| /kernel/linux/linux-5.10/tools/testing/selftests/arm64/pauth/ |
| D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 257 struct signatures signed_vals; in TEST() 296 struct signatures new_keys; in TEST() 297 struct signatures old_keys; in TEST() 330 struct signatures trash; in TEST() [all …]
|
| D | exec_target.c | 12 struct signatures signed_vals; in main() 31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
| /kernel/linux/linux-6.6/tools/testing/selftests/arm64/pauth/ |
| D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 260 struct signatures signed_vals; in TEST() 299 struct signatures new_keys; in TEST() 300 struct signatures old_keys; in TEST() 333 struct signatures trash; in TEST() [all …]
|
| D | exec_target.c | 12 struct signatures signed_vals; in main() 31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
| /kernel/linux/linux-6.6/security/integrity/ima/ |
| D | Kconfig | 182 bool "Appraise firmware signatures" 192 bool "Appraise kexec kernel image signatures" 200 Kernel image signatures can not be verified by the original 205 bool "Appraise kernel modules signatures" 212 Kernel module signatures can only be verified by IMA-appraisal, 233 bool "Support module-style signatures for appraisal" 240 Adds support for signatures appended to files. The format of the 243 to accept such signatures.
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | Kconfig | 182 bool "Appraise firmware signatures" 192 bool "Appraise kexec kernel image signatures" 200 Kernel image signatures can not be verified by the original 205 bool "Appraise kernel modules signatures" 212 Kernel module signatures can only be verified by IMA-appraisal, 233 bool "Support module-style signatures for appraisal" 240 Adds support for signatures appended to files. The format of the 243 to accept such signatures.
|
| /kernel/linux/linux-5.10/drivers/scsi/ |
| D | fdomain_isa.c | 40 * The following BIOS signature signatures are for boards which do *NOT* 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
| /kernel/linux/linux-6.6/drivers/scsi/ |
| D | fdomain_isa.c | 40 * The following BIOS signature signatures are for boards which do *NOT* 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
| /kernel/linux/linux-5.10/security/integrity/platform_certs/ |
| D | load_uefi.c | 129 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs() 142 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs() 192 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs() 209 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs() 224 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
|
| D | load_powerpc.c | 77 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs() 88 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs()
|
| /kernel/linux/linux-6.6/fs/verity/ |
| D | signature.c | 3 * Verification of builtin signatures 9 * This file implements verification of fs-verity builtin signatures. Please 11 * signatures with fs-verity, and the alternatives (such as userspace signature 105 * The ".fs-verity" keyring is empty, due to builtin signatures in fsverity_verify_signature()
|
| D | Kconfig | 43 fs-verity builtin signatures. 46 the only way to do signatures with fs-verity, and the
|
| /kernel/linux/linux-6.6/security/integrity/platform_certs/ |
| D | load_powerpc.c | 104 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs() 121 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs() 137 pr_err("Couldn't parse trustedcadb signatures: %d\n", rc); in load_powerpc_certs() 153 pr_err("Couldn't parse moduledb signatures: %d\n", rc); in load_powerpc_certs()
|
| D | load_uefi.c | 130 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs() 143 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs() 193 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs() 210 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs() 229 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | module-signing.rst | 13 .. - Non-valid signatures and unsigned modules. 30 involved. The signatures are not themselves encoded in any industrial standard 93 their signatures checked without causing a dependency loop. 128 Cryptographic keypairs are required to generate and check signatures. A 132 kernel so that it can be used to check the signatures as the modules are 260 Non-valid signatures and unsigned modules
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/ |
| D | module-signing.rst | 13 .. - Non-valid signatures and unsigned modules. 30 involved. The signatures are not themselves encoded in any industrial standard 93 their signatures checked without causing a dependency loop. 128 Cryptographic keypairs are required to generate and check signatures. A 132 kernel so that it can be used to check the signatures as the modules are 260 Non-valid signatures and unsigned modules
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | ima_policy | 56 limited to fsverity digest based signatures 146 Example of appraise rule allowing modsig appended signatures: 172 signatures (format version 3) stored in security.ima xattr.
|
| /kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/include/nvfw/ |
| D | acr.h | 95 u32 signatures[4]; member 125 u32 signatures[4]; member
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 6 # both signatures depending on the IMA policy, or none. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 228 # Are there pe and ima signatures
|
| /kernel/linux/linux-5.10/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 6 # both signatures depending on the IMA policy, or none. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 227 # Are there pe and ima signatures
|
| /kernel/linux/linux-6.6/Documentation/process/ |
| D | maintainer-pgp-guide.rst | 29 Both git repositories and tarballs carry PGP signatures of the kernel 30 developers who create official kernel releases. These signatures offer a 35 - git repositories provide PGP signatures on all tags 36 - tarballs provide detached PGP signatures with all downloads 212 The more signatures you have on your PGP key from other developers, the 370 your signatures (if they know the passphrase). Furthermore, each time a 734 signatures. Furthermore, when rebasing your repository to match 735 upstream, even your own PGP commit signatures will end up discarded. For 749 signatures will be valuable for such purposes. 786 purpose that puts cryptographic attestation signatures into message [all …]
|
| /kernel/linux/linux-6.6/Documentation/filesystems/ |
| D | fsverity.rst | 81 library that supports digital signatures. 441 verification of fs-verity builtin signatures. 444 It is not the only way to do signatures with fs-verity, and the 477 signatures are not the only way to do signatures with fs-verity. See 479 fs-verity builtin signatures have some major limitations that should 511 - fs-verity builtin signatures are in PKCS#7 format, and the public 514 builtin signatures use them), and are very feature rich. 522 Ed25519 keys and signatures, and verifying signatures in userspace. 525 still consider that verifying those signatures in userspace is more 534 for its signatures, so it partially avoids the issues discussed
|
| /kernel/linux/linux-5.10/Documentation/process/ |
| D | maintainer-pgp-guide.rst | 29 Both git repositories and tarballs carry PGP signatures of the kernel 30 developers who create official kernel releases. These signatures offer a 35 - git repositories provide PGP signatures on all tags 36 - tarballs provide detached PGP signatures with all downloads 153 key using certifying key signatures (certificates). It is important to 234 much faster computationally and creates much smaller signatures when 250 The more signatures you have on your PGP key from other developers, the 410 your signatures (if they know the passphrase). Furthermore, each time a 769 verification, so it properly processes signatures made by ECC keys. 787 signatures. Furthermore, when rebasing your repository to match [all …]
|
| /kernel/linux/linux-6.6/kernel/module/ |
| D | signing.c | 113 * unparseable signatures, and signature check failures -- in module_sig_check() 114 * even if signatures aren't required. in module_sig_check()
|
| /kernel/linux/linux-6.6/Documentation/security/ |
| D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem. 82 to generate signatures, to load keys into the kernel keyring.
|