/kernel/linux/linux-5.10/net/mac80211/ |
H A D | mlme.c | 2906 pos = mgmt->u.auth.variable; in ieee80211_auth_challenge() 2937 /* move station state to auth */ in ieee80211_mark_sta_auth() 2946 sdata_info(sdata, "failed moving %pM to auth\n", bssid); in ieee80211_mark_sta_auth() 2980 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); in ieee80211_rx_mgmt_auth() 2981 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); in ieee80211_rx_mgmt_auth() 2982 status_code = le16_to_cpu(mgmt->u.auth.status_code); in ieee80211_rx_mgmt_auth() 3040 WARN_ONCE(1, "invalid auth alg %d", in ieee80211_rx_mgmt_auth() 4412 sdata_info(sdata, "send auth to %pM (try %d/%d)\n", in ieee80211_auth() 4551 * userspace didn't do it, so kill the auth data in ieee80211_sta_work() 4754 * auth (no in ieee80211_mgd_quiesce() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ctrl_iface.c | 1782 ap.auth = new_auth; in wpa_supplicant_ctrl_iface_wps_reg() 1929 ap.auth = new_auth; in wpa_supplicant_ctrl_iface_wps_er_config() 2361 MAC2STR(wpa_s->bssid), "(auth)", in wpa_supplicant_ctrl_iface_status() 4214 if (capa->auth & (WPA_DRIVER_AUTH_OPEN)) { in ctrl_iface_get_capability_auth_alg() 4222 if (capa->auth & (WPA_DRIVER_AUTH_SHARED)) { in ctrl_iface_get_capability_auth_alg() 4230 if (capa->auth & (WPA_DRIVER_AUTH_LEAP)) { in ctrl_iface_get_capability_auth_alg() 5688 int auth; in p2p_ctrl_connect() local 5708 * [join] [auth] [go_intent=<0..15>] [freq=<in MHz>] [provdisc] in p2p_ctrl_connect() 5734 auth = os_strstr(pos, " auth") ! in p2p_ctrl_connect() [all...] |
H A D | events.c | 3985 /* Restart auth timeout: CAC time added to initial timeout */ in wpas_event_dfs_cac_started() 4000 /* Restart auth timeout with original value after CAC is in wpas_event_dfs_cac_finished() 4016 /* Restart auth timeout with original value after CAC is in wpas_event_dfs_cac_aborted() 4248 if (!wpas_fst_update_mbie(wpa_s, data->auth.ies, in wpa_supplicant_event() 4249 data->auth.ies_len)) in wpa_supplicant_event() 4251 "FST: MB IEs updated from auth IE"); in wpa_supplicant_event() 4254 wpa_s->auth_status_code = data->auth.status_code; in wpa_supplicant_event()
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | sm_make_chunk.c | 109 if (chunk->auth) { in sctp_control_set_owner_w() 1420 retval->auth = 1; in _sctp_make_chunk()
|
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | hci_conn.c | 2423 goto auth; in hci_conn_security() 2461 auth: in hci_conn_security()
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | sm_make_chunk.c | 109 if (chunk->auth) { in sctp_control_set_owner_w() 1465 retval->auth = 1; in _sctp_make_chunk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211_capa.c | 1403 drv->capa.auth = WPA_DRIVER_AUTH_OPEN | in wpa_driver_nl80211_capa() 1471 "nl80211: key_mgmt=0x%x enc=0x%x auth=0x%x flags=0x%llx rrm_flags=0x%x probe_resp_offloads=0x%x max_stations=%u max_remain_on_chan=%u max_scan_ssids=%d", in wpa_driver_nl80211_capa() 1472 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth, in wpa_driver_nl80211_capa()
|
/kernel/linux/linux-5.10/drivers/net/hyperv/ |
H A D | hyperv_net.h | 1368 u32 auth; member
|
/kernel/linux/linux-5.10/net/wireless/ |
H A D | core.c | 409 WARN_ON(ops->auth && (!ops->assoc || !ops->deauth || !ops->disassoc)); in wiphy_new_nm()
|
/kernel/linux/linux-5.10/fs/ceph/ |
H A D | super.c | 27 #include <linux/ceph/auth.h>
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | nfs4client.c | 10 #include <linux/sunrpc/auth.h> 47 * Per auth flavor data server rpc clients 57 * @flavor: rpc auth flavour to match 128 * Find or create a DS rpc client with th MDS server rpc client auth flavor 1107 /* Use the first specified auth flavor. If this flavor isn't in nfs4_init_server()
