Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 128) sorted by relevance

123456

/linux/crypto/asymmetric_keys/
A Drestrict.c121 struct key *trusted, bool check_dest) in key_or_keyring_common() argument
134 if (!trusted && !check_dest) in key_or_keyring_common()
146 if (trusted) { in key_or_keyring_common()
147 if (trusted->type == &key_type_keyring) { in key_or_keyring_common()
149 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common()
153 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common()
156 signer_ids = asymmetric_key_ids(trusted); in key_or_keyring_common()
180 key = __key_get(trusted); in key_or_keyring_common()
186 key = __key_get(trusted); in key_or_keyring_common()
233 struct key *trusted) in restrict_link_by_key_or_keyring() argument
[all …]
/linux/security/keys/trusted-keys/
A D.built-in.a.cmd1trusted-keys/built-in.a := echo >/dev/null; rm -f security/keys/trusted-keys/built-in.a; /usr/bin/…
A DMakefile6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o
7 trusted-y += trusted_core.o
8 trusted-y += trusted_tpm1.o
11 trusted-y += trusted_tpm2.o
12 trusted-y += tpm2key.asn1.o
14 trusted-$(CONFIG_TEE) += trusted_tee.o
A D.tpm2key.asn1.o.cmd1trusted-keys/tpm2key.asn1.o := /usr/bin/ccache /home/test/workspace/code/optee_3.16/build/../toolc…
3 source_security/keys/trusted-keys/tpm2key.asn1.o := security/keys/trusted-keys/tpm2key.asn1.c
5 deps_security/keys/trusted-keys/tpm2key.asn1.o := \
45 security/keys/trusted-keys/tpm2key.asn1.h \
48 security/keys/trusted-keys/tpm2key.asn1.o: $(deps_security/keys/trusted-keys/tpm2key.asn1.o)
50 $(deps_security/keys/trusted-keys/tpm2key.asn1.o):
A D.trusted_tpm2.o.cmd1trusted-keys/trusted_tpm2.o := /usr/bin/ccache /home/test/workspace/code/optee_3.16/build/../toolc…
3 source_security/keys/trusted-keys/trusted_tpm2.o := security/keys/trusted-keys/trusted_tpm2.c
5 deps_security/keys/trusted-keys/trusted_tpm2.o := \
1254 include/keys/trusted-type.h \
1259 security/keys/trusted-keys/tpm2key.asn1.h \
1262 security/keys/trusted-keys/trusted_tpm2.o: $(deps_security/keys/trusted-keys/trusted_tpm2.o)
1264 $(deps_security/keys/trusted-keys/trusted_tpm2.o):
/linux/security/keys/
A Dbuilt-in.a16 trusted-keys/trusted_core.o/
17 trusted-keys/trusted_tpm1.o/
18 trusted-keys/trusted_tpm2.o/
19 trusted-keys/tpm2key.asn1.o/
20 trusted-keys/trusted_tee.o/
A DMakefile31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
A D.built-in.a.cmd1 …/proc.o security/keys/sysctl.o security/keys/keyctl_pkey.o security/keys/trusted-keys/built-in.a s…
/linux/security/
A Dbuilt-in.a16 keys/trusted-keys/trusted_core.o/
17 keys/trusted-keys/trusted_tpm1.o/
18 keys/trusted-keys/trusted_tpm2.o/
19 keys/trusted-keys/tpm2key.asn1.o/
20 keys/trusted-keys/trusted_tee.o/
/linux/Documentation/devicetree/bindings/arm/firmware/
A Dtlm,trusted-foundations.yaml4 $id: "http://devicetree.org/schemas/arm/firmware/tlm,trusted-foundations.yaml#"
18 const: trusted-foundations
21 const: tlm,trusted-foundations
41 trusted-foundations {
42 compatible = "tlm,trusted-foundations";
/linux/Documentation/security/keys/
A Dtrusted-encrypted.rst146 keyctl add trusted name "new keylen [options]" ring
183 keyctl add trusted name "new keylen" ring
184 keyctl add trusted name "load hex_blob" ring
208 key-type:= 'trusted' | 'user'
210 Examples of trusted and encrypted key usage
221 $ keyctl add trusted kmk "new 32" @u
242 Load a trusted key from the saved blob::
244 $ keyctl add trusted kmk "load `cat kmk.blob`" @u
277 encrypted key "evm" using the above trusted key "kmk":
281 $ keyctl add encrypted evm "new trusted:kmk 32" @u
[all …]
A Dindex.rst11 trusted-encrypted
A Decryptfs.rst35 time after the unsealing of a 'trusted' key in order to perform the mount in a
49 key-type:= 'trusted' | 'user'
/linux/certs/
A DKconfig45 bool "Provide system-wide ring of trusted keys"
49 Provide a system keyring to which trusted keys can be added. Keys in
