| /linux/Documentation/arch/arm64/ |
| H A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 16 The ARMv8.3 Pointer Authentication extension adds primitives that can be 20 The extension uses a Pointer Authentication Code (PAC) to determine 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 57 with HINT space pointer authentication instructions protecting 59 with or without pointer authentication support. 72 authentication is present, the kernel will expose the position of TTBR0 [all …]
|
| /linux/include/crypto/ |
| H A D | aead.h | 38 * crypto_aead_decrypt. That error indicates an authentication error, i.e. 49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size 50 * during encryption (resp. decryption). The authentication tag is generated 52 * decryption, the authentication tag is consumed along with the ciphertext and 83 * @assoclen: Length in bytes of associated data for authentication 106 * @maxauthsize: Set the maximum authentication tag size supported by the 108 * As the authentication tag is a message digest to ensure the 110 * largest authentication tag possible as defined by this 112 * @setauthsize: Set authentication size for the AEAD transformation. This 114 * authentication tag to be either generated by the transformation [all …]
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| H A D | spmobj-attributes.c | 36 * for authentication scheme 38 * @authentication: the authentication content 42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument 46 if (!authentication) in hp_calculate_security_buffer() 49 authlen = strlen(authentication); in hp_calculate_security_buffer() 54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer() 62 * authentication scheme 65 * @authentication: the authentication content 69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument 75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer() [all …]
|
| H A D | bioscfg.h | 181 * 'role' identifies the type of authentication. 189 * 'mechanism' represents the means of authentication. 438 /* Password authentication attributes */ 454 int hp_populate_security_buffer(u16 *buffer, const char *authentication); 470 size_t hp_calculate_security_buffer(const char *authentication);
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.h | 74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */ 108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */ 127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2 239 * @auth_size: Authentication size for pass 1 240 * @auth_size2: Authentication size for pass 2 241 * @auth_offset: Authentication payload offset 242 * @auth_iv: Authentication initialization vector 243 * @aux_key_info: Authentication aux key information 244 * @aux_key: Aux key for authentication 358 /* Authentication algorithms */ [all …]
|
| /linux/drivers/misc/mei/ |
| H A D | mei_lb.c | 37 * All payloads are signed and verified by the authentication firmware. 55 * authentication firmware. 56 * 3. Authentication firmware authenticates the payload and extracts 58 * 4. Authentication firmware delivers the configuration to PUnit/PCODE. 77 * @flags: Flags to be passed to the authentication firmware (e.g. %INTEL_LB_FLAGS_IS_PERSISTENT) 78 * @reserved: Reserved for future use by authentication firmware, must be set to 0 80 * @payload: Payload data to be sent to the authentication firmware 95 * @reserved: Reserved for future use by authentication firmware, must be set to 0 96 * @status: Status returned by authentication firmware (see &enum intel_lb_status) 118 * @reserved: Reserved for future use by authentication firmware, must be set to 0 [all …]
|
| /linux/include/linux/sunrpc/ |
| H A D | svcauth.h | 5 * RPC server-side authentication stuff. 60 /* Authentication is done in the context of a domain. 66 * a common mechanism for authentication and having a common mapping 72 * A domain is created by an authentication flavour module based on name 100 * Each authentication flavour registers an auth_ops 106 * If there is a problem with the authentication *authp should be set.
|
| H A D | auth.h | 5 * Declarations for the RPC client authentication machinery. 23 * Maximum size of AUTH_NONE authentication information, in XDR words. 69 * Client authentication handle 105 * Client authentication ops
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_tpg.c | 78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg() 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 311 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group() 318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 588 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication() 589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 600 if (authentication) { in iscsit_ta_authentication() [all …]
|
| /linux/drivers/staging/greybus/Documentation/firmware/ |
| H A D | firmware-management | 40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4 183 Sysfs Interfaces - Authentication 186 The Component Authentication Protocol interacts with Userspace using the 196 authentication a of particular interface. 198 The Authentication core creates a device of class 'gb_authenticate', which shall 237 /* Authentication types */ 291 Authentication. The user is required to fill the 'certificate_class' and 333 component authentication protocol.
