/Linux-v5.10/Documentation/arm64/ |
D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 16 The ARMv8.3 Pointer Authentication extension adds primitives that can be 20 The extension uses a Pointer Authentication Code (PAC) to determine 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 60 authentication extension. 73 authentication is present, the kernel will expose the position of TTBR0 92 Pointer authentication is enabled in KVM guest when each virtual cpu is [all …]
|
/Linux-v5.10/include/crypto/ |
D | aead.h | 39 * crypto_aead_decrypt. That error indicates an authentication error, i.e. 50 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size 80 * @assoclen: Length in bytes of associated data for authentication 103 * @maxauthsize: Set the maximum authentication tag size supported by the 105 * As the authentication tag is a message digest to ensure the 107 * largest authentication tag possible as defined by this 109 * @setauthsize: Set authentication size for the AEAD transformation. This 111 * authentication tag to be either generated by the transformation 112 * during encryption or the size of the authentication tag to be 114 * responsible for checking the authentication tag size for [all …]
|
D | gcm.h | 11 * validate authentication tag for GCM 32 * validate authentication tag for RFC4106
|
/Linux-v5.10/Documentation/filesystems/ |
D | ubifs-authentication.rst | 3 .. UBIFS Authentication 8 UBIFS Authentication Support 33 can be used to get full data authentication at the block layer. 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 38 name encryption, the authentication system could be tied into fscrypt such that 40 be possible to use UBIFS authentication without using encryption. 206 UBIFS Authentication 209 This chapter introduces UBIFS authentication which enables UBIFS to verify 216 UBIFS authentication enables detection of offline data modification. While it 221 UBIFS authentication will not protect against rollback of full flash contents. [all …]
|
/Linux-v5.10/drivers/crypto/ |
D | sa2ul.h | 74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */ 108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */ 127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2 235 * @auth_size: Authentication size for pass 1 236 * @auth_size2: Authentication size for pass 2 237 * @auth_offset: Authentication payload offset 238 * @auth_iv: Authentication initialization vector 239 * @aux_key_info: Authentication aux key information 240 * @aux_key: Aux key for authentication 354 /* Authentication algorithms */ [all …]
|
/Linux-v5.10/Documentation/crypto/ |
D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 385 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 386 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
/Linux-v5.10/include/linux/sunrpc/ |
D | svcauth.h | 5 * RPC server-side authentication stuff. 59 /* Authentication is done in the context of a domain. 65 * a common mechanism for authentication and having a common mapping 71 * A domain is created by an authentication flavour module based on name 87 * Each authentication flavour registers an auth_ops 93 * If there is a problem with the authentication *authp should be set.
|
D | auth.h | 5 * Declarations for the RPC client authentication machinery. 23 * Maximum size of AUTH_NONE authentication information, in XDR words. 69 * Client authentication handle 104 * Client authentication ops
|
/Linux-v5.10/drivers/staging/greybus/Documentation/firmware/ |
D | firmware-management | 40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4 183 Sysfs Interfaces - Authentication 186 The Component Authentication Protocol interacts with Userspace using the 196 authentication a of particular interface. 198 The Authentication core creates a device of class 'gb_authenticate', which shall 237 /* Authentication types */ 291 Authentication. The user is required to fill the 'certificate_class' and 333 component authentication protocol.