50 the keyring are considered to be trusted. Keys may be added at will
62 containing trusted X.509 certificates to be included in the default
64 also trusted.
75 image. This allows introducing a trusted certificate to the default
92 into the kernel or already in the secondary trusted keyring.
/linux/security/integrity/ima/
A DKconfig205 be signed and verified by a public key on the trusted IMA
218 and verified by a public key on the trusted IMA keyring.
230 and verified by a key on the trusted IMA keyring.
261 keyring be signed by a key on the system trusted keyring.
275 secondary trusted keyrings.
280 built-in or secondary trusted keyrings.
294 bool "Load X509 certificate onto the '.ima' trusted keyring"
299 loaded on the .ima trusted keyring. These public keys are
300 X509 certificates signed by a trusted key on the
302 loading from the kernel onto the '.ima' trusted keyring.
[all …]
/linux/Documentation/admin-guide/hw-vuln/
A Dcore-scheduling.rst21 user-designated trusted group can share a core. This increase in core sharing
101 trusted (same cookie) at any point in time. Kernel threads are assumed trusted.
110 the idle task is selected. Idle task is globally trusted.
126 priority task is not trusted with respect to the core wide highest priority
127 task. If a sibling does not have a trusted task to run, it will be forced idle
157 and are considered system-wide trusted. The forced-idling of siblings running
166 Core scheduling tries to guarantee that only trusted tasks run concurrently on a
168 concurrently or kernel could be running concurrently with a task not trusted by
173 Core scheduling selects only trusted tasks to run together. IPI is used to notify
207 allowing system processes (trusted tasks) to share a core.
/linux/include/crypto/
A Dpublic_key.h67 struct key *trusted);
72 struct key *trusted);
/linux/security/integrity/evm/
A DKconfig59 bool "Load an X509 certificate onto the '.evm' trusted keyring"
63 Load an X509 certificate onto the '.evm' trusted keyring.
66 onto the '.evm' trusted keyring. A public key can be used to
/linux/Documentation/ABI/testing/
A Devm13 trusted/encrypted key stored in the Kernel Key
89 as part of the trusted boot. For more information on
90 creating and loading existing trusted/encrypted keys,
92 Documentation/security/keys/trusted-encrypted.rst. Both
/linux/security/integrity/
A DKconfig52 .evm keyrings be signed by a key on the system trusted
56 bool "Provide keyring for platform/firmware trusted keys"
60 Provide a separate, distinct keyring for platform trusted keys, which
/linux/Documentation/admin-guide/device-mapper/
A Dverity.rst64 and the salt. This hash should be trusted as there is no other authenticity
138 trusted keyring by default, or the secondary trusted keyring if
140 trusted keyring includes by default the builtin trusted keyring, and it can
142 already in the secondary trusted keyring.
/linux/drivers/net/ethernet/intel/ice/
A Dice_virtchnl_pf.h124 u8 trusted:1; member
185 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted);
289 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() argument
/linux/drivers/net/netdevsim/
A Dnetdev.c161 nsim_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust()
184 ivi->trusted = nsim_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
/linux/include/linux/
A Dif_link.h30 __u32 trusted; member
/linux/drivers/net/ethernet/intel/ixgbe/
A Dixgbe_sriov.c108 adapter->vfinfo[i].trusted = false; in __ixgbe_enable_sriov()
928 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_mac_addr()
970 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_macvlan_msg()
1151 !adapter->vfinfo[vf].trusted) { in ixgbe_update_vf_xcast_mode()
1687 if (adapter->vfinfo[vf].trusted == setting) in ixgbe_ndo_set_vf_trust()
1690 adapter->vfinfo[vf].trusted = setting; in ixgbe_ndo_set_vf_trust()
1715 ivi->trusted = adapter->vfinfo[vf].trusted; in ixgbe_ndo_get_vf_config()

Completed in 33 milliseconds

123456