Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 920) sorted by relevance

12345678910>>...37

/kernel/linux/linux-5.10/Documentation/arm64/
Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
16 The ARMv8.3 Pointer Authentication extension adds primitives that can be
20 The extension uses a Pointer Authentication Code (PAC) to determine
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
60 authentication extension.
73 authentication is present, the kernel will expose the position of TTBR0
92 Pointer authentication is enabled in KVM guest when each virtual cpu is
[all …]
/kernel/linux/linux-6.6/Documentation/arch/arm64/
Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
16 The ARMv8.3 Pointer Authentication extension adds primitives that can be
20 The extension uses a Pointer Authentication Code (PAC) to determine
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
[all …]
/kernel/linux/linux-6.6/Documentation/ABI/testing/
Dsysfs-class-firmware-attributes149 What: /sys/class/firmware-attributes/*/authentication/
156 Devices support various authentication mechanisms which can be exposed
166 Change in any of these two authentication methods will also generate an
171 <attr> authentication is enabled.
175 The type of authentication used.
195 The means of authentication. This attribute is mandatory.
256 Available for HDD and NVMe authentication to set 'user' or 'master'
265 Used with HDD and NVME authentication to set the drive index
270 These attributes are used for certificate based authentication. This is
272 based authentication.
[all …]
/kernel/linux/linux-6.6/include/crypto/
Daead.h38 * crypto_aead_decrypt. That error indicates an authentication error, i.e.
49 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size
50 * during encryption (resp. decryption). The authentication tag is generated
52 * decryption, the authentication tag is consumed along with the ciphertext and
83 * @assoclen: Length in bytes of associated data for authentication
122 * @maxauthsize: Set the maximum authentication tag size supported by the
124 * As the authentication tag is a message digest to ensure the
126 * largest authentication tag possible as defined by this
128 * @setauthsize: Set authentication size for the AEAD transformation. This
130 * authentication tag to be either generated by the transformation
[all …]
/kernel/linux/linux-5.10/include/crypto/
Daead.h39 * crypto_aead_decrypt. That error indicates an authentication error, i.e.
50 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size
80 * @assoclen: Length in bytes of associated data for authentication
103 * @maxauthsize: Set the maximum authentication tag size supported by the
105 * As the authentication tag is a message digest to ensure the
107 * largest authentication tag possible as defined by this
109 * @setauthsize: Set authentication size for the AEAD transformation. This
111 * authentication tag to be either generated by the transformation
112 * during encryption or the size of the authentication tag to be
114 * responsible for checking the authentication tag size for
[all …]
/kernel/linux/linux-5.10/Documentation/filesystems/
Dubifs-authentication.rst3 .. UBIFS Authentication
8 UBIFS Authentication Support
33 can be used to get full data authentication at the block layer.
37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file
38 name encryption, the authentication system could be tied into fscrypt such that
40 be possible to use UBIFS authentication without using encryption.
206 UBIFS Authentication
209 This chapter introduces UBIFS authentication which enables UBIFS to verify
216 UBIFS authentication enables detection of offline data modification. While it
221 UBIFS authentication will not protect against rollback of full flash contents.
[all …]
/kernel/linux/linux-6.6/Documentation/filesystems/
Dubifs-authentication.rst3 .. UBIFS Authentication
8 UBIFS Authentication Support
33 can be used to get full data authentication at the block layer.
37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file
38 name encryption, the authentication system could be tied into fscrypt such that
40 be possible to use UBIFS authentication without using encryption.
