/linux-master/include/net/ |
H A D | xfrm.h | 1473 struct xfrm_algo_auth_info auth; member in union:xfrm_algo_desc::__anon2578
|
H A D | cfg80211.h | 1240 * @control_port_no_preauth: disables pre-auth rx over the nl80211 control 3849 * Commonly used across the external auth request and event interfaces. 4252 * validated in cfg80211, in particular the auth/assoc/authorized flags 4304 * @auth: Request to authenticate with the specified peer 4691 int (*auth)(struct wiphy *wiphy, struct net_device *dev, member in struct:cfg80211_ops 4961 * auth frames to userspace. See @NL80211_MESH_SETUP_USERSPACE_AUTH. 7405 * After being asked to authenticate via cfg80211_ops::auth() the driver must
|
/linux-master/drivers/nvme/target/ |
H A D | configfs.c | 16 #include <linux/nvme-auth.h>
|
/linux-master/drivers/net/wireless/ath/ath6kl/ |
H A D | wmi.c | 877 "%s: aid %u mac_addr %pM auth=%u keymgmt=%u cipher=%u apsd_info=%u (STA connected)\n", 880 ev->u.ap_sta.auth, 889 ev->u.ap_sta.auth, ev->assoc_req_len, 1861 "type %d dot11_auth %d auth %d pairwise %d group %d\n",
|
/linux-master/net/sctp/ |
H A D | sm_make_chunk.c | 109 if (chunk->auth) { 1465 retval->auth = 1;
|
/linux-master/tools/testing/selftests/net/ |
H A D | ipsec.c | 833 struct xfrm_algo_auth auth; member in union:__anon232::__anon233
|
/linux-master/tools/testing/ktest/ |
H A D | ktest.pl | 431 POWER_CYCLE = wget --no-proxy -O /dev/null -q --auth-no-challenge 'http://admin:admin\@power/outlet?5=CCL'
|
/linux-master/net/mac80211/ |
H A D | mlme.c | 3798 pos = mgmt->u.auth.variable; 3830 /* move station state to auth */ 3837 sdata_info(sdata, "failed moving %pM to auth\n", ap_addr); 3868 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg); 3869 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction); 3870 status_code = le16_to_cpu(mgmt->u.auth.status_code); 3928 WARN_ONCE(1, "invalid auth alg %d", 6989 sdata_info(sdata, "send auth to %pM (try %d/%d)\n", 7141 * userspace didn't do it, so kill the auth data 7348 * auth (no [all...] |
H A D | cfg.c | 1947 /* auth flags will be set later for TDLS, 5101 .auth = ieee80211_auth,
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | wmi.c | 1642 .auth = WMI_PEER_AUTH, 1662 .auth = WMI_10X_PEER_AUTH, 1680 .auth = WMI_10_2_PEER_AUTH,
|
H A D | wmi.h | 6366 u32 auth; member in struct:wmi_peer_flags_map
|
H A D | wmi-tlv.c | 4612 .auth = WMI_TLV_PEER_AUTH,
|
H A D | mac.c | 2173 arg->peer_flags |= arvif->ar->wmi.peer_flags->auth;
|
/linux-master/fs/nfs/ |
H A D | nfs4proc.c | 4150 struct rpc_auth *auth; local 4152 auth = rpcauth_create(&auth_args, server->client); 4153 if (IS_ERR(auth)) 4204 * with a gss auth flavor, but rpc.gssd isn't running. Either way, 4218 * @auth_probe: probe the auth flavours 6495 dprintk("NFS call setclientid auth=%s, '%s'\n", 6533 dprintk("NFS call setclientid_confirm auth=%s, (client ID %llx)\n", 8916 * Will attempt to negotiate SP4_MACH_CRED if krb5i / krb5p auth is used.
|
/linux-master/fs/ceph/ |
H A D | inode.c | 385 int mds = le32_to_cpu(dirinfo->auth); 1129 /* only update max_size on auth cap */ 1139 * the inode info is from auth mds */ 2839 * If any 'x' caps is issued we can just choose the auth MDS 2843 * any replica MDS it must auth pin and tries to rdlock from 2844 * the auth MDS, and then the auth MDS need to do the Locker 2852 * auth MDS, because the MDS side code is buggy due to setxattr
|
/linux-master/net/key/ |
H A D | af_key.c | 962 /* auth key */ 1188 x->aalg->alg_trunc_len = a->uinfo.auth.icv_truncbits;
|
/linux-master/include/linux/ |
H A D | ieee80211.h | 1304 } __packed auth; member in union:ieee80211_mgmt::__anon1967
|
/linux-master/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | cfg80211.c | 1991 brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type); 1995 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 1997 bphy_err(drvr, "set auth failed (%d)\n", err); 2204 /* Skip auth key management suite(s) */ 2290 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 2292 bphy_err(drvr, "set auth failed (%d)\n", err); 4476 /* set auth */ 4477 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0); 4479 bphy_err(drvr, "auth error %d\n", err); 4488 /* set upper-layer auth */ 4516 u32 auth = 0; /* d11 open authentication */ local [all...] |
/linux-master/drivers/nvme/host/ |
H A D | core.c | 28 #include <linux/nvme-auth.h>
|
/linux-master/net/wireless/ |
H A D | nl80211.c | 2082 CMD(auth, AUTHENTICATE); 2126 if (rdev->ops->connect || rdev->ops->auth) { 7547 * !NL80211_FEATURE_FULL_AP_CLIENT_STATE, will not set the auth 10664 if (!rdev->ops->auth) 10713 * Since we no longer track auth state, ignore 12021 "external auth requires connection ownership");
|
/linux-master/drivers/s390/block/ |
H A D | dasd_eckd.c | 329 data->mask.auth = 0x1;
|