|
/Linux-v5.10/Documentation/networking/ |
D | tls-offload.rst | 54 On the receive side if the device handled decryption and authentication 133 * crypto processing state (partial blocks, partial authentication tag, etc.) 140 crypto operations and authentication regardless of segmentation. For this 146 * partial authentication tag (all data had been seen but part of the 147 authentication tag has to be written or read from the subsequent segment) 156 The kernel stack performs record framing reserving space for the authentication 167 The device performs encryption and authentication of the record data. 168 It replaces the authentication tag and TCP checksum with correct values. 180 decryption, authentication for each record in the packet). The device leaves 221 data (to be able to insert the authentication tag) and move onto handling [all …]
|
D | mac80211-auth-assoc-deauth.txt | 2 # This outlines the Linux authentication/association and 13 alt authentication needed (not FT)
|
/Linux-v5.10/drivers/target/iscsi/ |
D | iscsi_target_tpg.c | 78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg() 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 317 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group() 324 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 584 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 591 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 592 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication() 593 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 604 if (authentication) { in iscsit_ta_authentication() [all …]
|
/Linux-v5.10/Documentation/filesystems/nfs/ |
D | rpc-server-gss.rst | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS 9 purposes of authentication.) 23 The RPCGSS Authentication method describes a way to perform GSSAPI 24 Authentication for NFS. Although GSSAPI is itself completely mechanism
|
/Linux-v5.10/drivers/gpu/drm/amd/display/modules/hdcp/ |
D | hdcp.c | 51 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp1() 72 /* if all displays on the link don't need authentication, in is_cp_desired_hdcp2() 223 /* stop callback and watchdog requests from previous authentication*/ in reset_authentication() 317 /* reset existing authentication status */ in mod_hdcp_add_display() 336 /* request authentication */ in mod_hdcp_add_display() 363 /* stop current authentication */ in mod_hdcp_remove_display() 380 /* request authentication when connection is not reset */ in mod_hdcp_remove_display() 466 /* reset authentication if needed */ in mod_hdcp_process_event()
|
/Linux-v5.10/drivers/gpu/drm/i915/gt/uc/ |
D | intel_huc.c | 20 * triggering its security authentication, which is performed by the GuC. For 21 * The GuC to correctly perform the authentication, the HuC binary must be 77 * the authentication since its GGTT offset will be GuC in intel_huc_rsa_data_create() 176 /* Check authentication status, it should be done by now */ in intel_huc_auth() 191 i915_probe_error(gt->i915, "HuC: Authentication failed %d\n", ret); in intel_huc_auth()
|
/Linux-v5.10/Documentation/security/keys/ |
D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
/Linux-v5.10/fs/ubifs/ |
D | auth.c | 9 * This file implements various helper functions for UBIFS authentication support 54 * ubifs_prepare_auth_node - Prepare an authentication node 59 * This function prepares an authentication node for writing onto flash. 161 * Returns 0 if both hashes are equal or authentication is disabled, otherwise a 252 * ubifs_init_authentication - initialize UBIFS authentication support 265 ubifs_err(c, "authentication hash name needed with authentication"); in ubifs_init_authentication() 363 * This function releases the authentication related resources.
|
D | Kconfig | 90 bool "UBIFS authentication support" 95 Enable authentication support for UBIFS. This feature offers protection
|
/Linux-v5.10/include/drm/ |
D | drm_file.h | 166 * See also the :ref:`section on primary nodes and authentication 221 * See also the :ref:`section on primary nodes and authentication 233 * See also @authentication and @is_master and the :ref:`section on 234 * primary nodes and authentication <drm_primary_node>`. 241 /** @magic: Authentication magic, see @authenticated. */ 362 * See also the :ref:`section on primary nodes and authentication
|
/Linux-v5.10/include/uapi/linux/ |
D | nl80211.h | 186 * preshared key authentication in station mode. In %NL80211_CMD_CONNECT 194 * handshakes during 802.1X authentication in station mode. In order to 202 * preshared key authentication in AP mode. In %NL80211_CMD_START_AP 214 * DOC: FILS shared key authentication offload 216 * FILS shared key authentication offload can be advertized by drivers by 218 * FILS shared key authentication offload should be able to construct the 219 * authentication and association frames for FILS shared key authentication and 227 * rIK should be used to generate an authentication tag on the ERP message and 232 * When FILS shared key authentication is completed, driver needs to provide the 252 * DOC: SAE authentication offload [all …]
|
/Linux-v5.10/drivers/staging/greybus/ |
D | greybus_authentication.h | 3 * Greybus Component Authentication User Header 32 /* Authentication types */
|
/Linux-v5.10/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 58 * @options: authentication values and other options 168 * @options: authentication values and other options 233 * @options: authentication values and other options 296 * @options: authentication values and other options
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-bus-thunderbolt | 189 authentication procedure is started by writing to 202 When read holds status of the last authentication 270 authentication procedure is started by writing 1 to 275 When read holds status of the last authentication 301 area and prepare the device for authentication on disconnect.
|
/Linux-v5.10/net/xfrm/ |
D | Kconfig | 81 # This option selects XFRM_ALGO along with the AH authentication algorithms that 90 # This option selects XFRM_ALGO along with the ESP encryption and authentication
|
/Linux-v5.10/Documentation/target/ |
D | target-export-device | 73 # Disable authentication 74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
|