Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 12 of 12) sorted by relevance

/security/integrity/
A DKconfig29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
73 be added. This keyring shall contain just MOK keys. Unlike keys
86 other MOK keys load into the platform keyring.
89 bool "Only CA keys without DigitialSignature usage set"
[all …]
/security/keys/
A DKconfig11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
60 bool "Large payload keys"
76 keys in the kernel. Trusted keys are random number symmetric keys,
83 source "security/keys/trusted-keys/Kconfig"
97 in the kernel. Encrypted keys are instantiated using kernel
106 bool "Allow encrypted keys with user decrypted data"
116 bool "Diffie-Hellman operations on retained keys"
123 public keys and shared secrets using values stored as keys
[all …]
A DMakefile31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
A Dkeyring.c143 assoc_array_init(&keyring->keys); in keyring_instantiate()
431 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy()
445 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe()
446 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe()
497 ret = assoc_array_iterate(&keyring->keys, in keyring_read()
506 ret = keyring->keys.nr_leaves_on_tree * sizeof(key_serial_t); in keyring_read()
651 object = assoc_array_find(&keyring->keys, in search_keyring()
732 ptr = READ_ONCE(keyring->keys.root); in search_nested_keyrings()
1317 edit = assoc_array_insert(&keyring->keys, in __key_link_begin()
1731 result = assoc_array_iterate(&keyring->keys, in keyring_gc()
[all …]
A Dgc.c135 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument
137 while (!list_empty(keys)) { in key_gc_unused_keys()
139 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
/security/keys/trusted-keys/
A DKconfig5 bool "TPM-based trusted keys"
18 backend. Trusted keys are random number symmetric keys,
20 The TPM only unseals the keys, if the boot PCRs and other
24 bool "TEE-based trusted keys"
33 bool "CAAM-based trusted keys"
43 bool "DCP-based trusted keys"
A Dtpm2key.asn12 --- ASN.1 for TPM 2.0 keys
/security/keys/encrypted-keys/
A DMakefile6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
8 encrypted-keys-y := encrypted.o ecryptfs_format.o
11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/security/integrity/ima/
A DKconfig247 bool "Permit keys validly signed by a built-in, machine (if configured) or secondary"
259 Intermediate keys between those the kernel has compiled in and the
260 IMA keys to be added may be added to the system secondary keyring,
271 revoked IMA keys. It is consulted before any other keyring. If
280 File signature verification is based on the public keys
281 loaded on the .ima trusted keyring. These public keys are
289 default "/etc/keys/x509_ima.der"
/security/
A DMakefile6 obj-$(CONFIG_KEYS) += keys/
A DKconfig8 source "security/keys/Kconfig"
/security/integrity/evm/
A DKconfig74 default "/etc/keys/x509_evm.der"

Completed in 15 milliseconds