| /OK3568_Linux_fs/kernel/Documentation/arm64/ |
| H A D | pointer-authentication.rst | 2 Pointer authentication in AArch64 Linux 9 This document briefly describes the provision of pointer authentication 16 The ARMv8.3 Pointer Authentication extension adds primitives that can be 20 The extension uses a Pointer Authentication Code (PAC) to determine 38 (APDAKey, APDBKey), and one for generic authentication (APGAKey). 49 Presence of address authentication functionality is advertised via 50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG. 60 authentication extension. 73 authentication is present, the kernel will expose the position of TTBR0 92 Pointer authentication is enabled in KVM guest when each virtual cpu is [all …]
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | aead.h | 39 * crypto_aead_decrypt. That error indicates an authentication error, i.e. 50 * (resp. ciphertext) will grow (resp. shrink) by the authentication tag size 80 * @assoclen: Length in bytes of associated data for authentication 103 * @maxauthsize: Set the maximum authentication tag size supported by the 105 * As the authentication tag is a message digest to ensure the 107 * largest authentication tag possible as defined by this 109 * @setauthsize: Set authentication size for the AEAD transformation. This 111 * authentication tag to be either generated by the transformation 112 * during encryption or the size of the authentication tag to be 114 * responsible for checking the authentication tag size for [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | ubifs-authentication.rst | 3 .. UBIFS Authentication 8 UBIFS Authentication Support 33 can be used to get full data authentication at the block layer. 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 38 name encryption, the authentication system could be tied into fscrypt such that 40 be possible to use UBIFS authentication without using encryption. 206 UBIFS Authentication 209 This chapter introduces UBIFS authentication which enables UBIFS to verify 216 UBIFS authentication enables detection of offline data modification. While it 221 UBIFS authentication will not protect against rollback of full flash contents. [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
| H A D | wpa_supplicant.conf | 107 # EAP fast re-authentication 108 # By default, fast re-authentication is enabled for all EAP methods that 109 # support it. This variable can be used to disable fast re-authentication. 202 # WPA-EAP = WPA using EAP authentication (this can use an external 203 # program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication 204 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 209 # auth_alg: list of allowed IEEE 802.11 authentication algorithms 210 # OPEN = Open System authentication (required for WPA/WPA2) 211 # SHARED = Shared Key authentication (requires static WEP keys) 246 # Note: When using wired authentication, eapol_flags must be set to 0 for the [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ |
| H A D | sa2ul.h | 74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */ 108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */ 127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2 235 * @auth_size: Authentication size for pass 1 236 * @auth_size2: Authentication size for pass 2 237 * @auth_offset: Authentication payload offset 238 * @auth_iv: Authentication initialization vector 239 * @aux_key_info: Authentication aux key information 240 * @aux_key: Aux key for authentication 354 /* Authentication algorithms */ [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/ |
| H A D | 0001-support-authentication-for-kickstart.patch | 4 Subject: [PATCH] support authentication for kickstart 7 we support basic/digest authentication. 9 Add KickstartAuthError to report authentication failure, 30 + KickstartAuthError - An exception for errors relating to authentication 42 + """An exception for errors relating to authentication failed while 102 + log.info("Require Authentication") 103 + raise KickstartAuthError("Require Authentication.\nAppend 'ksuser=<username> kspasswd=…
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 29 # Authentication: 73 # Set this to 'yes' to enable PAM authentication, account processing, 74 # and session processing. If this is enabled, PAM authentication will 77 # PAM authentication via KbdInteractiveAuthentication may bypass 80 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/buildroot/board/rockchip/rk3566_rk3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 29 # Authentication: 73 # Set this to 'yes' to enable PAM authentication, account processing, 74 # and session processing. If this is enabled, PAM authentication will 77 # PAM authentication via KbdInteractiveAuthentication may bypass 80 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/ |
| H A D | sshd_config | 29 # Authentication: 74 # Set this to 'yes' to enable PAM authentication, account processing, 75 # and session processing. If this is enabled, PAM authentication will 78 # PAM authentication via ChallengeResponseAuthentication may bypass 81 # PAM authentication, then enable this but set PasswordAuthentication
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-auth | 2 # /etc/pam.d/common-auth - authentication settings common to all services 5 # and should contain a list of the authentication modules that define 6 # the central authentication scheme for use on the system 8 # traditional Unix authentication mechanisms.