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | nfs4client.c | 10 #include <linux/sunrpc/auth.h> 48 * Per auth flavor data server rpc clients 58 * @flavor: rpc auth flavour to match 129 * Find or create a DS rpc client with th MDS server rpc client auth flavor 1162 /* Use the first specified auth flavor. If this flavor isn't in nfs4_init_server()
|
/kernel/linux/linux-6.6/fs/ceph/ |
H A D | super.c | 28 #include <linux/ceph/auth.h>
|
/kernel/linux/linux-6.6/drivers/net/hyperv/ |
H A D | hyperv_net.h | 1487 u32 auth; member
|
/kernel/linux/linux-6.6/drivers/nvme/host/ |
H A D | auth.c | 14 #include <linux/nvme-auth.h> 1015 nvme_auth_wq = alloc_workqueue("nvme-auth-wq", in nvme_init_auth()
|
/kernel/linux/linux-6.6/net/ipv4/ |
H A D | esp4.c | 1117 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc()
|
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | esp6.c | 1160 if (aalg_desc->uinfo.auth.icv_fullbits / 8 != in esp_init_authenc()
|
/third_party/node/lib/internal/ |
H A D | url.js | 1415 options.auth = `${decodeURIComponent(username)}:${decodeURIComponent(password)}`;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | ieee802_11_defs.h | 872 } STRUCT_PACKED auth; member
|
/kernel/linux/linux-5.10/drivers/gpu/drm/radeon/ |
H A D | r100.c | 1367 const unsigned *auth, unsigned n, in r100_cs_parse_packet0() 1393 if (auth[j] & m) { in r100_cs_parse_packet0() 1400 if (!(auth[j] & m)) { in r100_cs_parse_packet0() 1365 r100_cs_parse_packet0(struct radeon_cs_parser *p, struct radeon_cs_packet *pkt, const unsigned *auth, unsigned n, radeon_packet0_check_t check) r100_cs_parse_packet0() argument
|
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | hci_core.c | 1010 __u8 auth = opt; in hci_auth_req() local 1012 BT_DBG("%s %x", req->hdev->name, auth); in hci_auth_req() 1015 hci_req_add(req, HCI_OP_WRITE_AUTH_ENABLE, 1, &auth); in hci_auth_req()
|
/kernel/linux/linux-6.6/drivers/gpu/drm/radeon/ |
H A D | r100.c | 1375 const unsigned *auth, unsigned n, in r100_cs_parse_packet0() 1401 if (auth[j] & m) { in r100_cs_parse_packet0() 1408 if (!(auth[j] & m)) { in r100_cs_parse_packet0() 1373 r100_cs_parse_packet0(struct radeon_cs_parser *p, struct radeon_cs_packet *pkt, const unsigned *auth, unsigned n, radeon_packet0_check_t check) r100_cs_parse_packet0() argument
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | util.c | 1853 mgmt->u.auth.auth_alg = cpu_to_le16(auth_alg); in ieee80211_send_auth() 1854 mgmt->u.auth.auth_transaction = cpu_to_le16(transaction); in ieee80211_send_auth() 1855 mgmt->u.auth.status_code = cpu_to_le16(status); in ieee80211_send_auth()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 1964 const char *skcipher = NULL, *digest = NULL, *kx = NULL, *auth = NULL; in cipher_to_dict() local 1985 auth = nid != NID_undef ? OBJ_nid2ln(nid) : NULL; in cipher_to_dict() 2001 "auth", auth in cipher_to_dict() 2782 "Post-handshake auth is not supported by your " in _ssl__SSLSocket_verify_client_post_handshake_impl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | ap_ctrl_iface.c | 503 char *ssid, *auth, *encr = NULL, *key = NULL; in hostapd_ctrl_iface_wps_config() local 511 auth = pos; in hostapd_ctrl_iface_wps_config() 523 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key); in hostapd_ctrl_iface_wps_config() 630 /* <STA MAC Addr> <Code(0/1)> <Re-auth-Delay(sec)> [URL] */ in hostapd_ctrl_iface_hs20_deauth_req()
|