Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 63) sorted by relevance

123

/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument
46 if (!authentication) in hp_calculate_security_buffer()
49 authlen = strlen(authentication); in hp_calculate_security_buffer()
54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer()
69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument
75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer()
81 auth = hp_ascii_to_utf16_unicode(auth, authentication); in hp_populate_security_buffer()
93 authentication); in hp_populate_security_buffer()
H A Dbioscfg.h452 int hp_populate_security_buffer(u16 *buffer, const char *authentication);
468 size_t hp_calculate_security_buffer(const char *authentication);
/linux/drivers/platform/x86/dell/dell-wmi-sysman/
H A Dsysman.c75 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument
77 if (strlen(authentication) > 0) { in calculate_security_buffer()
78 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer()
79 strlen(authentication) % 2; in calculate_security_buffer()
91 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument
97 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
98 *seclen = strlen(authentication); in populate_security_buffer()
101 if (strlen(authentication) > 0) in populate_security_buffer()
102 memcpy(auth, authentication, *seclen); in populate_security_buffer()
H A Ddell-wmi-sysman.h192 size_t calculate_security_buffer(char *authentication);
193 void populate_security_buffer(char *buffer, char *authentication);
/linux/Documentation/arch/arm64/
H A Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
91 Pointer authentication is enabled in KVM guest when each virtual cpu is
95 these userspace flags are checked before enabling pointer authentication.
/linux/drivers/target/iscsi/
H A Discsi_target_tpg.c90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
600 if (authentication) { in iscsit_ta_authentication()
633 a->authentication = authentication; in iscsit_ta_authentication()
635 a->authentication ? "Enforcing" : "Disabling", tpg->tpgt); in iscsit_ta_authentication()
H A Discsi_target_nego.c820 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
834 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
841 if (nacl->node_attrib.authentication == NA_AUTHENTICATION_INHERITED) in iscsi_conn_auth_required()
842 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
844 return nacl->node_attrib.authentication; in iscsi_conn_auth_required()
/linux/Documentation/security/keys/
H A Decryptfs.rst17 FEK decryption is called authentication token and, currently, can be stored in a
25 authentication token in its payload with a FEKEK randomly generated by the
30 authentication token, which content is well known, but only the FEKEK in
/linux/Documentation/crypto/
H A Duserspace-if.rst213 system call family, the consumer must set the authentication tag size.
214 To set the authentication tag size, the caller must use the setsockopt
235 - specification of the associated authentication data (AAD) with the
265 - associated authentication data (AAD)
267 - authentication tag
269 The sizes of the AAD and the authentication tag are provided with the
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
393 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
394 AEAD ciphers. For a encryption operation, the authentication tag of
[all …]
/linux/Documentation/translations/zh_TW/arch/arm64/
H A Delf_hwcaps.rst158 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
163 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
/linux/Documentation/translations/zh_CN/arch/arm64/
H A Delf_hwcaps.rst155 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
160 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
/linux/Documentation/networking/
H A Dtls-offload.rst54 On the receive side, if the device handled decryption and authentication
134 * crypto processing state (partial blocks, partial authentication tag, etc.)
141 crypto operations and authentication regardless of segmentation. For this
147 * partial authentication tag (all data had been seen but part of the
148 authentication tag has to be written or read from the subsequent segment)
157 The kernel stack performs record framing reserving space for the authentication
168 The device performs encryption and authentication of the record data.
169 It replaces the authentication tag and TCP checksum with correct values.
181 (record delineation, decryption, authentication for each record in the packet).
222 data (to be able to insert the authentication tag) and move onto handling
[all …]
H A Dmac80211-auth-assoc-deauth.txt2 # This outlines the Linux authentication/association and
13 alt authentication needed (not FT)
H A Dtls-handshake.rst12 addition to peer authentication.
126 during this type of handshake. Only server authentication (ie the client
188 | | authentication failed |
194 | -ENOKEY | Missing authentication material |
/linux/Documentation/translations/zh_CN/filesystems/
H A Dindex.rst40 ubifs-authentication
/linux/arch/arm64/configs/
H A Dhardening.config10 # Pointer authentication (ARMv8.3 and later). If hardware actually supports
/linux/drivers/net/wireless/purelifi/plfxlc/
H A DKconfig9 The driver supports common 802.11 encryption/authentication
/linux/fs/ubifs/
H A DKconfig90 bool "UBIFS authentication support"
95 Enable authentication support for UBIFS. This feature offers protection
/linux/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst6 implement RPCGSS authentication in kernel RPC servers such as the NFS
9 purposes of authentication.)
/linux/Documentation/target/
H A Dtarget-export-device74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-thunderbolt210 authentication procedure is started by writing to
226 When read holds status of the last authentication
242 area and prepare the device for authentication on disconnect.
351 authentication procedure is started by writing 1 to
356 When read holds status of the last authentication
/linux/Documentation/driver-api/mmc/
H A Dmmc-tools.rst29 - Program authentication key for the device.
/linux/fs/coda/
H A DKconfig11 replication, security model for authentication and encryption,
/linux/arch/s390/crypto/
H A DKconfig53 tristate "Keyed-hash message authentication code: HMAC"
/linux/drivers/staging/greybus/
H A DMakefile8 gb-firmware-y := fw-core.o fw-download.o fw-management.o authentication.o

123