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | userspace-if.rst | 213 system call family, the consumer must set the authentication tag size. 214 To set the authentication tag size, the caller must use the setsockopt 235 - specification of the associated authentication data (AAD) with the 265 - associated authentication data (AAD) 267 - authentication tag 269 The sizes of the AAD and the authentication tag are provided with the 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 385 - ALG_SET_AEAD_AUTHSIZE -- Setting the authentication tag size for 386 AEAD ciphers. For a encryption operation, the authentication tag of [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | tls-offload.rst | 54 On the receive side if the device handled decryption and authentication 133 * crypto processing state (partial blocks, partial authentication tag, etc.) 140 crypto operations and authentication regardless of segmentation. For this 146 * partial authentication tag (all data had been seen but part of the 147 authentication tag has to be written or read from the subsequent segment) 156 The kernel stack performs record framing reserving space for the authentication 167 The device performs encryption and authentication of the record data. 168 It replaces the authentication tag and TCP checksum with correct values. 180 decryption, authentication for each record in the packet). The device leaves 221 data (to be able to insert the authentication tag) and move onto handling [all …]
|
| /OK3568_Linux_fs/kernel/drivers/staging/greybus/Documentation/firmware/ |
| H A D | firmware-management | 40 ; (Optional) Component Authentication Protocol (CAP) on CPort 4 183 Sysfs Interfaces - Authentication 186 The Component Authentication Protocol interacts with Userspace using the 196 authentication a of particular interface. 198 The Authentication core creates a device of class 'gb_authenticate', which shall 237 /* Authentication types */ 291 Authentication. The user is required to fill the 'certificate_class' and 333 component authentication protocol.
|
| /OK3568_Linux_fs/kernel/include/linux/sunrpc/ |
| H A D | svcauth.h | 5 * RPC server-side authentication stuff. 59 /* Authentication is done in the context of a domain. 65 * a common mechanism for authentication and having a common mapping 71 * A domain is created by an authentication flavour module based on name 87 * Each authentication flavour registers an auth_ops 93 * If there is a problem with the authentication *authp should be set.
|
| /OK3568_Linux_fs/buildroot/package/perl-mojolicious-plugin-authentication/ |
| H A D | Config.in | 2 bool "perl-mojolicious-plugin-authentication" 5 A plugin to make authentication a bit easier. 7 https://github.com/benvanstaveren/Mojolicious-Plugin-Authentication
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | ccm.h | 8 * CCM combines Counter mode encryption with CBC-MAC authentication 152 * \param tag The buffer holding the authentication field. This must be a 154 * \param tag_len The length of the authentication field to generate in Bytes: 197 * \param tag The buffer holding the authentication field. This must be a 199 * \param tag_len The length of the authentication field to generate in Bytes: 236 * \param tag The buffer holding the authentication field. This must be a 238 * \param tag_len The length of the authentication field to generate in Bytes: 278 * \param tag The buffer holding the authentication field. This must be a 280 * \param tag_len The length of the authentication field in Bytes.
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | ccm.h | 8 * CCM combines Counter mode encryption with CBC-MAC authentication 152 * \param tag The buffer holding the authentication field. This must be a 154 * \param tag_len The length of the authentication field to generate in Bytes: 197 * \param tag The buffer holding the authentication field. This must be a 199 * \param tag_len The length of the authentication field to generate in Bytes: 236 * \param tag The buffer holding the authentication field. This must be a 238 * \param tag_len The length of the authentication field to generate in Bytes: 278 * \param tag The buffer holding the authentication field. This must be a 280 * \param tag_len The length of the authentication field in Bytes.
