Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 295) sorted by relevance

12345678910>>...12

/linux/Documentation/arch/arm64/
H A Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
16 The ARMv8.3 Pointer Authentication extension adds primitives that can be
20 The extension uses a Pointer Authentication Code (PAC) to determine
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
[all …]
/linux/include/crypto/
H A Daead.h38 * crypto_aead_decrypt. That error indicates an authentication error, i.e.
49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size
50 * during encryption (resp. decryption). The authentication tag is generated
52 * decryption, the authentication tag is consumed along with the ciphertext and
83 * @assoclen: Length in bytes of associated data for authentication
106 * @maxauthsize: Set the maximum authentication tag size supported by the
108 * As the authentication tag is a message digest to ensure the
110 * largest authentication tag possible as defined by this
112 * @setauthsize: Set authentication size for the AEAD transformation. This
114 * authentication tag to be either generated by the transformation
[all …]
/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c36 * for authentication scheme
38 * @authentication: the authentication content
42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument
46 if (!authentication) in hp_calculate_security_buffer()
49 authlen = strlen(authentication); in hp_calculate_security_buffer()
54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer()
62 * authentication scheme
65 * @authentication: the authentication content
69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument
75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer()
[all …]
H A Dbioscfg.h181 * 'role' identifies the type of authentication.
189 * 'mechanism' represents the means of authentication.
438 /* Password authentication attributes */
454 int hp_populate_security_buffer(u16 *buffer, const char *authentication);
470 size_t hp_calculate_security_buffer(const char *authentication);
/linux/drivers/crypto/
H A Dsa2ul.h74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */
108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */
127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2
239 * @auth_size: Authentication size for pass 1
240 * @auth_size2: Authentication size for pass 2
241 * @auth_offset: Authentication payload offset
242 * @auth_iv: Authentication initialization vector
243 * @aux_key_info: Authentication aux key information
244 * @aux_key: Aux key for authentication
358 /* Authentication algorithms */
[all …]
/linux/drivers/platform/x86/dell/dell-wmi-sysman/
H A Dsysman.c70 * calculate_security_buffer() - determines size of security buffer for authentication scheme
71 * @authentication: the authentication content
75 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument
77 if (strlen(authentication) > 0) { in calculate_security_buffer()
78 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer()
79 strlen(authentication) % 2; in calculate_security_buffer()
85 * populate_security_buffer() - builds a security buffer for authentication scheme
87 * @authentication: the authentication content
91 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument
97 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
[all …]
/linux/drivers/misc/mei/
H A Dmei_lb.c37 * All payloads are signed and verified by the authentication firmware.
55 * authentication firmware.
56 * 3. Authentication firmware authenticates the payload and extracts
58 * 4. Authentication firmware delivers the configuration to PUnit/PCODE.
72 * @flags: Flags to be passed to the authentication firmware (e.g. %INTEL_LB_FLAGS_IS_PERSISTENT)
73 * @reserved: Reserved for future use by authentication firmware, must be set to 0
75 * @payload: Payload data to be sent to the authentication firmware
90 * @reserved: Reserved for future use by authentication firmware, must be set to 0
91 * @status: Status returned by authentication firmware (see &enum intel_lb_status)
/linux/include/linux/sunrpc/
H A Dsvcauth.h5 * RPC server-side authentication stuff.
60 /* Authentication is done in the context of a domain.
66 * a common mechanism for authentication and having a common mapping
72 * A domain is created by an authentication flavour module based on name
100 * Each authentication flavour registers an auth_ops
106 * If there is a problem with the authentication *authp should be set.
H A Dauth.h5 * Declarations for the RPC client authentication machinery.
23 * Maximum size of AUTH_NONE authentication information, in XDR words.
69 * Client authentication handle
105 * Client authentication ops
/linux/Documentation/crypto/
H A Duserspace-if.rst213 system call family, the consumer must set the authentication tag size.
214 To set the authentication tag size, the caller must use the setsockopt
235 - specification of the associated authentication data (AAD) with the
265 - associated authentication data (AAD)
267 - authentication tag
269 The sizes of the AAD and the authentication tag are provided with the
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
393 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
394 AEAD ciphers. For a encryption operation, the authentication tag of
[all …]
/linux/drivers/target/iscsi/
H A Discsi_target_tpg.c78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg()
90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
311 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group()
