Searched refs:authentication (Results  1 – 25 of 57) sorted by relevance
123
| /Linux-v5.4/Documentation/arm64/ | 
| D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux9 This document briefly describes the provision of pointer authentication
 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
 49 Presence of address authentication functionality is advertised via
 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
 60 authentication extension.
 73 authentication is present, the kernel will expose the position of TTBR0
 92 Pointer authentication is enabled in KVM guest when each virtual cpu is
 96 these userspace flags are checked before enabling pointer authentication.
 
 | 
| D | index.rst | 16     pointer-authentication
 | 
| D | elf_hwcaps.rst | 193     Documentation/arm64/pointer-authentication.rst.198     Documentation/arm64/pointer-authentication.rst.
 
 | 
| /Linux-v5.4/drivers/target/iscsi/ | 
| D | iscsi_target_tpg.c | 90 	tpg->tpg_attrib.authentication = 0;  in iscsit_load_discovery_tpg()212 	a->authentication = TA_AUTHENTICATION;  in iscsit_set_default_tpg_attribs()
 324 	if (tpg->tpg_attrib.authentication) {  in iscsit_tpg_enable_portal_group()
 584 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication)  in iscsit_ta_authentication()  argument
 591 	if ((authentication != 1) && (authentication != 0)) {  in iscsit_ta_authentication()
 593 			" %u, ignoring request.\n", authentication);  in iscsit_ta_authentication()
 604 	if (authentication) {  in iscsit_ta_authentication()
 637 	a->authentication = authentication;  in iscsit_ta_authentication()
 639 		a->authentication ? "Enforcing" : "Disabling", tpg->tpgt);  in iscsit_ta_authentication()
 
 | 
| D | iscsi_target_nego.c | 862 		if (conn->tpg->tpg_attrib.authentication &&  in iscsi_target_handle_csg_zero()872 		if (conn->tpg->tpg_attrib.authentication &&  in iscsi_target_handle_csg_zero()
 936 	     conn->tpg->tpg_attrib.authentication) {  in iscsi_target_handle_csg_one()
 
 | 
| /Linux-v5.4/Documentation/filesystems/ | 
| D | ubifs-authentication.rst | 29 can be used to get full data authentication at the block layer.33 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file
 34 name encryption, the authentication system could be tied into fscrypt such that
 36 be possible to use UBIFS authentication without using encryption.
 205 This chapter introduces UBIFS authentication which enables UBIFS to verify
 212 UBIFS authentication enables detection of offline data modification. While it
 217 UBIFS authentication will not protect against rollback of full flash contents.
 231 UBIFS authentication does not cover attacks where an attacker is able to
 232 execute code on the device after the authentication key was provided.
 323 it is necessary to also add authentication information frequently to the
 [all …]
 
 | 
| D | 9p.txt | 66 		names may require authentication.114   afid		security channel - used by Plan 9 authentication protocols
 
 | 
| D | ubifs.txt | 95 			Passing this option makes authentication mandatory.98 auth_hash_name=		The hash algorithm used for authentication. Used for
 
 | 
| /Linux-v5.4/Documentation/security/keys/ | 
| D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a25 authentication token in its payload with a FEKEK randomly generated by the
 30 authentication token, which content is well known, but only the FEKEK in
 
 | 
| /Linux-v5.4/Documentation/crypto/ | 
| D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size.214 To set the authentication tag size, the caller must use the setsockopt
 235 -  specification of the associated authentication data (AAD) with the
 265 -  associated authentication data (AAD)
 267 -  authentication tag
 269 The sizes of the AAD and the authentication tag are provided with the
 279 -  AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
 284 -  AEAD encryption output: ciphertext \|\| authentication tag
 374 -  ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
 375    AEAD ciphers. For a encryption operation, the authentication tag of
 [all …]
 
 | 
| /Linux-v5.4/Documentation/networking/ | 
| D | tls-offload.rst | 54 On the receive side if the device handled decryption and authentication133  * crypto processing state (partial blocks, partial authentication tag, etc.)
 140 crypto operations and authentication regardless of segmentation. For this
 146  * partial authentication tag (all data had been seen but part of the
 147    authentication tag has to be written or read from the subsequent segment)
 156 The kernel stack performs record framing reserving space for the authentication
 167 The device performs encryption and authentication of the record data.
 168 It replaces the authentication tag and TCP checksum with correct values.
 180 decryption, authentication for each record in the packet). The device leaves
 221 data (to be able to insert the authentication tag) and move onto handling
 [all …]
 
 | 
| D | mac80211-auth-assoc-deauth.txt | 2 # This outlines the Linux authentication/association and13 alt authentication needed (not FT)
 
 | 
| D | operstates.txt | 11 a site's networking policy and configuration, an 802.1X authentication148 -send RTM_SETLINK to set operstate to IF_OPER_UP if authentication
 
 | 
| /Linux-v5.4/fs/ubifs/ | 
| D | Kconfig | 89 	bool "UBIFS authentication support"94 	  Enable authentication support for UBIFS. This feature offers protection
 
 | 
| /Linux-v5.4/Documentation/target/ | 
| D | target-export-device | 74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
 | 
| /Linux-v5.4/Documentation/filesystems/nfs/ | 
| D | rpc-server-gss.txt | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS9 purposes of authentication.)
 
 | 
| /Linux-v5.4/fs/coda/ | 
| D | Kconfig | 11 	  replication, security model for authentication and encryption,
 | 
| /Linux-v5.4/Documentation/driver-api/mmc/ | 
| D | mmc-tools.rst | 29  - Program authentication key for the device.
 | 
| /Linux-v5.4/security/keys/ | 
| D | Kconfig | 10 	  This option provides support for retaining authentication tokens and42 	  filesystem in which each method needs to request an authentication
 
 | 
| /Linux-v5.4/drivers/staging/greybus/ | 
| D | Makefile | 8 gb-firmware-y		:= fw-core.o fw-download.o fw-management.o authentication.o
 | 
| /Linux-v5.4/fs/cifs/ | 
| D | Kconfig | 93 	  SMB protocol but LANMAN based authentication is needed to102 	  is enabled in the kernel build, LANMAN authentication will not be
 120 	  secure Kerberos authentication is required). If unsure, say Y.
 
 | 
| /Linux-v5.4/drivers/staging/wusbcore/Documentation/ | 
| D | wusb-cbaf | 12 Command for manipulating the pairing/authentication credentials of a
 | 
| /Linux-v5.4/Documentation/ABI/testing/ | 
| D | sysfs-bus-thunderbolt | 145 		authentication procedure is started by writing 1 to150 		When read holds status of the last authentication
 
 | 
| /Linux-v5.4/Documentation/admin-guide/ | 
| D | thunderbolt.rst | 189 Once the operation completes we can trigger NVM authentication and208 code from the last authentication cycle, which means the authentication
 
 | 
| /Linux-v5.4/Documentation/networking/mac80211_hwsim/ | 
| D | mac80211_hwsim.rst | 60 care of WPA2-PSK authentication. In addition, hostapd is also
 | 
        123