/openbmc/linux/drivers/platform/x86/dell/dell-wmi-sysman/ |
H A D | sysman.c | 95 u32 *sectype = (u32 *) buffer; in populate_security_buffer() local 96 u32 *seclen = sectype + 1; in populate_security_buffer() 98 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
|
/openbmc/linux/fs/smb/client/ |
H A D | fs_context.c | 211 ctx->sectype = Unspecified; in cifs_parse_security_flavors() 222 ctx->sectype = Kerberos; in cifs_parse_security_flavors() 228 ctx->sectype = RawNTLMSSP; in cifs_parse_security_flavors() 234 ctx->sectype = NTLMv2; in cifs_parse_security_flavors() 824 if (new_ctx->sectype != old_ctx->sectype) { in smb3_verify_reconfigure_ctx() 848 } else if (old_ctx->sectype == Kerberos) { in smb3_verify_reconfigure_ctx()
|
H A D | fs_context.h | 200 enum securityEnum sectype; /* sectype requested via mnt opts */ member
|
H A D | connect.c | 1510 if (server->ops->select_sectype(server, ctx->sectype) in match_security() 1887 if (ctx->sectype != Unspecified && in match_session() 1888 ctx->sectype != ses->sectype) in match_session() 1901 switch (ses->sectype) { in match_session() 2395 ses->sectype = ctx->sectype; in cifs_get_smb_ses() 4094 ctx->sectype = ses->sectype; in cifs_set_vol_auth() 4097 if (ctx->sectype == Kerberos) in cifs_set_vol_auth() 4131 ctx->sectype = master_tcon->ses->sectype; in __cifs_construct_tcon()
|
H A D | cifsglob.h | 1085 enum securityEnum sectype; /* what security flavor was specified? */ member 2150 static inline char *get_security_type_str(enum securityEnum sectype) in get_security_type_str() argument 2152 switch (sectype) { in get_security_type_str()
|
H A D | sess.c | 562 ctx->sectype = ses->sectype; in cifs_ses_add_channel() 1965 type = cifs_select_sectype(server, ses->sectype); in select_sec()
|
H A D | cifsfs.c | 475 if (ses->sectype == Unspecified) { in cifs_show_security() 483 switch (ses->sectype) { in cifs_show_security() 502 if (ses->sectype == Kerberos) in cifs_show_security()
|
H A D | cifs_swn.c | 141 authtype = cifs_select_sectype(swnreg->tcon->ses->server, swnreg->tcon->ses->sectype); in cifs_swn_send_register_message()
|
H A D | cifs_debug.c | 518 get_security_type_str(server->ops->select_sectype(server, ses->sectype))); in cifs_debug_data_proc_show()
|
H A D | cifssmb.c | 385 should_set_ext_sec_flag(enum securityEnum sectype) in should_set_ext_sec_flag() argument 387 switch (sectype) { in should_set_ext_sec_flag() 426 if (should_set_ext_sec_flag(ses->sectype)) { in CIFSSMBNegotiate()
|
H A D | smb2pdu.c | 1882 type = smb2_select_sectype(server, ses->sectype); in SMB2_select_sec() 2093 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
/openbmc/linux/drivers/bluetooth/ |
H A D | btmtk.c | 38 __le32 sectype; member 48 __le32 sectype; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
H A D | trx.h | 433 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
H A D | trx.h | 375 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
H A D | trx.h | 377 u32 sectype:2; member
|
/openbmc/linux/drivers/staging/rtl8723bs/hal/ |
H A D | rtl8723b_hal_init.c | 2529 u8 sectype = 0; in fill_txdesc_sectype() local 2537 sectype = 1; in fill_txdesc_sectype() 2541 sectype = 3; in fill_txdesc_sectype() 2549 return sectype; in fill_txdesc_sectype() 2624 ptxdesc->sectype = fill_txdesc_sectype(pattrib); in rtl8723b_fill_default_txdesc()
|
/openbmc/linux/drivers/staging/rtl8723bs/include/ |
H A D | rtl8723b_xmit.h | 84 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/ |
H A D | trx.h | 490 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
H A D | trx.h | 484 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
H A D | trx.h | 639 u32 sectype:2; member
|
/openbmc/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/ |
H A D | trx.h | 575 u32 sectype:2; member
|