Searched full:asymmetric (Results 1 – 25 of 357) sorted by relevance
12345678910>>...15
4 Asymmetric / Public-key Cryptography Key Type11 - Accessing asymmetric keys.13 - Asymmetric key subtypes.21 The "asymmetric" key type is designed to be a container for the keys used in25 The asymmetric key is given a subtype that defines what sort of data is33 operations using that key. In such a case, the asymmetric key would then56 The asymmetric key type's match function can then perform a wider range of64 keyctl search @s asymmetric id:5acc214275 keyctl search @s asymmetric tpm:5acc214280 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 [][all …]
1 Asymmetric Cipher Algorithm Definitions7 Asymmetric Cipher API16 Asymmetric Cipher Request Handle
2 Asymmetric 32-bit SoCs7 This document describes the impact of asymmetric 32-bit SoCs on the38 allowing 32-bit tasks to run on an asymmetric 32-bit system requires an42 For the remainder of this document we will refer to an *asymmetric43 system* to mean an asymmetric 32-bit SoC running Linux with this kernel49 32-bit tasks running on an asymmetric system behave in mostly the same69 ``execve(2)``. This is not always possible on an asymmetric system,106 (e.g. by calling ``sched_setattr(2)``) is rejected on an asymmetric119 32-bit tasks on an asymmetric system. Failure to do so is likely to125 The affinity of a 32-bit task on an asymmetric system may include CPUs[all …]
2 /* Asymmetric public-key cryptography key type4 * See Documentation/crypto/asymmetric-keys.rst9 #include <keys/asymmetric-subtype.h>10 #include <keys/asymmetric-parser.h>127 * asymmetric_key_generate_id: Construct an asymmetric key ID133 * Construct an asymmetric key ID from a pair of binary blobs.154 * asymmetric_key_id_same - Return true if two asymmetric keys IDs are the same.169 * asymmetric_key_id_partial - Return true if two asymmetric keys IDs186 * asymmetric_match_key_ids - Search asymmetric key IDs245 * Match asymmetric keys by an exact match on an ID.[all …]
2 /* Signature verification with an asymmetric key4 * See Documentation/crypto/asymmetric-keys.rst11 #include <keys/asymmetric-subtype.h>68 * encrypt_blob - Encrypt data using an asymmetric key89 * decrypt_blob - Decrypt data using an asymmetric key110 * create_signature - Sign some data using an asymmetric key131 * verify_signature - Initiate the use of an asymmetric key to verify a signature132 * @key: The asymmetric key to verify against
3 bool "Asymmetric (public-key cryptographic) key type"7 the asymmetric keys used for public key cryptographic operations such14 tristate "Asymmetric public-key crypto algorithm subtype"20 This option provides support for asymmetric public key type handling.26 tristate "Asymmetric TPM backed private key subtype"
2 /* Internal definitions for asymmetric key type8 #include <keys/asymmetric-type.h>
2 /* Signature verification with an asymmetric key4 * See Documentation/crypto/asymmetric-keys.rst11 #include <keys/asymmetric-subtype.h>38 * query_asymmetric_key - Get information about an asymmetric key.68 * encrypt_blob - Encrypt data using an asymmetric key89 * decrypt_blob - Decrypt data using an asymmetric key110 * create_signature - Sign some data using an asymmetric key131 * verify_signature - Initiate the use of an asymmetric key to verify a signature132 * @key: The asymmetric key to verify against
2 /* Asymmetric public-key cryptography key type4 * See Documentation/crypto/asymmetric-keys.rst9 #include <keys/asymmetric-subtype.h>10 #include <keys/asymmetric-parser.h>139 * asymmetric_key_generate_id: Construct an asymmetric key ID145 * Construct an asymmetric key ID from a pair of binary blobs.166 * asymmetric_key_id_same - Return true if two asymmetric keys IDs are the same.182 * asymmetric_key_id_partial - Return true if two asymmetric keys IDs200 * asymmetric_match_key_ids - Search asymmetric key IDs 1 & 2259 * Match asymmetric keys by an exact match on one of the first two IDs.[all …]
3 bool "Asymmetric (public-key cryptographic) key type"7 the asymmetric keys used for public key cryptographic operations such14 tristate "Asymmetric public-key crypto algorithm subtype"20 This option provides support for asymmetric public key type handling.
