| /linux/Documentation/arch/arm64/ |
| H A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 16 The ARMv8.3 Pointer Authentication extension adds primitives that can be 20 The extension uses a Pointer Authentication Code (PAC) to determine 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 57 with HINT space pointer authentication instructions protecting 59 with or without pointer authentication support. 72 authentication is present, the kernel will expose the position of TTBR0 [all …]
|
| /linux/include/crypto/ |
| H A D | aead.h | 38 * crypto_aead_decrypt. That error indicates an authentication error, i.e. 49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size 50 * during encryption (resp. decryption). The authentication tag is generated 52 * decryption, the authentication tag is consumed along with the ciphertext and 83 * @assoclen: Length in bytes of associated data for authentication 106 * @maxauthsize: Set the maximum authentication tag size supported by the 108 * As the authentication tag is a message digest to ensure the 110 * largest authentication tag possible as defined by this 112 * @setauthsize: Set authentication size for the AEAD transformation. This 114 * authentication tag to be either generated by the transformation [all …]
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| H A D | spmobj-attributes.c | 36 * for authentication scheme 38 * @authentication: the authentication content 42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument 46 if (!authentication) in hp_calculate_security_buffer() 49 authlen = strlen(authentication); in hp_calculate_security_buffer() 54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer() 62 * authentication scheme 65 * @authentication: the authentication content 69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument 75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer() [all …]
|
| H A D | bioscfg.h | 181 * 'role' identifies the type of authentication. 189 * 'mechanism' represents the means of authentication. 438 /* Password authentication attributes */ 454 int hp_populate_security_buffer(u16 *buffer, const char *authentication); 470 size_t hp_calculate_security_buffer(const char *authentication);
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.h | 74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */ 108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */ 127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2 239 * @auth_size: Authentication size for pass 1 240 * @auth_size2: Authentication size for pass 2 241 * @auth_offset: Authentication payload offset 242 * @auth_iv: Authentication initialization vector 243 * @aux_key_info: Authentication aux key information 244 * @aux_key: Aux key for authentication 358 /* Authentication algorithms */ [all …]
|
| /linux/drivers/platform/x86/dell/dell-wmi-sysman/ |
| H A D | sysman.c | 70 * calculate_security_buffer() - determines size of security buffer for authentication scheme 71 * @authentication: the authentication content 75 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument 77 if (strlen(authentication) > 0) { in calculate_security_buffer() 78 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer() 79 strlen(authentication) % 2; in calculate_security_buffer() 85 * populate_security_buffer() - builds a security buffer for authentication scheme 87 * @authentication: the authentication content 91 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument 97 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer() [all …]
|
| /linux/drivers/misc/mei/ |
| H A D | mei_lb.c | 37 * All payloads are signed and verified by the authentication firmware. 55 * authentication firmware. 56 * 3. Authentication firmware authenticates the payload and extracts 58 * 4. Authentication firmware delivers the configuration to PUnit/PCODE. 72 * @flags: Flags to be passed to the authentication firmware (e.g. %INTEL_LB_FLAGS_IS_PERSISTENT) 73 * @reserved: Reserved for future use by authentication firmware, must be set to 0 75 * @payload: Payload data to be sent to the authentication firmware 90 * @reserved: Reserved for future use by authentication firmware, must be set to 0 91 * @status: Status returned by authentication firmware (see &enum intel_lb_status)
|
| /linux/include/linux/sunrpc/ |
| H A D | svcauth.h | 5 * RPC server-side authentication stuff. 60 /* Authentication is done in the context of a domain. 66 * a common mechanism for authentication and having a common mapping 72 * A domain is created by an authentication flavour module based on name 100 * Each authentication flavour registers an auth_ops 106 * If there is a problem with the authentication *authp should be set.
|
| H A D | auth.h | 5 * Declarations for the RPC client authentication machinery. 23 * Maximum size of AUTH_NONE authentication information, in XDR words. 69 * Client authentication handle 105 * Client authentication ops
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 393 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 394 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_tpg.c | 78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg() 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 311 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group() 318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 588 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication() 589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 600 if (authentication) { in iscsit_ta_authentication() [all …]
|
| /linux/drivers/staging/greybus/Documentation/firmware/ |
| H A D | firmware-management | 40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4 183 Sysfs Interfaces - Authentication 186 The Component Authentication Protocol interacts with Userspace using the 196 authentication a of particular interface. 198 The Authentication core creates a device of class 'gb_authenticate', which shall 237 /* Authentication types */ 291 Authentication. The user is required to fill the 'certificate_class' and 333 component authentication protocol.
