/linux/Documentation/arch/arm64/ |
H A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 16 The ARMv8.3 Pointer Authentication extension adds primitives that can be 20 The extension uses a Pointer Authentication Code (PAC) to determine 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 57 with HINT space pointer authentication instructions protecting 59 with or without pointer authentication support. 72 authentication is present, the kernel will expose the position of TTBR0 [all …]
|
/linux/include/crypto/ |
H A D | aead.h | 38 * crypto_aead_decrypt. That error indicates an authentication error, i.e. 49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size 50 * during encryption (resp. decryption). The authentication tag is generated 52 * decryption, the authentication tag is consumed along with the ciphertext and 83 * @assoclen: Length in bytes of associated data for authentication 106 * @maxauthsize: Set the maximum authentication tag size supported by the 108 * As the authentication tag is a message digest to ensure the 110 * largest authentication tag possible as defined by this 112 * @setauthsize: Set authentication size for the AEAD transformation. This 114 * authentication tag to be either generated by the transformation [all …]
|
/linux/Documentation/filesystems/ |
H A D | ubifs-authentication.rst | 3 .. UBIFS Authentication 8 UBIFS Authentication Support 33 can be used to get full data authentication at the block layer. 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 38 name encryption, the authentication system could be tied into fscrypt such that 40 be possible to use UBIFS authentication without using encryption. 206 UBIFS Authentication 209 This chapter introduces UBIFS authentication which enables UBIFS to verify 216 UBIFS authentication enables detection of offline data modification. While it 221 UBIFS authentication will not protect against rollback of full flash contents. [all …]
|
/linux/drivers/platform/x86/hp/hp-bioscfg/ |
H A D | spmobj-attributes.c | 36 * for authentication scheme 38 * @authentication: the authentication content 42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument 46 if (!authentication) in hp_calculate_security_buffer() 49 authlen = strlen(authentication); in hp_calculate_security_buffer() 54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer() 62 * authentication scheme 65 * @authentication: the authentication content 69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument 75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer() [all …]
|
H A D | bioscfg.h | 180 * 'role' identifies the type of authentication. 188 * 'mechanism' represents the means of authentication. 436 /* Password authentication attributes */ 452 int hp_populate_security_buffer(u16 *buffer, const char *authentication); 468 size_t hp_calculate_security_buffer(const char *authentication);
|
/linux/drivers/crypto/ |
H A D | sa2ul.h | 74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */ 108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */ 127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2 239 * @auth_size: Authentication size for pass 1 240 * @auth_size2: Authentication size for pass 2 241 * @auth_offset: Authentication payload offset 242 * @auth_iv: Authentication initialization vector 243 * @aux_key_info: Authentication aux key information 244 * @aux_key: Aux key for authentication 358 /* Authentication algorithms */ [all …]
|
/linux/include/linux/sunrpc/ |
H A D | svcauth.h | 5 * RPC server-side authentication stuff. 60 /* Authentication is done in the context of a domain. 66 * a common mechanism for authentication and having a common mapping 72 * A domain is created by an authentication flavour module based on name 101 * Each authentication flavour registers an auth_ops 107 * If there is a problem with the authentication *authp should be set.
|
H A D | auth.h | 5 * Declarations for the RPC client authentication machinery. 23 * Maximum size of AUTH_NONE authentication information, in XDR words. 69 * Client authentication handle 105 * Client authentication ops
|
/linux/Documentation/crypto/ |
H A D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 394 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 395 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
/linux/drivers/target/iscsi/ |
H A D | iscsi_target_tpg.c | 78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg() 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 311 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group() 318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 588 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication() 589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 600 if (authentication) { in iscsit_ta_authentication() [all …]
|
/linux/drivers/staging/greybus/Documentation/firmware/ |
H A D | firmware-management | 40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4 183 Sysfs Interfaces - Authentication 186 The Component Authentication Protocol interacts with Userspace using the 196 authentication a of particular interface. 198 The Authentication core creates a device of class 'gb_authenticate', which shall 237 /* Authentication types */ 291 Authentication. The user is required to fill the 'certificate_class' and 333 component authentication protocol.