206 UBIFS Authentication
209 This chapter introduces UBIFS authentication which enables UBIFS to verify
216 UBIFS authentication enables detection of offline data modification. While it
221 UBIFS authentication will not protect against rollback of full flash contents.
[all …]
/kernel/linux/linux-6.6/drivers/platform/x86/hp/hp-bioscfg/
Dspmobj-attributes.c36 * for authentication scheme
38 * @authentication: the authentication content
42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument
46 if (!authentication) in hp_calculate_security_buffer()
49 authlen = strlen(authentication); in hp_calculate_security_buffer()
54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer()
62 * authentication scheme
65 * @authentication: the authentication content
69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument
75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/
Dsa2ul.h74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */
108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */
127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2
239 * @auth_size: Authentication size for pass 1
240 * @auth_size2: Authentication size for pass 2
241 * @auth_offset: Authentication payload offset
242 * @auth_iv: Authentication initialization vector
243 * @aux_key_info: Authentication aux key information
244 * @aux_key: Aux key for authentication
358 /* Authentication algorithms */
[all …]
/kernel/linux/linux-5.10/drivers/crypto/
Dsa2ul.h74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */
108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */
127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2
235 * @auth_size: Authentication size for pass 1
236 * @auth_size2: Authentication size for pass 2
237 * @auth_offset: Authentication payload offset
238 * @auth_iv: Authentication initialization vector
239 * @aux_key_info: Authentication aux key information
240 * @aux_key: Aux key for authentication
354 /* Authentication algorithms */
[all …]
/kernel/linux/linux-6.6/drivers/platform/x86/dell/dell-wmi-sysman/
Dsysman.c70 * calculate_security_buffer() - determines size of security buffer for authentication scheme
71 * @authentication: the authentication content
75 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument
77 if (strlen(authentication) > 0) { in calculate_security_buffer()
78 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer()
79 strlen(authentication) % 2; in calculate_security_buffer()
85 * populate_security_buffer() - builds a security buffer for authentication scheme
87 * @authentication: the authentication content
91 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument
97 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
[all …]
/kernel/linux/linux-5.10/Documentation/crypto/
Duserspace-if.rst213 system call family, the consumer must set the authentication tag size.
214 To set the authentication tag size, the caller must use the setsockopt
235 - specification of the associated authentication data (AAD) with the
265 - associated authentication data (AAD)
267 - authentication tag
269 The sizes of the AAD and the authentication tag are provided with the
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
385 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
386 AEAD ciphers. For a encryption operation, the authentication tag of
[all …]
/kernel/linux/linux-6.6/include/linux/sunrpc/
Dsvcauth.h5 * RPC server-side authentication stuff.
59 /* Authentication is done in the context of a domain.
65 * a common mechanism for authentication and having a common mapping
71 * A domain is created by an authentication flavour module based on name
100 * Each authentication flavour registers an auth_ops
106 * If there is a problem with the authentication *authp should be set.
/kernel/linux/common_modules/newip/src/common/
Dnip_addr.c116 * 0xFF01 - Public address for access authentication
117 * 0xFF02 - Public address of access authentication
121 * 0xFF06 - Public address for minimalist access authentication
262 * 0xFF01 - Public address for access authentication
263 * 0xFF02 - Public address of access authentication
267 * 0xFF06 - Public address for minimalist access authentication
336 * 0xFF01 - Public address for access authentication
337 * 0xFF02 - Public address of access authentication
341 * 0xFF06 - Public address for minimalist access authentication
/kernel/linux/linux-6.6/Documentation/crypto/
Duserspace-if.rst213 system call family, the consumer must set the authentication tag size.
214 To set the authentication tag size, the caller must use the setsockopt
235 - specification of the associated authentication data (AAD) with the
265 - associated authentication data (AAD)
267 - authentication tag
269 The sizes of the AAD and the authentication tag are provided with the
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
394 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
395 AEAD ciphers. For a encryption operation, the authentication tag of
[all …]
/kernel/linux/linux-5.10/include/linux/sunrpc/
Dsvcauth.h5 * RPC server-side authentication stuff.
59 /* Authentication is done in the context of a domain.
65 * a common mechanism for authentication and having a common mapping
71 * A domain is created by an authentication flavour module based on name
87 * Each authentication flavour registers an auth_ops
93 * If there is a problem with the authentication *authp should be set.
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/
Dfirmware-management40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4
183 Sysfs Interfaces - Authentication
186 The Component Authentication Protocol interacts with Userspace using the
196 authentication a of particular interface.
