| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | restrict.c | 121 struct key *trusted, bool check_dest) in key_or_keyring_common() argument 134 if (!trusted && !check_dest) in key_or_keyring_common() 146 if (trusted) { in key_or_keyring_common() 147 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 149 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common() 153 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 156 signer_ids = asymmetric_key_ids(trusted); in key_or_keyring_common() 180 key = __key_get(trusted); in key_or_keyring_common() 186 key = __key_get(trusted); in key_or_keyring_common() 233 struct key *trusted) in restrict_link_by_key_or_keyring() argument [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 24 By default, trusted keys are sealed under the SRK, which has the default 49 keyctl add trusted name "new keylen [options]" ring 50 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring 84 'master' key can either be a trusted-key or user-key type. The main 85 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 104 key-type:= 'trusted' | 'user' 107 Examples of trusted and encrypted key usage: 109 Create and save a trusted key named "kmk" of length 32 bytes. 117 $ keyctl add trusted kmk "new 32" @u 124 440502848 --alswrv 500 500 \_ trusted: kmk [all …]
|
| D | index.rst | 11 trusted-encrypted
|
| D | ecryptfs.rst | 35 time after the unsealing of a 'trusted' key in order to perform the mount in a 49 key-type:= 'trusted' | 'user'
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/arm/firmware/ |
| D | tlm,trusted-foundations.txt | 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations";
|
| /kernel/linux/linux-5.10/security/keys/trusted-keys/ |
| D | Makefile | 6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o 7 trusted-y += trusted_tpm1.o 8 trusted-y += trusted_tpm2.o
|
| /kernel/linux/linux-5.10/certs/ |
| D | Kconfig | 45 bool "Provide system-wide ring of trusted keys" 49 Provide a system keyring to which trusted keys can be added. Keys in 50 the keyring are considered to be trusted. Keys may be added at will 62 containing trusted X.509 certificates to be included in the default 64 also trusted. 75 image. This allows introducing a trusted certificate to the default 92 into the kernel or already in the secondary trusted keyring.
|
| /kernel/linux/linux-5.10/include/crypto/ |
| D | public_key.h | 68 struct key *trusted); 73 struct key *trusted);
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | Kconfig | 203 be signed and verified by a public key on the trusted IMA 216 and verified by a public key on the trusted IMA keyring. 228 and verified by a key on the trusted IMA keyring. 259 keyring be signed by a key on the system trusted keyring. 273 secondary trusted keyrings. 278 built-in or secondary trusted keyrings. 292 bool "Load X509 certificate onto the '.ima' trusted keyring" 297 loaded on the .ima trusted keyring. These public keys are 298 X509 certificates signed by a trusted key on the 300 loading from the kernel onto the '.ima' trusted keyring. [all …]
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | evm | 12 trusted/encrypted key stored in the Kernel Key 82 as part of the trusted boot. For more information on 83 creating and loading existing trusted/encrypted keys, 85 Documentation/security/keys/trusted-encrypted.rst. Both
|
| D | sysfs-class-bdi | 49 be trusted to play fair.
|
| /kernel/linux/linux-5.10/security/integrity/evm/ |
| D | Kconfig | 59 bool "Load an X509 certificate onto the '.evm' trusted keyring" 63 Load an X509 certificate onto the '.evm' trusted keyring. 66 onto the '.evm' trusted keyring. A public key can be used to
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/intel/ice/ |
| D | ice_virtchnl_pf.h | 87 u8 trusted:1; member 126 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 192 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() argument
|
| /kernel/linux/linux-5.10/security/integrity/ |
| D | Kconfig | 52 .evm keyrings be signed by a key on the system trusted 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | if_link.h | 30 __u32 trusted; member
|
| /kernel/linux/linux-5.10/drivers/net/netdevsim/ |
| D | netdev.c | 156 nsim_bus_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust() 179 ivi->trusted = nsim_bus_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/pensando/ionic/ |
| D | ionic.h | 29 u8 trusted; member
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/intel/i40e/ |
| D | i40e_virtchnl_pf.h | 82 bool trusted; member
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbe/ |
| D | ixgbe_sriov.c | 109 adapter->vfinfo[i].trusted = false; in __ixgbe_enable_sriov() 958 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_mac_addr() 1000 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_macvlan_msg() 1181 !adapter->vfinfo[vf].trusted) { in ixgbe_update_vf_xcast_mode() 1824 if (adapter->vfinfo[vf].trusted == setting) in ixgbe_ndo_set_vf_trust() 1827 adapter->vfinfo[vf].trusted = setting; in ixgbe_ndo_set_vf_trust() 1852 ivi->trusted = adapter->vfinfo[vf].trusted; in ixgbe_ndo_get_vf_config()
|
| /kernel/linux/linux-5.10/Documentation/filesystems/ |
| D | overlayfs.rst | 103 is it must support the creation of trusted.* extended attributes, and 153 A directory is made opaque by setting the xattr "trusted.overlay.opaque" 202 copied up (but not the contents). Then the "trusted.overlay.redirect" 243 upper directory is stored in a "trusted.overlay.upper" extended attribute 365 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible 396 filesystem, are encoded and stored in the "trusted.overlay.origin" extended 484 attribute "trusted.overlay.origin" on the upper inode. 488 to by the "trusted.overlay.redirect" extended attribute, will verify 507 "trusted.overlay.upper" with an encoded file handle of the upper 524 are stored in extended attribute "trusted.overlay.origin".
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 343 The kernel builtin trusted keyring will be searched for the signing key. 344 If the builtin trusted keyring is not configured, all links will be 348 2) Restrict using the kernel builtin and secondary trusted keyrings 353 The kernel builtin and secondary trusted keyrings will be searched for the 354 signing key. If the secondary trusted keyring is not configured, this
|
| /kernel/linux/linux-5.10/drivers/crypto/ccp/ |
| D | Kconfig | 47 enable third-party trusted applications.
|
| /kernel/linux/linux-5.10/arch/arm/boot/dts/ |
| D | tegra114-tn7.dts | 24 trusted-foundations { 25 compatible = "tlm,trusted-foundations";
|
| /kernel/linux/linux-5.10/Documentation/ABI/stable/ |
| D | sysfs-bus-usb | 128 be trusted, as the device may have a smaller config descriptor 130 can be trusted, and can be used to seek forward one (sub)
|