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | ccm.h | 8 * CCM combines Counter mode encryption with CBC-MAC authentication 152 * \param tag The buffer holding the authentication field. This must be a 154 * \param tag_len The length of the authentication field to generate in Bytes: 197 * \param tag The buffer holding the authentication field. This must be a 199 * \param tag_len The length of the authentication field to generate in Bytes: 236 * \param tag The buffer holding the authentication field. This must be a 238 * \param tag_len The length of the authentication field to generate in Bytes: 278 * \param tag The buffer holding the authentication field. This must be a 280 * \param tag_len The length of the authentication field in Bytes.
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | ccm.h | 8 * CCM combines Counter mode encryption with CBC-MAC authentication 152 * \param tag The buffer holding the authentication field. This must be a 154 * \param tag_len The length of the authentication field to generate in Bytes: 197 * \param tag The buffer holding the authentication field. This must be a 199 * \param tag_len The length of the authentication field to generate in Bytes: 236 * \param tag The buffer holding the authentication field. This must be a 238 * \param tag_len The length of the authentication field to generate in Bytes: 278 * \param tag The buffer holding the authentication field. This must be a 280 * \param tag_len The length of the authentication field in Bytes.
|
| /OK3568_Linux_fs/kernel/drivers/target/iscsi/ |
| H A D | iscsi_target_tpg.c | 78 * By default we disable authentication for discovery sessions, in iscsit_load_discovery_tpg() 90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg() 212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs() 317 * unless explictly disabled. Set the default to CHAP if authentication in iscsit_tpg_enable_portal_group() 324 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group() 587 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument 594 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication() 595 pr_err("Illegal value for authentication parameter:" in iscsit_ta_authentication() 596 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication() 607 if (authentication) { in iscsit_ta_authentication() [all …]
|
| /OK3568_Linux_fs/buildroot/package/libpam-radius-auth/ |
| H A D | Config.in | 4 This is the PAM to RADIUS authentication module. It allows 6 authentication and accounting requests. You will need a 7 RADIUS server to perform the actual authentication.
|
| /OK3568_Linux_fs/buildroot/package/libgsasl/ |
| H A D | Config.in | 5 Simple Authentication and Security Layer framework Library. 6 GNU SASL is an implementation of the Simple Authentication and 9 authentication from clients, and in clients to authenticate
|
| /OK3568_Linux_fs/u-boot/include/android_avb/ |
| H A D | avb_vbmeta_image.h | 73 * | Authentication data - variable size | 81 * The "Authentication data" block is |authentication_data_block_size| 102 * The size of each of the "Authentication data" and "Auxiliary data" 144 /* 32: Offset into the "Authentication data" block of hash data. */ 149 /* 48: Offset into the "Authentication data" block of signature data. */ 227 * stored in the "Authentication data" block does not match the 231 * signature stored in the "Authentication data" block is invalid or 254 * three blocks (header, authentication, auxiliary) that make up a
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/ssv6xxx/script/template/ |
| H A D | hostapd.conf | 176 # Station MAC address -based authentication 191 # IEEE 802.11 specifies two authentication algorithms. hostapd can be 192 # configured to allow both of these or only one. Open system authentication 194 # Bit fields of allowed authentication algorithms: 195 # bit 0 = Open System Authentication 196 # bit 1 = Shared Key Authentication (requires WEP) 626 # mechanism used in wired authentication, but it also requires that the port 633 # to process EAP authentication locally without need for an external RADIUS 634 # server. This functionality can be used both as a local authentication server 637 # Use integrated EAP server instead of external RADIUS authentication [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/ssv6xxx/script/ |
| H A D | hostapd.conf.AES.template | 199 # Station MAC address -based authentication 214 # IEEE 802.11 specifies two authentication algorithms. hostapd can be 215 # configured to allow both of these or only one. Open system authentication 217 # Bit fields of allowed authentication algorithms: 218 # bit 0 = Open System Authentication 219 # bit 1 = Shared Key Authentication (requires WEP) 666 # mechanism used in wired authentication, but it also requires that the port 673 # to process EAP authentication locally without need for an external RADIUS 674 # server. This functionality can be used both as a local authentication server 677 # Use integrated EAP server instead of external RADIUS authentication [all …]
|