/linux-master/Documentation/networking/ |
H A D | mac80211-auth-assoc-deauth.txt | 65 mac80211->driver: sta_state(AP, authorized) 80 userspace->mac80211: authorized 81 mac80211->driver: sta_state(AP, authorized)
|
/linux-master/drivers/usb/core/ |
H A D | generic.c | 249 if (udev->authorized == 0) 250 dev_err(&udev->dev, "Device is not authorized for usage\n");
|
H A D | message.c | 1794 if (intf->authorized) { 1796 intf->authorized = 0; 1814 if (!intf->authorized) { 1816 intf->authorized = 1; /* authorize interface */ 1979 * Note that a non-authorized device (dev->authorized == 0) will only 2004 if (dev->authorized == 0 || configuration == -1) 2111 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd);
|
H A D | sysfs.c | 725 /* show if the device is authorized (1) or not (0) */ 730 return sysfs_emit(buf, "%u\n", usb_dev->authorized); 754 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 999 * for initializing the authorized attribute of interfaces 1015 * for initializing the authorized attribute of interfaces 1202 * 1 is authorized, 0 is deauthorized 1209 return sysfs_emit(buf, "%u\n", intf->authorized); 1242 __ATTR(authorized, S_IRUGO | S_IWUSR,
|
H A D | driver.c | 337 if (udev->authorized == 0) { 338 dev_err(&intf->dev, "Device is not authorized for usage\n"); 340 } else if (intf->authorized == 0) { 341 dev_err(&intf->dev, "Interface %d is not authorized for usage\n", 551 /* reject claim if interface is not authorized */ 552 if (!iface->authorized)
|
H A D | usb.c | 741 dev->authorized = usb_dev_authorized(dev, usb_hcd);
|
H A D | hub.c | 2472 * If the device is WUSB and not authorized, we don't attempt to read 2474 * until it has been authorized. 2710 if (usb_dev->authorized == 0) 2713 usb_dev->authorized = 0; 2727 if (usb_dev->authorized == 1) 2737 usb_dev->authorized = 1; 2751 dev_info(&usb_dev->dev, "authorized to connect\n");
|
/linux-master/drivers/thunderbolt/ |
H A D | icm.c | 728 bool authorized = false; local 739 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; 768 !!sw->authorized == authorized) { 849 sw->authorized = authorized; 1203 bool authorized, boot, dual_lane, speed_gen3; local 1220 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; 1236 if (tb_route(sw) == route && !!sw->authorized == authorized) { [all...] |
H A D | domain.c | 654 /* The parent switch must be authorized before this one */ 656 if (!parent_sw || !parent_sw->authorized) 681 /* The parent switch must be authorized before this one */ 683 if (!parent_sw || !parent_sw->authorized) 718 /* The parent switch must be authorized before this one */ 720 if (!parent_sw || !parent_sw->authorized)
|
H A D | switch.c | 1751 return sysfs_emit(buf, "%u\n", sw->authorized); 1760 if (sw && sw->authorized) { 1772 sw->authorized = 0; 1788 if (!!sw->authorized == !!val) 1819 sw->authorized = val; 1822 * value of /sys/bus/thunderbolt/devices/.../authorized. 1824 sprintf(envp_string, "AUTHORIZED=%u", sw->authorized); 1854 static DEVICE_ATTR_RW(authorized); 1926 if (sw->authorized) { 2497 /* Root switch is always authorized */ [all...] |
H A D | tb.c | 1293 * tunnels and know which switches were authorized already by 2351 } else if (!port->port && sw->authorized) { 2790 * boot firmware, mark it as authorized now before we 2794 sw->authorized = 1;
|
H A D | tb.h | 142 * @boot: Whether the switch was already authorized on boot or not 144 * @authorized: Whether the switch is authorized by user or policy 198 unsigned int authorized; member in struct:tb_switch
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | mld-mac.c | 107 * We always want to hear MCAST frames, if we're not authorized yet, 121 if (!mvmvif->authorized &&
|
H A D | sta.h | 358 * @authorized: indicates station is authorized 411 bool authorized; member in struct:iwl_mvm_sta
|
H A D | rs-fw.c | 602 .max_ch_width = mvmsta->authorized ?
|
H A D | rx.c | 388 * before the managed vif is authorized, we'd fail anyway. 392 !mvmvif->authorized && 394 IWL_DEBUG_DROP(mvm, "MCAST before the vif is authorized\n");
|
H A D | mac80211.c | 3817 mvmvif->authorized = 1; 3822 /* when client is authorized (AP station marked as such), 3830 mvm_sta->authorized = true; 3832 /* MFP is set by default before the station is authorized. 3858 mvmsta->authorized = false; 3870 mvmvif->authorized = 0; 5310 /* must be associated client vif - ignore authorized */
|
H A D | mac-ctxt.c | 677 * We always want to hear MCAST frames, if we're not authorized yet, 703 if (!mvmvif->authorized &&
|
H A D | mvm.h | 369 * @authorized: indicates the AP station was set to authorized 400 u8 authorized:1; member in struct:iwl_mvm_vif
|
/linux-master/include/linux/ |
H A D | usb.h | 203 * @authorized: This allows to (de)authorize individual interfaces instead 264 unsigned authorized:1; /* used for interface authorization */ member in struct:usb_interface 607 * @authorized: policy has said we can use it; 609 * used or not. By default, wired USB devices are authorized. 691 unsigned authorized:1; member in struct:usb_device
|
/linux-master/net/mac80211/ |
H A D | tx.c | 2611 bool wme_sta = false, authorized = false; local 2647 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); 2844 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); 2863 !multicast && !authorized &&
|
H A D | mlme.c | 2412 bool authorized = false; local 2433 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); 2436 return authorized;
|