Searched refs:keys (Results 1 – 11 of 11) sorted by relevance
/security/keys/ |
D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 65 This option provides support for holding large keys within the kernel 83 keys in the kernel. Trusted keys are random number symmetric keys, 84 generated and RSA-sealed by the TPM. The TPM only unseals the keys, 100 This option provides support for create/encrypting/decrypting keys 101 in the kernel. Encrypted keys are kernel generated random numbers, 109 bool "Diffie-Hellman operations on retained keys" [all …]
|
D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/ 32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
D | keyring.c | 143 assoc_array_init(&keyring->keys); in keyring_instantiate() 431 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy() 445 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe() 446 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe() 497 ret = assoc_array_iterate(&keyring->keys, in keyring_read() 506 ret = keyring->keys.nr_leaves_on_tree * sizeof(key_serial_t); in keyring_read() 651 object = assoc_array_find(&keyring->keys, in search_keyring() 656 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring() 732 ptr = READ_ONCE(keyring->keys.root); in search_nested_keyrings() 1109 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update() [all …]
|
D | gc.c | 135 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument 137 while (!list_empty(keys)) { in key_gc_unused_keys() 139 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
|
/security/integrity/ |
D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 76 bool "Enable loading of platform and blacklisted keys for POWER" 81 Enable loading of keys to the .platform keyring and blacklisted
|
/security/keys/encrypted-keys/ |
D | Makefile | 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
/security/integrity/ima/ |
D | Kconfig | 246 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)" 257 Intermediate keys between those the kernel has compiled in and the 258 IMA keys to be added may be added to the system secondary keyring, 269 revoked IMA keys. It is consulted before any other keyring. If 278 File signature verification is based on the public keys 279 loaded on the .ima trusted keyring. These public keys are 287 default "/etc/keys/x509_ima.der"
|
/security/keys/trusted-keys/ |
D | tpm2key.asn1 | 2 --- ASN.1 for TPM 2.0 keys
|
/security/ |
D | Makefile | 6 obj-$(CONFIG_KEYS) += keys/
|
D | Kconfig | 8 source "security/keys/Kconfig"
|
/security/integrity/evm/ |
D | Kconfig | 72 default "/etc/keys/x509_evm.der"
|