|
| /linux/include/uapi/linux/ |
| H A D | psp-dbc.h | 26 * 0: no authentication, PSP will return single use nonce. 27 * 1: authentication: PSP will return multi-use nonce. 28 * @nonce: 8 byte value used for future authentication (output). 88 * If a nonce is fetched without authentication it can only 90 * If a nonce is fetched with authentication it can be used
|
| /linux/drivers/nvme/target/ |
| H A D | Kconfig | 111 bool "NVMe over Fabrics In-band Authentication in target side" 115 This enables support for NVMe over Fabrics In-band Authentication in 121 bool "NVMe over Fabrics In-band Authentication debug messages" 125 DH-HMAC-CHAP secrets to help debugging authentication failures.
|
| /linux/Documentation/filesystems/nfs/ |
| H A D | rpc-server-gss.rst | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS 9 purposes of authentication.) 23 The RPCGSS Authentication method describes a way to perform GSSAPI 24 Authentication for NFS. Although GSSAPI is itself completely mechanism
|
| /linux/drivers/crypto/intel/qat/qat_common/ |
| H A D | adf_gen4_tl.c | 72 /* Wireless Authentication slice utilization. */ 80 /* Authentication slice utilization. */ 94 /* Wireless Authentication slice execution count. */ 102 /* Authentication slice execution count. */
|
| /linux/fs/ubifs/ |
| H A D | auth.c | 9 * This file implements various helper functions for UBIFS authentication support 52 * ubifs_prepare_auth_node - Prepare an authentication node 57 * This function prepares an authentication node for writing onto flash. 159 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a 250 * ubifs_init_authentication - initialize UBIFS authentication support 263 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication() 363 * This function releases the authentication related resources.
|
| H A D | Kconfig | 90 bool "UBIFS authentication support" 95 Enable authentication support for UBIFS. This feature offers protection
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
| /linux/arch/s390/include/asm/ |
| H A D | cpacf.h | 121 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 169 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) 178 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction 193 * Function codes for KDSA (COMPUTE DIGITAL SIGNATURE AUTHENTICATION) 376 * cpacf_qai() - Get the query authentication information for a CPACF opcode 380 * Executes the query authentication information function for the given crypto 383 * On success 1 is returned and the mask is filled with the query authentication 512 * _cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 543 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 703 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
|
| /linux/drivers/staging/greybus/ |
| H A D | greybus_authentication.h | 3 * Greybus Component Authentication User Header 32 /* Authentication types */
|
| /linux/include/linux/ |
| H A D | rpmb.h | 70 * @key_mac : The authentication key or the message authentication 102 #define RPMB_PROGRAM_KEY 0x1 /* Program RPMB Authentication Key */
|
| /linux/Documentation/devicetree/bindings/remoteproc/ |
| H A D | qcom,qcs404-pas.yaml | 7 title: Qualcomm QCS404 Peripheral Authentication Service 13 Qualcomm QCS404 SoC Peripheral Authentication Service loads and boots
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_req.h | 138 * struct auth_keys - Authentication keys 182 * @hash_type: Authentication type 183 * @auth_input_type: Authentication input type 184 * 1 - Authentication IV and KEY, microcode calculates OPAD/IPAD 185 * 0 - Authentication OPAD/IPAD 188 * @auth: Authentication keys
|
| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 2 # This outlines the Linux authentication/association and 13 alt authentication needed (not FT)
|
| /linux/Documentation/target/ |
| H A D | target-export-device | 73 # Disable authentication 74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
|
| /linux/drivers/thunderbolt/ |
| H A D | retimer.c | 201 tb_port_dbg(port, "reading NVM authentication status of retimers\n"); in tb_retimer_nvm_authenticate_status() 204 * Before doing anything else, read the authentication status. in tb_retimer_nvm_authenticate_status() 278 * When NVM authentication starts the retimer is not in nvm_authenticate_store() 282 * NVM image without authentication. in nvm_authenticate_store() 525 * authentication status of each retimer. in tb_retimer_scan()
|