|
/linux/include/uapi/linux/ |
H A D | psp-dbc.h | 26 * 0: no authentication, PSP will return single use nonce. 27 * 1: authentication: PSP will return multi-use nonce. 28 * @nonce: 8 byte value used for future authentication (output). 88 * If a nonce is fetched without authentication it can only 90 * If a nonce is fetched with authentication it can be used
|
/linux/Documentation/networking/ |
H A D | tls-offload.rst | 54 On the receive side, if the device handled decryption and authentication 134 * crypto processing state (partial blocks, partial authentication tag, etc.) 141 crypto operations and authentication regardless of segmentation. For this 147 * partial authentication tag (all data had been seen but part of the 148 authentication tag has to be written or read from the subsequent segment) 157 The kernel stack performs record framing reserving space for the authentication 168 The device performs encryption and authentication of the record data. 169 It replaces the authentication tag and TCP checksum with correct values. 181 (record delineation, decryption, authentication for each record in the packet). 222 data (to be able to insert the authentication tag) and move onto handling [all …]
|
H A D | tls-handshake.rst | 12 addition to peer authentication. 84 Authentication material such as x.509 certificates, private certificate 126 during this type of handshake. Only server authentication (ie the client 188 | | authentication failed | 194 | -ENOKEY | Missing authentication material |
|
/linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp.c | 55 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp1() 75 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp2() 228 /* stop callback and watchdog requests from previous authentication*/ in reset_authentication() 348 /* reset existing authentication status */ in mod_hdcp_add_display() 367 /* request authentication */ in mod_hdcp_add_display() 394 /* stop current authentication */ in mod_hdcp_remove_display() 411 /* request authentication when connection is not reset */ in mod_hdcp_remove_display() 458 /* stop current authentication */ in mod_hdcp_update_display() 473 /* request authentication when connection is not reset */ in mod_hdcp_update_display() 560 /* reset authentication if needed */ in mod_hdcp_process_event()
|
/linux/drivers/platform/x86/intel/ifs/ |
H A D | load.c | 53 [2] = "Chunk authentication error. The hash of chunk did not match expected value", 56 [5] = "Authentication flow interrupted", 103 dev_err(dev, "invalid error code 0x%x for authentication\n", err_code); in auth_err_message() 105 dev_err(dev, "Chunk authentication error : %s\n", in auth_err_message() 113 * for scan hash copy and test chunk authentication. 147 /* scan data authentication and copy chunks to secured memory */ in copy_hashes_authenticate_chunks() 232 /* scan data authentication and copy chunks to secured memory */ in copy_hashes_authenticate_chunks_gen2() 321 * and proceed the authentication for the next chunk.
|
/linux/Documentation/filesystems/nfs/ |
H A D | rpc-server-gss.rst | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS 9 purposes of authentication.) 23 The RPCGSS Authentication method describes a way to perform GSSAPI 24 Authentication for NFS. Although GSSAPI is itself completely mechanism
|
/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | adf_gen4_tl.c | 72 /* Wireless Authentication slice utilization. */ 80 /* Authentication slice utilization. */ 94 /* Wireless Authentication slice execution count. */ 102 /* Authentication slice execution count. */
|
/linux/fs/ubifs/ |
H A D | auth.c | 9 * This file implements various helper functions for UBIFS authentication support 52 * ubifs_prepare_auth_node - Prepare an authentication node 57 * This function prepares an authentication node for writing onto flash. 159 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a 250 * ubifs_init_authentication - initialize UBIFS authentication support 263 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication() 363 * This function releases the authentication related resources.
|
/linux/Documentation/security/keys/ |
H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
/linux/arch/s390/include/asm/ |
H A D | cpacf.h | 121 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 165 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) 174 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction 189 * Function codes for KDSA (COMPUTE DIGITAL SIGNATURE AUTHENTICATION) 372 * cpacf_qai() - Get the query authentication information for a CPACF opcode 376 * Executes the query authentication information function for the given crypto 379 * On success 1 is returned and the mask is filled with the query authentication 508 * _cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 539 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 687 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
|
/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_huc.c | 28 * triggering its security authentication. This is done differently depending 32 * and the authentication via GuC 33 * - DG2: load and authentication are both performed via GSC. 35 * not-DG2 older platforms), while the authentication is done in 2-steps, 39 * On platforms where the GuC does the authentication, to correctly do so the 466 * minimum frequency, the authentication time can be in the seconds range. in intel_huc_wait_for_auth_complete() 519 * @type: authentication type (via GuC or via GSC) 561 /* Check authentication status, it should be done by now */ in intel_huc_auth() 569 huc_probe_error(huc, "%s authentication failed %pe\n", in intel_huc_auth()
|
/linux/drivers/gpu/drm/bridge/cadence/ |
H A D | cdns-mhdp8546-hdcp.c | 304 dev_dbg(mhdp->dev, "Authentication completed successfully!\n"); in cdns_mhdp_hdcp_auth_check() 308 dev_dbg(mhdp->dev, "Authentication failed\n"); in cdns_mhdp_hdcp_auth_check() 339 dev_dbg(mhdp->dev, "HDCP: Start 2.2 Authentication\n"); in cdns_mhdp_hdcp_auth_22() 363 dev_dbg(mhdp->dev, "HDCP: Starting 1.4 Authentication\n"); in cdns_mhdp_hdcp_auth_14() 427 dev_err(mhdp->dev, "HDCP authentication failed (%d tries/%d)\n", in _cdns_mhdp_hdcp_enable() 447 "[%s:%d] HDCP link failed, retrying authentication\n", in cdns_mhdp_hdcp_check_link()
|
/linux/include/drm/ |
H A D | drm_file.h | 171 * See also the :ref:`section on primary nodes and authentication 226 * See also the :ref:`section on primary nodes and authentication 263 * See also @authentication and @is_master and the :ref:`section on 264 * primary nodes and authentication <drm_primary_node>`. 284 /** @magic: Authentication magic, see @authenticated. */ 412 * See also the :ref:`section on primary nodes and authentication
|
/linux/drivers/staging/greybus/ |
H A D | greybus_authentication.h | 3 * Greybus Component Authentication User Header 32 /* Authentication types */
|