Searched refs:auth (Results 151 - 171 of 171) sorted by relevance

1234567

/linux-master/include/net/
H A Dxfrm.h1473 struct xfrm_algo_auth_info auth; member in union:xfrm_algo_desc::__anon2578
H A Dcfg80211.h1240 * @control_port_no_preauth: disables pre-auth rx over the nl80211 control
3849 * Commonly used across the external auth request and event interfaces.
4252 * validated in cfg80211, in particular the auth/assoc/authorized flags
4304 * @auth: Request to authenticate with the specified peer
4691 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member in struct:cfg80211_ops
4961 * auth frames to userspace. See @NL80211_MESH_SETUP_USERSPACE_AUTH.
7405 * After being asked to authenticate via cfg80211_ops::auth() the driver must
/linux-master/drivers/nvme/target/
H A Dconfigfs.c16 #include <linux/nvme-auth.h>
/linux-master/drivers/net/wireless/ath/ath6kl/
H A Dwmi.c877 "%s: aid %u mac_addr %pM auth=%u keymgmt=%u cipher=%u apsd_info=%u (STA connected)\n",
880 ev->u.ap_sta.auth,
889 ev->u.ap_sta.auth, ev->assoc_req_len,
1861 "type %d dot11_auth %d auth %d pairwise %d group %d\n",
/linux-master/net/sctp/
H A Dsm_make_chunk.c109 if (chunk->auth) {
1465 retval->auth = 1;
/linux-master/tools/testing/selftests/net/
H A Dipsec.c833 struct xfrm_algo_auth auth; member in union:__anon232::__anon233
/linux-master/tools/testing/ktest/
H A Dktest.pl431 POWER_CYCLE = wget --no-proxy -O /dev/null -q --auth-no-challenge 'http://admin:admin\@power/outlet?5=CCL'
/linux-master/net/mac80211/
H A Dmlme.c3798 pos = mgmt->u.auth.variable;
3830 /* move station state to auth */
3837 sdata_info(sdata, "failed moving %pM to auth\n", ap_addr);
3868 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg);
3869 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction);
3870 status_code = le16_to_cpu(mgmt->u.auth.status_code);
3928 WARN_ONCE(1, "invalid auth alg %d",
6989 sdata_info(sdata, "send auth to %pM (try %d/%d)\n",
7141 * userspace didn't do it, so kill the auth data
7348 * auth (no
[all...]
H A Dcfg.c1947 /* auth flags will be set later for TDLS,
5101 .auth = ieee80211_auth,
/linux-master/drivers/net/wireless/ath/ath10k/
H A Dwmi.c1642 .auth = WMI_PEER_AUTH,
1662 .auth = WMI_10X_PEER_AUTH,
1680 .auth = WMI_10_2_PEER_AUTH,
H A Dwmi.h6366 u32 auth; member in struct:wmi_peer_flags_map
H A Dwmi-tlv.c4612 .auth = WMI_TLV_PEER_AUTH,
H A Dmac.c2173 arg->peer_flags |= arvif->ar->wmi.peer_flags->auth;
/linux-master/fs/nfs/
H A Dnfs4proc.c4150 struct rpc_auth *auth; local
4152 auth = rpcauth_create(&auth_args, server->client);
4153 if (IS_ERR(auth))
4204 * with a gss auth flavor, but rpc.gssd isn't running. Either way,
4218 * @auth_probe: probe the auth flavours
6495 dprintk("NFS call setclientid auth=%s, '%s'\n",
6533 dprintk("NFS call setclientid_confirm auth=%s, (client ID %llx)\n",
8916 * Will attempt to negotiate SP4_MACH_CRED if krb5i / krb5p auth is used.
/linux-master/fs/ceph/
H A Dinode.c385 int mds = le32_to_cpu(dirinfo->auth);
1129 /* only update max_size on auth cap */
1139 * the inode info is from auth mds */
2839 * If any 'x' caps is issued we can just choose the auth MDS
2843 * any replica MDS it must auth pin and tries to rdlock from
2844 * the auth MDS, and then the auth MDS need to do the Locker
2852 * auth MDS, because the MDS side code is buggy due to setxattr
/linux-master/net/key/
H A Daf_key.c962 /* auth key */
1188 x->aalg->alg_trunc_len = a->uinfo.auth.icv_truncbits;
/linux-master/include/linux/
H A Dieee80211.h1304 } __packed auth; member in union:ieee80211_mgmt::__anon1967
/linux-master/drivers/net/wireless/broadcom/brcm80211/brcmfmac/
H A Dcfg80211.c1991 brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type);
1995 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
1997 bphy_err(drvr, "set auth failed (%d)\n", err);
2204 /* Skip auth key management suite(s) */
2290 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
2292 bphy_err(drvr, "set auth failed (%d)\n", err);
4476 /* set auth */
4477 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
4479 bphy_err(drvr, "auth error %d\n", err);
4488 /* set upper-layer auth */
4516 u32 auth = 0; /* d11 open authentication */ local
[all...]
/linux-master/drivers/nvme/host/
H A Dcore.c28 #include <linux/nvme-auth.h>
/linux-master/net/wireless/
H A Dnl80211.c2082 CMD(auth, AUTHENTICATE);
2126 if (rdev->ops->connect || rdev->ops->auth) {
7547 * !NL80211_FEATURE_FULL_AP_CLIENT_STATE, will not set the auth
10664 if (!rdev->ops->auth)
10713 * Since we no longer track auth state, ignore
12021 "external auth requires connection ownership");
/linux-master/drivers/s390/block/
H A Ddasd_eckd.c329 data->mask.auth = 0x1;

Completed in 653 milliseconds

1234567