2 /* Asymmetric public-key cryptography key subtype4 * See Documentation/crypto/asymmetric-keys.rst14 #include <keys/asymmetric-type.h>48 * asymmetric_key_subtype - Get the subtype from an asymmetric key51 * Retrieves and returns the subtype pointer of the asymmetric key from the
2 /* Asymmetric Public-key cryptography key type interface4 * See Documentation/crypto/asymmetric-keys.rst19 * The key payload is four words. The asymmetric-type key uses them as30 * Identifiers for an asymmetric key ID. We have three ways of looking up a
2 /* Asymmetric public-key cryptography data parser4 * See Documentation/crypto/asymmetric-keys.rst
8 * Defines an IMA hook to measure asymmetric keys on key12 #include <keys/asymmetric-type.h>16 * ima_post_key_create_or_update - measure asymmetric keys33 /* Only asymmetric keys are handled by this hook. */ in ima_post_key_create_or_update()
8 * Defines an IMA hook to measure asymmetric keys on key12 #include <keys/asymmetric-type.h>18 * ima_post_key_create_or_update - measure asymmetric keys35 /* Only asymmetric keys are handled by this hook. */ in ima_post_key_create_or_update()
2 /* Asymmetric public-key algorithm definitions4 * See Documentation/crypto/asymmetric-keys.rst18 * Cryptographic data for the public-key subtype of the asymmetric key type.
2 /* Asymmetric public-key algorithm definitions4 * See Documentation/crypto/asymmetric-keys.rst17 * Cryptographic data for the public-key subtype of the asymmetric key type.
5 * This file contains SPC-3 compliant asymmetric logical unit assigntment (ALUA)185 * Set the ASYMMETRIC ACCESS State in target_emulate_report_target_port_groups()189 * Set supported ASYMMETRIC ACCESS State bits in target_emulate_report_target_port_groups()321 * the state is a primary or secondary target port asymmetric in target_emulate_set_target_port_groups()329 * an invalid combination of target port asymmetric in target_emulate_set_target_port_groups()331 * unsupported target port asymmetric access state, in target_emulate_set_target_port_groups()341 * If the ASYMMETRIC ACCESS STATE field (see table 267) in target_emulate_set_target_port_groups()342 * specifies a primary target port asymmetric access state, in target_emulate_set_target_port_groups()345 * port asymmetric access state shall be changed. If the in target_emulate_set_target_port_groups()346 * ASYMMETRIC ACCESS STATE field specifies a secondary target in target_emulate_set_target_port_groups()[all …]
5 * This file contains SPC-3 compliant asymmetric logical unit assigntment (ALUA)188 * Set the ASYMMETRIC ACCESS State in target_emulate_report_target_port_groups()192 * Set supported ASYMMETRIC ACCESS State bits in target_emulate_report_target_port_groups()324 * the state is a primary or secondary target port asymmetric in target_emulate_set_target_port_groups()332 * an invalid combination of target port asymmetric in target_emulate_set_target_port_groups()334 * unsupported target port asymmetric access state, in target_emulate_set_target_port_groups()344 * If the ASYMMETRIC ACCESS STATE field (see table 267) in target_emulate_set_target_port_groups()345 * specifies a primary target port asymmetric access state, in target_emulate_set_target_port_groups()348 * port asymmetric access state shall be changed. If the in target_emulate_set_target_port_groups()349 * ASYMMETRIC ACCESS STATE field specifies a secondary target in target_emulate_set_target_port_groups()[all …]