Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 4 of 4) sorted by relevance

/net/bluetooth/
Dhci_event.c2661 u8 secure; in hci_pin_code_request_evt() local
2664 secure = 1; in hci_pin_code_request_evt()
2666 secure = 0; in hci_pin_code_request_evt()
2668 mgmt_pin_code_request(hdev, &ev->bdaddr, secure); in hci_pin_code_request_evt()
Dmgmt.c3669 int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure) in mgmt_pin_code_request() argument
3675 ev.secure = secure; in mgmt_pin_code_request()
/net/ipv4/
DKconfig320 tristate "Virtual (secure) IP: tunneling"
328 the notion of a secure tunnel for IPSEC and then use routing protocol
/net/
DKconfig125 a "proxy-based" one, is more secure but more intrusive and more