| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| A D | spmobj-attributes.c | 42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument 46 if (!authentication) in hp_calculate_security_buffer() 49 authlen = strlen(authentication); in hp_calculate_security_buffer() 54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer() 69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument 75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer() 81 auth = hp_ascii_to_utf16_unicode(auth, authentication); in hp_populate_security_buffer() 93 authentication); in hp_populate_security_buffer()
|
| /linux/Documentation/ABI/testing/ |
| A D | sysfs-class-firmware-attributes | 149 What: /sys/class/firmware-attributes/*/authentication/ 171 <attr> authentication is enabled. 175 The type of authentication used. 195 The means of authentication. This attribute is mandatory. 272 based authentication. 286 echo "signature" > authentication/Admin/signature 291 echo "signature" > authentication/Admin/signature 292 echo "" > authentication/Admin/certificate 296 echo "signature" > authentication/Admin/signature 316 echo "signature" > authentication/Admin/signature [all …]
|
| /linux/drivers/platform/x86/dell/dell-wmi-sysman/ |
| A D | sysman.c | 76 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument 78 if (strlen(authentication) > 0) { in calculate_security_buffer() 79 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer() 80 strlen(authentication) % 2; in calculate_security_buffer() 92 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument 98 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer() 99 *seclen = strlen(authentication); in populate_security_buffer() 102 if (strlen(authentication) > 0) in populate_security_buffer() 103 memcpy(auth, authentication, *seclen); in populate_security_buffer()
|
| A D | dell-wmi-sysman.h | 187 size_t calculate_security_buffer(char *authentication); 188 void populate_security_buffer(char *buffer, char *authentication);
|
| /linux/Documentation/arch/arm64/ |
| A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 57 with HINT space pointer authentication instructions protecting 59 with or without pointer authentication support. 72 authentication is present, the kernel will expose the position of TTBR0 91 Pointer authentication is enabled in KVM guest when each virtual cpu is 95 these userspace flags are checked before enabling pointer authentication.
|
| A D | index.rst | 24 pointer-authentication
|
| /linux/drivers/target/iscsi/ |
| A D | iscsi_target_tpg.c | 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 323 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 585 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 592 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 594 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 605 if (authentication) { in iscsit_ta_authentication() 638 a->authentication = authentication; in iscsit_ta_authentication() 640 a->authentication ? "Enforcing" : "Disabling", tpg->tpgt); in iscsit_ta_authentication()
|
| /linux/Documentation/filesystems/ |
| A D | ubifs-authentication.rst | 33 can be used to get full data authentication at the block layer. 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 40 be possible to use UBIFS authentication without using encryption. 235 UBIFS authentication does not cover attacks where an attacker is able to 236 execute code on the device after the authentication key was provided. 327 it is necessary to also add authentication information frequently to the 334 authentication node. The tail of the journal which may not have a authentication 337 We get this picture for journal authentication:: 402 a dedicated authentication key. 413 authentication in addition to the derived fscrypt master key used for [all …]
|
| /linux/Documentation/security/keys/ |
| A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
| /linux/Documentation/driver-api/media/drivers/ |
| A D | ipu6.rst | 31 interrupt handling, firmware authentication and global timer sync. 60 Security and firmware authentication 64 undergo an authentication process before it is allowed to executed on the IPU6 66 (CSE) to complete authentication process. The CSE is responsible of 68 into an isolated memory region. Firmware authentication process is implemented 122 metadata are defined by CSE and used by CSE for authentication. Module data is 127 ``FW_SOURCE_BASE`` register. Finally the CSE will do authentication for this
|
| /linux/Documentation/crypto/ |
| A D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 394 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 395 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
| /linux/Documentation/translations/zh_CN/arch/arm64/ |
| A D | elf_hwcaps.rst | 155 如 Documentation/arch/arm64/pointer-authentication.rst 所描述, 160 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
|
| /linux/Documentation/translations/zh_TW/arch/arm64/ |
| A D | elf_hwcaps.rst | 158 如 Documentation/arch/arm64/pointer-authentication.rst 所描述, 163 如 Documentation/arch/arm64/pointer-authentication.rst 所描述,
|
| /linux/Documentation/networking/ |
| A D | mac80211-auth-assoc-deauth.txt | 2 # This outlines the Linux authentication/association and 13 alt authentication needed (not FT)
|
| A D | tls-offload.rst | 54 On the receive side if the device handled decryption and authentication 140 crypto operations and authentication regardless of segmentation. For this 146 * partial authentication tag (all data had been seen but part of the 147 authentication tag has to be written or read from the subsequent segment) 167 The device performs encryption and authentication of the record data. 168 It replaces the authentication tag and TCP checksum with correct values. 180 decryption, authentication for each record in the packet). The device leaves 221 data (to be able to insert the authentication tag) and move onto handling 282 The device can, however, collect the authentication algorithm's state 379 For example authentication failure for any record in the segment should [all …]
|
| A D | tls-handshake.rst | 12 addition to peer authentication. 126 during this type of handshake. Only server authentication (ie the client 188 | | authentication failed | 194 | -ENOKEY | Missing authentication material |
|
| /linux/arch/arm64/configs/ |
| A D | hardening.config | 10 # Pointer authentication (ARMv8.3 and later). If hardware actually supports
|
| /linux/drivers/net/wireless/purelifi/plfxlc/ |
| A D | Kconfig | 9 The driver supports common 802.11 encryption/authentication
|
| /linux/fs/ubifs/ |
| A D | Kconfig | 90 bool "UBIFS authentication support" 95 Enable authentication support for UBIFS. This feature offers protection
|
| /linux/net/xfrm/ |
| A D | Kconfig | 82 # This option selects XFRM_ALGO along with the AH authentication algorithms that 91 # This option selects XFRM_ALGO along with the ESP encryption and authentication
|
| /linux/Documentation/devicetree/bindings/remoteproc/ |
| A D | qcom,sm8550-pas.yaml | 55 - description: Memory region for main Firmware authentication 56 - description: Memory region for Devicetree Firmware authentication
|
| /linux/Documentation/target/ |
| A D | target-export-device | 74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
|
| /linux/Documentation/filesystems/nfs/ |
| A D | rpc-server-gss.rst | 6 implement RPCGSS authentication in kernel RPC servers such as the NFS 9 purposes of authentication.)
|
| /linux/fs/coda/ |
| A D | Kconfig | 11 replication, security model for authentication and encryption,
|
| /linux/Documentation/driver-api/mmc/ |
| A D | mmc-tools.rst | 29 - Program authentication key for the device.
|