ceph/ |
H A D | ceph_fs.h | 505 #define CEPH_CAP_FLAG_AUTH (1 << 0) /* cap is issued by auth mds */ 541 __le32 auth; /* auth mds, if this is a delegation point */ member
|
/kernel/linux/linux-6.6/include/linux/ceph/ |
H A D | ceph_fs.h | 572 #define CEPH_CAP_FLAG_AUTH (1 << 0) /* cap is issued by auth mds */ 608 __le32 auth; /* auth mds, if this is a delegation point */ member
|
/kernel/linux/linux-6.6/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_aead.c | 350 memzero_explicit(&fctx->auth, sizeof(struct auth_keys)); in nitrox_aead_exit()
|
/kernel/linux/linux-6.6/include/uapi/drm/ |
H A D | drm.h | 238 int auth; /**< Is client authenticated? */ member
|
/kernel/linux/linux-6.6/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | pno.c | 204 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN); in brcmf_pno_add_ssid()
|