| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-auth | 2 # /etc/pam.d/common-auth - authentication settings common to all services 5 # and should contain a list of the authentication modules that define 6 # the central authentication scheme for use on the system 8 # traditional Unix authentication mechanisms.
|
| /OK3568_Linux_fs/buildroot/package/libpam-radius-auth/ |
| H A D | Config.in | 4 This is the PAM to RADIUS authentication module. It allows 6 authentication and accounting requests. You will need a 7 RADIUS server to perform the actual authentication.
|
| /OK3568_Linux_fs/kernel/Documentation/arm64/ |
| H A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 60 authentication extension. 73 authentication is present, the kernel will expose the position of TTBR0 92 Pointer authentication is enabled in KVM guest when each virtual cpu is 96 these userspace flags are checked before enabling pointer authentication.
|
| /OK3568_Linux_fs/kernel/drivers/target/iscsi/ |
| H A D | iscsi_target_tpg.c | 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 324 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 587 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 594 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 596 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 607 if (authentication) { in iscsit_ta_authentication() 640 a->authentication = authentication; in iscsit_ta_authentication() 642 a->authentication ? "Enforcing" : "Disabling", tpg->tpgt); in iscsit_ta_authentication()
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | ubifs-authentication.rst | 33 can be used to get full data authentication at the block layer. 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 38 name encryption, the authentication system could be tied into fscrypt such that 40 be possible to use UBIFS authentication without using encryption. 209 This chapter introduces UBIFS authentication which enables UBIFS to verify 216 UBIFS authentication enables detection of offline data modification. While it 221 UBIFS authentication will not protect against rollback of full flash contents. 235 UBIFS authentication does not cover attacks where an attacker is able to 236 execute code on the device after the authentication key was provided. 327 it is necessary to also add authentication information frequently to the [all …]
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 73 # Set this to 'yes' to enable PAM authentication, account processing, 74 # and session processing. If this is enabled, PAM authentication will 77 # PAM authentication via KbdInteractiveAuthentication may bypass 80 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/buildroot/board/rockchip/rk3566_rk3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 73 # Set this to 'yes' to enable PAM authentication, account processing, 74 # and session processing. If this is enabled, PAM authentication will 77 # PAM authentication via KbdInteractiveAuthentication may bypass 80 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/ |
| H A D | sshd_config | 74 # Set this to 'yes' to enable PAM authentication, account processing, 75 # and session processing. If this is enabled, PAM authentication will 78 # PAM authentication via ChallengeResponseAuthentication may bypass 81 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/buildroot/package/perl-mojolicious-plugin-authentication/ |
| H A D | Config.in | 2 bool "perl-mojolicious-plugin-authentication" 5 A plugin to make authentication a bit easier.
|
| /OK3568_Linux_fs/buildroot/package/sshpass/ |
| H A D | Config.in | 6 password authentication with SSH's so called 7 "interactive keyboard password authentication".
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/ |
| H A D | 0001-support-authentication-for-kickstart.patch | 4 Subject: [PATCH] support authentication for kickstart 7 we support basic/digest authentication. 9 Add KickstartAuthError to report authentication failure, 30 + KickstartAuthError - An exception for errors relating to authentication 42 + """An exception for errors relating to authentication failed while
|
| /OK3568_Linux_fs/buildroot/package/pamtester/ |
| H A D | Config.in | 5 A tiny utility for testing pluggable authentication modules 9 authentication system using common standards such as NIS, SASL
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
| H A D | vlock-no_tally.patch | 37 --enable-shadow enable shadow authentication [disabled] 66 +# display a summary of failed authentication attempts after successfully 105 … fprintf(stderr, "%d failed authentication %s.\n", auth_tries, auth_tries > 1 ? "tries" : "try");
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 385 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 386 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a 25 authentication token in its payload with a FEKEK randomly generated by the 30 authentication token, which content is well known, but only the FEKEK in
|
| /OK3568_Linux_fs/buildroot/package/lighttpd/ |
| H A D | Config.in | 30 bool "pam authentication support" 34 Enable PAM authentication support for lighttpd.
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0088-libweston-Add-user-authentication-support-via-PAM.patch | 4 Subject: [PATCH 88/92] libweston: Add user authentication support via PAM 6 Add user authentication support for remote backends via PAM. 128 + weston_log("PAM: authentication failed\n"); 154 +/* User authentication for remote backends */
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0089-libweston-Add-user-authentication-support-via-PAM.patch | 4 Subject: [PATCH 89/93] libweston: Add user authentication support via PAM 6 Add user authentication support for remote backends via PAM. 128 + weston_log("PAM: authentication failed\n"); 154 +/* User authentication for remote backends */
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | tls-offload.rst | 54 On the receive side if the device handled decryption and authentication 133 * crypto processing state (partial blocks, partial authentication tag, etc.) 140 crypto operations and authentication regardless of segmentation. For this 146 * partial authentication tag (all data had been seen but part of the 147 authentication tag has to be written or read from the subsequent segment) 156 The kernel stack performs record framing reserving space for the authentication 167 The device performs encryption and authentication of the record data. 168 It replaces the authentication tag and TCP checksum with correct values. 180 decryption, authentication for each record in the packet). The device leaves 221 data (to be able to insert the authentication tag) and move onto handling [all …]
|
| H A D | mac80211-auth-assoc-deauth.txt | 2 # This outlines the Linux authentication/association and 13 alt authentication needed (not FT)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/hostapd/hostapd/ |
| H A D | defconfig | 46 # WPA2/IEEE 802.11i RSN pre-authentication 125 # RADIUS authentication server. This provides access to the integrated EAP 135 # Use the hostapd's IEEE 802.11 authentication (ACL), but without
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27774-3.patch | 29 + * Curl_allow_auth_to_host() tells if authentication, cookies or other 64 + * Curl_allow_auth_to_host() tells if authentication, cookies or other
|
| /OK3568_Linux_fs/buildroot/package/mini-snmpd/ |
| H A D | mini-snmpd | 1 # Require client authentication, thus SNMP version 2c
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/ssv6xxx/script/ |
| H A D | hostapd.conf.AES.template | 199 # Station MAC address -based authentication 214 # IEEE 802.11 specifies two authentication algorithms. hostapd can be 215 # configured to allow both of these or only one. Open system authentication 217 # Bit fields of allowed authentication algorithms: 666 # mechanism used in wired authentication, but it also requires that the port 673 # to process EAP authentication locally without need for an external RADIUS 674 # server. This functionality can be used both as a local authentication server 677 # Use integrated EAP server instead of external RADIUS authentication 679 # authentication server. 735 # ephemeral DH key exchange. In most cases, the default RSA authentication does [all …]
|
| H A D | hostapd.conf.TKIP.template | 199 # Station MAC address -based authentication 214 # IEEE 802.11 specifies two authentication algorithms. hostapd can be 215 # configured to allow both of these or only one. Open system authentication 217 # Bit fields of allowed authentication algorithms: 666 # mechanism used in wired authentication, but it also requires that the port 673 # to process EAP authentication locally without need for an external RADIUS 674 # server. This functionality can be used both as a local authentication server 677 # Use integrated EAP server instead of external RADIUS authentication 679 # authentication server. 735 # ephemeral DH key exchange. In most cases, the default RSA authentication does [all …]
|