318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
588 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication()
589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
600 if (authentication) { in iscsit_ta_authentication()
[all …]
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dfirmware-management40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4
183 Sysfs Interfaces - Authentication
186 The Component Authentication Protocol interacts with Userspace using the
196 authentication a of particular interface.
198 The Authentication core creates a device of class 'gb_authenticate', which shall
237 /* Authentication types */
291 Authentication. The user is required to fill the 'certificate_class' and
333 component authentication protocol.
/linux/include/uapi/linux/
H A Dpsp-dbc.h26 * 0: no authentication, PSP will return single use nonce.
27 * 1: authentication: PSP will return multi-use nonce.
28 * @nonce: 8 byte value used for future authentication (output).
88 * If a nonce is fetched without authentication it can only
90 * If a nonce is fetched with authentication it can be used
H A Dnl80211.h186 * preshared key authentication in station mode. In %NL80211_CMD_CONNECT
194 * handshakes during 802.1X authentication in station mode. In order to
202 * preshared key authentication in AP mode. In %NL80211_CMD_START_AP
214 * DOC: FILS shared key authentication offload
216 * FILS shared key authentication offload can be advertised by drivers by
218 * FILS shared key authentication offload should be able to construct the
219 * authentication and association frames for FILS shared key authentication and
227 * rIK should be used to generate an authentication tag on the ERP message and
232 * When FILS shared key authentication i
[all...]
/linux/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst6 implement RPCGSS authentication in kernel RPC servers such as the NFS
9 purposes of authentication.)
23 The RPCGSS Authentication method describes a way to perform GSSAPI
24 Authentication for NFS. Although GSSAPI is itself completely mechanism
/linux/drivers/crypto/intel/qat/qat_common/
H A Dadf_gen4_tl.c72 /* Wireless Authentication slice utilization. */
80 /* Authentication slice utilization. */
94 /* Wireless Authentication slice execution count. */
102 /* Authentication slice execution count. */
/linux/fs/ubifs/
H A Dauth.c9 * This file implements various helper functions for UBIFS authentication support
52 * ubifs_prepare_auth_node - Prepare an authentication node
57 * This function prepares an authentication node for writing onto flash.
159 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a
250 * ubifs_init_authentication - initialize UBIFS authentication support
263 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication()
363 * This function releases the authentication related resources.
/linux/Documentation/security/keys/
H A Decryptfs.rst17 FEK decryption is called authentication token and, currently, can be stored in a
25 authentication token in its payload with a FEKEK randomly generated by the
30 authentication token, which content is well known, but only the FEKEK in
/linux/Documentation/networking/
H A Dtls-handshake.rst12 addition to peer authentication.
84 Authentication material such as x.509 certificates, private certificate
126 during this type of handshake. Only server authentication (ie the client
188 | | authentication failed |
194 | -ENOKEY | Missing authentication material |
/linux/drivers/gpu/drm/bridge/cadence/
H A Dcdns-mhdp8546-hdcp.c304 dev_dbg(mhdp->dev, "Authentication completed successfully!\n"); in cdns_mhdp_hdcp_auth_check()
308 dev_dbg(mhdp->dev, "Authentication failed\n"); in cdns_mhdp_hdcp_auth_check()
339 dev_dbg(mhdp->dev, "HDCP: Start 2.2 Authentication\n"); in cdns_mhdp_hdcp_auth_22()
363 dev_dbg(mhdp->dev, "HDCP: Starting 1.4 Authentication\n"); in cdns_mhdp_hdcp_auth_14()
427 dev_err(mhdp->dev, "HDCP authentication failed (%d tries/%d)\n", in _cdns_mhdp_hdcp_enable()
447 "[%s:%d] HDCP link failed, retrying authentication\n", in cdns_mhdp_hdcp_check_link()
/linux/Documentation/devicetree/bindings/remoteproc/
H A Dqcom,sa8775p-pas.yaml7 title: Qualcomm SA8775p Peripheral Authentication Service
13 Qualcomm SA8775p SoC Peripheral Authentication Service loads and boots firmware
60 - description: Memory region for main Firmware authentication
H A Dqcom,qcs404-pas.yaml7 title: Qualcomm QCS404 Peripheral Authentication Service
13 Qualcomm QCS404 SoC Peripheral Authentication Service loads and boots
/linux/arch/s390/include/asm/
H A Dcpacf.h121 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
169 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
178 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction
193 * Function codes for KDSA (COMPUTE DIGITAL SIGNATURE AUTHENTICATION)
376 * cpacf_qai() - Get the query authentication information for a CPACF opcode
380 * Executes the query authentication information function for the given crypto
383 * On success 1 is returned and the mask is filled with the query authentication
512 * _cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
543 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
703 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
/linux/drivers/staging/greybus/
H A Dgreybus_authentication.h3 * Greybus Component Authentication User Header
32 /* Authentication types */
/linux/include/linux/
H A Drpmb.h70 * @key_mac : The authentication key or the message authentication
102 #define RPMB_PROGRAM_KEY 0x1 /* Program RPMB Authentication Key */

12345678910>>...12