Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 310) sorted by relevance

12345678910>>...13

/linux/Documentation/arch/arm64/
H A Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
16 The ARMv8.3 Pointer Authentication extension adds primitives that can be
20 The extension uses a Pointer Authentication Code (PAC) to determine
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
[all …]
/linux/include/crypto/
H A Daead.h38 * crypto_aead_decrypt. That error indicates an authentication error, i.e.
49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size
50 * during encryption (resp. decryption). The authentication tag is generated
52 * decryption, the authentication tag is consumed along with the ciphertext and
83 * @assoclen: Length in bytes of associated data for authentication
106 * @maxauthsize: Set the maximum authentication tag size supported by the
108 * As the authentication tag is a message digest to ensure the
110 * largest authentication tag possible as defined by this
112 * @setauthsize: Set authentication size for the AEAD transformation. This
114 * authentication tag to be either generated by the transformation
[all …]
/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c36 * for authentication scheme
38 * @authentication: the authentication content
42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument
46 if (!authentication) in hp_calculate_security_buffer()
49 authlen = strlen(authentication); in hp_calculate_security_buffer()
54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer()
62 * authentication scheme
65 * @authentication: the authentication content
69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument
75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer()
[all …]
H A Dbioscfg.h181 * 'role' identifies the type of authentication.
189 * 'mechanism' represents the means of authentication.
438 /* Password authentication attributes */
454 int hp_populate_security_buffer(u16 *buffer, const char *authentication);
470 size_t hp_calculate_security_buffer(const char *authentication);
/linux/drivers/crypto/
H A Dsa2ul.h74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */
108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */
127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2
239 * @auth_size: Authentication size for pass 1
240 * @auth_size2: Authentication size for pass 2
241 * @auth_offset: Authentication payload offset
242 * @auth_iv: Authentication initialization vector
243 * @aux_key_info: Authentication aux key information
244 * @aux_key: Aux key for authentication
358 /* Authentication algorithms */
[all …]
/linux/drivers/misc/mei/
H A Dmei_lb.c37 * All payloads are signed and verified by the authentication firmware.
55 * authentication firmware.
56 * 3. Authentication firmware authenticates the payload and extracts
58 * 4. Authentication firmware delivers the configuration to PUnit/PCODE.
77 * @flags: Flags to be passed to the authentication firmware (e.g. %INTEL_LB_FLAGS_IS_PERSISTENT)
78 * @reserved: Reserved for future use by authentication firmware, must be set to 0
80 * @payload: Payload data to be sent to the authentication firmware
95 * @reserved: Reserved for future use by authentication firmware, must be set to 0
96 * @status: Status returned by authentication firmware (see &enum intel_lb_status)
118 * @reserved: Reserved for future use by authentication firmware, must be set to 0
[all …]
/linux/include/linux/sunrpc/
H A Dsvcauth.h5 * RPC server-side authentication stuff.
60 /* Authentication is done in the context of a domain.
66 * a common mechanism for authentication and having a common mapping
72 * A domain is created by an authentication flavour module based on name
100 * Each authentication flavour registers an auth_ops
106 * If there is a problem with the authentication *authp should be set.
H A Dauth.h5 * Declarations for the RPC client authentication machinery.
23 * Maximum size of AUTH_NONE authentication information, in XDR words.
69 * Client authentication handle
105 * Client authentication ops
/linux/drivers/target/iscsi/
H A Discsi_target_tpg.c78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg()
90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
207 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
311 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group()
318 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
580 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
587 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
588 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication()
589 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
600 if (authentication) { in iscsit_ta_authentication()
[all …]
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dfirmware-management40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4
183 Sysfs Interfaces - Authentication
