Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 11 of 11) sorted by relevance

/security/keys/
DKconfig11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
60 bool "Large payload keys"
65 This option provides support for holding large keys within the kernel
83 keys in the kernel. Trusted keys are random number symmetric keys,
84 generated and RSA-sealed by the TPM. The TPM only unseals the keys,
100 This option provides support for create/encrypting/decrypting keys
101 in the kernel. Encrypted keys are kernel generated random numbers,
109 bool "Diffie-Hellman operations on retained keys"
[all …]
DMakefile31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
Dkeyring.c143 assoc_array_init(&keyring->keys); in keyring_instantiate()
431 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy()
445 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe()
446 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe()
497 ret = assoc_array_iterate(&keyring->keys, in keyring_read()
506 ret = keyring->keys.nr_leaves_on_tree * sizeof(key_serial_t); in keyring_read()
651 object = assoc_array_find(&keyring->keys, in search_keyring()
656 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring()
732 ptr = READ_ONCE(keyring->keys.root); in search_nested_keyrings()
1109 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update()
[all …]
Dgc.c135 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument
137 while (!list_empty(keys)) { in key_gc_unused_keys()
139 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
/security/integrity/
DKconfig29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
60 Provide a separate, distinct keyring for platform trusted keys, which
76 bool "Enable loading of platform and blacklisted keys for POWER"
81 Enable loading of keys to the .platform keyring and blacklisted
/security/keys/encrypted-keys/
DMakefile6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
8 encrypted-keys-y := encrypted.o ecryptfs_format.o
11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/security/integrity/ima/
DKconfig246 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
257 Intermediate keys between those the kernel has compiled in and the
258 IMA keys to be added may be added to the system secondary keyring,
269 revoked IMA keys. It is consulted before any other keyring. If
278 File signature verification is based on the public keys
279 loaded on the .ima trusted keyring. These public keys are
287 default "/etc/keys/x509_ima.der"
/security/keys/trusted-keys/
Dtpm2key.asn12 --- ASN.1 for TPM 2.0 keys
/security/
DMakefile6 obj-$(CONFIG_KEYS) += keys/
DKconfig8 source "security/keys/Kconfig"
/security/integrity/evm/
DKconfig72 default "/etc/keys/x509_evm.der"