Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 77) sorted by relevance

1234

/linux-6.1.9/Documentation/ABI/testing/
Dsysfs-class-firmware-attributes129 What: /sys/class/firmware-attributes/*/authentication/
136 Devices support various authentication mechanisms which can be exposed
146 Change in any of these two authentication methods will also generate an
151 <attr> authentication is enabled.
155 The type of authentication used.
175 The means of authentication. This attribute is mandatory.
236 Available for HDD and NVMe authentication to set 'user' or 'master'
245 Used with HDD and NVME authentication to set the drive index
250 These attributes are used for certificate based authentication. This is
252 based authentication.
[all …]
Dsysfs-bus-thunderbolt210 authentication procedure is started by writing to
226 When read holds status of the last authentication
242 area and prepare the device for authentication on disconnect.
351 authentication procedure is started by writing 1 to
356 When read holds status of the last authentication
/linux-6.1.9/drivers/platform/x86/dell/dell-wmi-sysman/
Dsysman.c76 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument
78 if (strlen(authentication) > 0) { in calculate_security_buffer()
79 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer()
80 strlen(authentication) % 2; in calculate_security_buffer()
92 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument
98 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
99 *seclen = strlen(authentication); in populate_security_buffer()
102 if (strlen(authentication) > 0) in populate_security_buffer()
103 memcpy(auth, authentication, *seclen); in populate_security_buffer()
Ddell-wmi-sysman.h187 size_t calculate_security_buffer(char *authentication);
188 void populate_security_buffer(char *buffer, char *authentication);
/linux-6.1.9/Documentation/arm64/
Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
91 Pointer authentication is enabled in KVM guest when each virtual cpu is
95 these userspace flags are checked before enabling pointer authentication.
Dindex.rst22 pointer-authentication
/linux-6.1.9/drivers/target/iscsi/
Discsi_target_tpg.c90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
324 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
586 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
593 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
595 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
606 if (authentication) { in iscsit_ta_authentication()
639 a->authentication = authentication; in iscsit_ta_authentication()
641 a->authentication ? "Enforcing" : "Disabling", tpg->tpgt); in iscsit_ta_authentication()
Discsi_target_nego.c826 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
840 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
847 if (nacl->node_attrib.authentication == NA_AUTHENTICATION_INHERITED) in iscsi_conn_auth_required()
848 return conn->tpg->tpg_attrib.authentication; in iscsi_conn_auth_required()
850 return nacl->node_attrib.authentication; in iscsi_conn_auth_required()
Discsi_target_configfs.c323 return sprintf(page, "%d\n", nacl->node_attrib.authentication); in iscsi_nacl_attrib_authentication_show()
340 nacl->node_attrib.authentication = val; in iscsi_nacl_attrib_authentication_store()
345 CONFIGFS_ATTR(iscsi_nacl_attrib_, authentication);
784 DEF_TPG_ATTRIB(authentication);
1323 discovery_tpg->tpg_attrib.authentication = 1; in iscsi_disc_enforce_discovery_auth_store()
1335 discovery_tpg->tpg_attrib.authentication = 0; in iscsi_disc_enforce_discovery_auth_store()
/linux-6.1.9/Documentation/filesystems/
Dubifs-authentication.rst33 can be used to get full data authentication at the block layer.
37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file
38 name encryption, the authentication system could be tied into fscrypt such that
40 be possible to use UBIFS authentication without using encryption.
209 This chapter introduces UBIFS authentication which enables UBIFS to verify
216 UBIFS authentication enables detection of offline data modification. While it
221 UBIFS authentication will not protect against rollback of full flash contents.
235 UBIFS authentication does not cover attacks where an attacker is able to
236 execute code on the device after the authentication key was provided.
327 it is necessary to also add authentication information frequently to the
[all …]
Dindex.rst120 ubifs-authentication
/linux-6.1.9/Documentation/crypto/
Duserspace-if.rst213 system call family, the consumer must set the authentication tag size.
214 To set the authentication tag size, the caller must use the setsockopt
235 - specification of the associated authentication data (AAD) with the
265 - associated authentication data (AAD)
267 - authentication tag
269 The sizes of the AAD and the authentication tag are provided with the
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
385 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for
386 AEAD ciphers. For a encryption operation, the authentication tag of
[all …]
/linux-6.1.9/Documentation/security/keys/
Decryptfs.rst17 FEK decryption is called authentication token and, currently, can be stored in a
25 authentication token in its payload with a FEKEK randomly generated by the
30 authentication token, which content is well known, but only the FEKEK in
/linux-6.1.9/Documentation/translations/zh_CN/arm64/
Delf_hwcaps.rst155 如 Documentation/arm64/pointer-authentication.rst 所描述,
160 如 Documentation/arm64/pointer-authentication.rst 所描述,
/linux-6.1.9/Documentation/translations/zh_TW/arm64/
Delf_hwcaps.rst158 如 Documentation/arm64/pointer-authentication.rst 所描述,
163 如 Documentation/arm64/pointer-authentication.rst 所描述,
/linux-6.1.9/Documentation/networking/
Dmac80211-auth-assoc-deauth.txt2 # This outlines the Linux authentication/association and
13 alt authentication needed (not FT)
Dtls-offload.rst54 On the receive side if the device handled decryption and authentication
133 * crypto processing state (partial blocks, partial authentication tag, etc.)
140 crypto operations and authentication regardless of segmentation. For this
146 * partial authentication tag (all data had been seen but part of the
147 authentication tag has to be written or read from the subsequent segment)
156 The kernel stack performs record framing reserving space for the authentication
167 The device performs encryption and authentication of the record data.
168 It replaces the authentication tag and TCP checksum with correct values.
180 decryption, authentication for each record in the packet). The device leaves
221 data (to be able to insert the authentication tag) and move onto handling
[all …]
/linux-6.1.9/drivers/net/wireless/purelifi/plfxlc/
DKconfig9 The driver supports common 802.11 encryption/authentication
/linux-6.1.9/net/xfrm/
DKconfig81 # This option selects XFRM_ALGO along with the AH authentication algorithms that
90 # This option selects XFRM_ALGO along with the ESP encryption and authentication
/linux-6.1.9/fs/ubifs/
DKconfig90 bool "UBIFS authentication support"
95 Enable authentication support for UBIFS. This feature offers protection
/linux-6.1.9/Documentation/target/
Dtarget-export-device74 echo 0 > $ISCSI_DIR/$IQN/tpgt_1/attrib/authentication
/linux-6.1.9/Documentation/filesystems/nfs/
Drpc-server-gss.rst6 implement RPCGSS authentication in kernel RPC servers such as the NFS
9 purposes of authentication.)
/linux-6.1.9/fs/coda/
DKconfig11 replication, security model for authentication and encryption,
/linux-6.1.9/Documentation/driver-api/mmc/
Dmmc-tools.rst29 - Program authentication key for the device.
/linux-6.1.9/security/keys/
DKconfig10 This option provides support for retaining authentication tokens and
38 filesystem in which each method needs to request an authentication

1234