186 The Component Authentication Protocol interacts with Userspace using the
196 authentication a of particular interface.
198 The Authentication core creates a device of class 'gb_authenticate', which shall
237 /* Authentication types */
291 Authentication. The user is required to fill the 'certificate_class' and
333 component authentication protocol.
/linux/include/uapi/linux/
H A Dpsp-dbc.h26 * 0: no authentication, PSP will return single use nonce.
27 * 1: authentication: PSP will return multi-use nonce.
28 * @nonce: 8 byte value used for future authentication (output).
88 * If a nonce is fetched without authentication it can only
90 * If a nonce is fetched with authentication it can be used
/linux/drivers/nvme/target/
H A DKconfig111 bool "NVMe over Fabrics In-band Authentication in target side"
115 This enables support for NVMe over Fabrics In-band Authentication in
121 bool "NVMe over Fabrics In-band Authentication debug messages"
125 DH-HMAC-CHAP secrets to help debugging authentication failures.
/linux/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst6 implement RPCGSS authentication in kernel RPC servers such as the NFS
9 purposes of authentication.)
23 The RPCGSS Authentication method describes a way to perform GSSAPI
24 Authentication for NFS. Although GSSAPI is itself completely mechanism
/linux/drivers/crypto/intel/qat/qat_common/
H A Dadf_gen4_tl.c72 /* Wireless Authentication slice utilization. */
80 /* Authentication slice utilization. */
94 /* Wireless Authentication slice execution count. */
102 /* Authentication slice execution count. */
/linux/fs/ubifs/
H A Dauth.c9 * This file implements various helper functions for UBIFS authentication support
52 * ubifs_prepare_auth_node - Prepare an authentication node
57 * This function prepares an authentication node for writing onto flash.
159 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a
250 * ubifs_init_authentication - initialize UBIFS authentication support
263 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication()
363 * This function releases the authentication related resources.
H A DKconfig90 bool "UBIFS authentication support"
95 Enable authentication support for UBIFS. This feature offers protection
/linux/Documentation/security/keys/
H A Decryptfs.rst17 FEK decryption is called authentication token and, currently, can be stored in a
25 authentication token in its payload with a FEKEK randomly generated by the
30 authentication token, which content is well known, but only the FEKEK in
/linux/arch/s390/include/asm/
H A Dcpacf.h121 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
169 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
178 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction
193 * Function codes for KDSA (COMPUTE DIGITAL SIGNATURE AUTHENTICATION)
376 * cpacf_qai() - Get the query authentication information for a CPACF opcode
380 * Executes the query authentication information function for the given crypto
383 * On success 1 is returned and the mask is filled with the query authentication
512 * _cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
543 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
703 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
/linux/drivers/staging/greybus/
H A Dgreybus_authentication.h3 * Greybus Component Authentication User Header
32 /* Authentication types */
/linux/include/linux/
H A Drpmb.h70 * @key_mac : The authentication key or the message authentication
102 #define RPMB_PROGRAM_KEY 0x1 /* Program RPMB Authentication Key */
/linux/Documentation/devicetree/bindings/remoteproc/
H A Dqcom,qcs404-pas.yaml7 title: Qualcomm QCS404 Peripheral Authentication Service
13 Qualcomm QCS404 SoC Peripheral Authentication Service loads and boots
/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_req.h138 * struct auth_keys - Authentication keys
182 * @hash_type: Authentication type
183 * @auth_input_type: Authentication input type
184 * 1 - Authentication IV and KEY, microcode calculates OPAD/IPAD
185 * 0 - Authentication OPAD/IPAD
188 * @auth: Authentication keys
/linux/Documentation/networking/
H A Dmac80211-auth-assoc-deauth.txt2 # This outlines the Linux authentication/association and
13 alt authentication needed (not FT)
/linux/Documentation/target/
H A Dtarget-export-device73 # Disable authentication
74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
/linux/drivers/thunderbolt/
H A Dretimer.c201 tb_port_dbg(port, "reading NVM authentication status of retimers\n"); in tb_retimer_nvm_authenticate_status()
204 * Before doing anything else, read the authentication status. in tb_retimer_nvm_authenticate_status()
278 * When NVM authentication starts the retimer is not in nvm_authenticate_store()
282 * NVM image without authentication. in nvm_authenticate_store()
525 * authentication status of each retimer. in tb_retimer_scan()

12345678910>>...13