|
| /linux/include/uapi/linux/ |
| H A D | psp-dbc.h | 26 * 0: no authentication, PSP will return single use nonce. 27 * 1: authentication: PSP will return multi-use nonce. 28 * @nonce: 8 byte value used for future authentication (output). 88 * If a nonce is fetched without authentication it can only 90 * If a nonce is fetched with authentication it can be used
|
| H A D | nl80211.h | 186 * preshared key authentication in station mode. In %NL80211_CMD_CONNECT 194 * handshakes during 802.1X authentication in station mode. In order to 202 * preshared key authentication in AP mode. In %NL80211_CMD_START_AP 214 * DOC: FILS shared key authentication offload 216 * FILS shared key authentication offload can be advertised by drivers by 218 * FILS shared key authentication offload should be able to construct the 219 * authentication and association frames for FILS shared key authentication and 227 * rIK should be used to generate an authentication tag on the ERP message and 232 * When FILS shared key authentication i [all...] |
| /linux/Documentation/filesystems/nfs/ |
| H A D | rpc-server-gss.rst | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS 9 purposes of authentication.) 23 The RPCGSS Authentication method describes a way to perform GSSAPI 24 Authentication for NFS. Although GSSAPI is itself completely mechanism
|
| /linux/drivers/crypto/intel/qat/qat_common/ |
| H A D | adf_gen4_tl.c | 72 /* Wireless Authentication slice utilization. */ 80 /* Authentication slice utilization. */ 94 /* Wireless Authentication slice execution count. */ 102 /* Authentication slice execution count. */
|
| /linux/fs/ubifs/ |
| H A D | auth.c | 9 * This file implements various helper functions for UBIFS authentication support 52 * ubifs_prepare_auth_node - Prepare an authentication node 57 * This function prepares an authentication node for writing onto flash. 159 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a 250 * ubifs_init_authentication - initialize UBIFS authentication support 263 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication() 363 * This function releases the authentication related resources.
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
| /linux/Documentation/networking/ |
| H A D | tls-handshake.rst | 12 addition to peer authentication. 84 Authentication material such as x.509 certificates, private certificate 126 during this type of handshake. Only server authentication (ie the client 188 | | authentication failed | 194 | -ENOKEY | Missing authentication material |
|
| /linux/drivers/gpu/drm/bridge/cadence/ |
| H A D | cdns-mhdp8546-hdcp.c | 304 dev_dbg(mhdp->dev, "Authentication completed successfully!\n"); in cdns_mhdp_hdcp_auth_check() 308 dev_dbg(mhdp->dev, "Authentication failed\n"); in cdns_mhdp_hdcp_auth_check() 339 dev_dbg(mhdp->dev, "HDCP: Start 2.2 Authentication\n"); in cdns_mhdp_hdcp_auth_22() 363 dev_dbg(mhdp->dev, "HDCP: Starting 1.4 Authentication\n"); in cdns_mhdp_hdcp_auth_14() 427 dev_err(mhdp->dev, "HDCP authentication failed (%d tries/%d)\n", in _cdns_mhdp_hdcp_enable() 447 "[%s:%d] HDCP link failed, retrying authentication\n", in cdns_mhdp_hdcp_check_link()
|
| /linux/Documentation/devicetree/bindings/remoteproc/ |
| H A D | qcom,sa8775p-pas.yaml | 7 title: Qualcomm SA8775p Peripheral Authentication Service 13 Qualcomm SA8775p SoC Peripheral Authentication Service loads and boots firmware 60 - description: Memory region for main Firmware authentication
|
| H A D | qcom,qcs404-pas.yaml | 7 title: Qualcomm QCS404 Peripheral Authentication Service 13 Qualcomm QCS404 SoC Peripheral Authentication Service loads and boots
|
| /linux/arch/s390/include/asm/ |
| H A D | cpacf.h | 121 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 169 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) 178 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction 193 * Function codes for KDSA (COMPUTE DIGITAL SIGNATURE AUTHENTICATION) 376 * cpacf_qai() - Get the query authentication information for a CPACF opcode 380 * Executes the query authentication information function for the given crypto 383 * On success 1 is returned and the mask is filled with the query authentication 512 * _cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 543 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 703 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
|
| /linux/drivers/staging/greybus/ |
| H A D | greybus_authentication.h | 3 * Greybus Component Authentication User Header 32 /* Authentication types */
|
| /linux/include/linux/ |
| H A D | rpmb.h | 70 * @key_mac : The authentication key or the message authentication 102 #define RPMB_PROGRAM_KEY 0x1 /* Program RPMB Authentication Key */
|