198 The Authentication core creates a device of class 'gb_authenticate', which shall
237 /* Authentication types */
291 Authentication. The user is required to fill the 'certificate_class' and
333 component authentication protocol.
/kernel/linux/linux-6.6/drivers/staging/greybus/Documentation/firmware/
Dfirmware-management40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4
183 Sysfs Interfaces - Authentication
186 The Component Authentication Protocol interacts with Userspace using the
196 authentication a of particular interface.
198 The Authentication core creates a device of class 'gb_authenticate', which shall
237 /* Authentication types */
291 Authentication. The user is required to fill the 'certificate_class' and
333 component authentication protocol.
/kernel/linux/linux-6.6/include/uapi/linux/
Dpsp-dbc.h26 * 0: no authentication, PSP will return single use nonce.
27 * 1: authentication: PSP will return multi-use nonce.
28 * @nonce: 8 byte value used for future authentication (output).
88 * If a nonce is fetched without authentication it can only
90 * If a nonce is fetched with authentication it can be used
/kernel/linux/linux-5.10/Documentation/networking/
Dtls-offload.rst54 On the receive side if the device handled decryption and authentication
133 * crypto processing state (partial blocks, partial authentication tag, etc.)
140 crypto operations and authentication regardless of segmentation. For this
146 * partial authentication tag (all data had been seen but part of the
147 authentication tag has to be written or read from the subsequent segment)
156 The kernel stack performs record framing reserving space for the authentication
167 The device performs encryption and authentication of the record data.
168 It replaces the authentication tag and TCP checksum with correct values.
180 decryption, authentication for each record in the packet). The device leaves
221 data (to be able to insert the authentication tag) and move onto handling
[all …]
/kernel/linux/linux-6.6/drivers/target/iscsi/
Discsi_target_tpg.c78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg()
90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
316 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group()
323 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
585 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
592 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
593 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication()
594 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
605 if (authentication) { in iscsit_ta_authentication()
[all …]
/kernel/linux/linux-5.10/drivers/target/iscsi/
Discsi_target_tpg.c78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg()
90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
317 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group()
324 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
587 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
594 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
595 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication()
596 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
607 if (authentication) { in iscsit_ta_authentication()
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/remoteproc/
Dqcom,sm8550-pas.yaml7 title: Qualcomm SM8550 Peripheral Authentication Service
13 Qualcomm SM8550 SoC Peripheral Authentication Service loads and boots firmware
49 - description: Memory region for main Firmware authentication
50 - description: Memory region for Devicetree Firmware authentication
/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/modules/hdcp/
Dhdcp.c55 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp1()
75 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp2()
228 /* stop callback and watchdog requests from previous authentication*/ in reset_authentication()
348 /* reset existing authentication status */ in mod_hdcp_add_display()
367 /* request authentication */ in mod_hdcp_add_display()
394 /* stop current authentication */ in mod_hdcp_remove_display()
411 /* request authentication when connection is not reset */ in mod_hdcp_remove_display()
458 /* stop current authentication */ in mod_hdcp_update_display()
473 /* request authentication when connection is not reset */ in mod_hdcp_update_display()
560 /* reset authentication if needed */ in mod_hdcp_process_event()
/kernel/linux/linux-6.6/Documentation/networking/
Dtls-offload.rst54 On the receive side if the device handled decryption and authentication
133 * crypto processing state (partial blocks, partial authentication tag, etc.)
140 crypto operations and authentication regardless of segmentation. For this
146 * partial authentication tag (all data had been seen but part of the
147 authentication tag has to be written or read from the subsequent segment)
156 The kernel stack performs record framing reserving space for the authentication
167 The device performs encryption and authentication of the record data.
168 It replaces the authentication tag and TCP checksum with correct values.
180 decryption, authentication for each record in the packet). The device leaves
221 data (to be able to insert the authentication tag) and move onto handling
[all …]

12345678910>>...37