Home
last modified time | relevance | path

Searched refs:signing (Results 1 – 25 of 34) sorted by relevance

12

/linux-6.3-rc2/Documentation/admin-guide/
A Dmodule-signing.rst1 Kernel module signing facility
7 .. - Configuring module signing.
8 .. - Generating signing keys.
10 .. - Manually signing modules.
21 The kernel module signing facility cryptographically signs modules during
38 Configuring module signing
41 The module signing facility is enabled by going to the
96 (4) :menuselection:`File name or PKCS#11 URI of module signing key`
125 Generating signing keys
212 Manually signing modules
[all …]
A Dindex.rst115 module-signing
/linux-6.3-rc2/certs/
A DKconfig5 string "File name or PKCS#11 URI of module signing key"
16 certificate as described in Documentation/admin-guide/module-signing.rst
19 prompt "Type of module signing key to be generated"
22 The type of module signing key type to generate. This option
28 Use an RSA key for module signing.
34 Use an elliptic curve key (NIST P384) for module signing. Consider
37 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
62 system keyring. Any certificate used for module signing is implicitly
/linux-6.3-rc2/Documentation/ABI/testing/
A Dsysfs-driver-intel-m10-bmc-sec-update36 signing keys for the static region. The standard bitmap
44 signing keys for the partial reconfiguration region. The
52 signing keys for the BMC. The standard bitmap list format
A Dsysfs-class-firmware-attributes251 used in conjunction with a signing server as an alternative to password
254 from the signing server.
/linux-6.3-rc2/Documentation/kbuild/
A Dreproducible-builds.rst74 Module signing
79 modules being unreproducible. However, including a signing key with
80 your source would presumably defeat the purpose of signing modules.
85 1. Generate a persistent signing key. Add the certificate for the key
89 signing key's certificate, set ``CONFIG_MODULE_SIG_KEY`` to an
/linux-6.3-rc2/fs/cifs/
A Dsmb2transport.c381 struct derivation signing; member
412 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey()
413 ptriplet->signing.context, in generate_smb3signingkey()
419 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey()
420 ptriplet->signing.context, in generate_smb3signingkey()
484 d = &triplet.signing; in generate_smb30signingkey()
513 d = &triplet.signing; in generate_smb311signingkey()
/linux-6.3-rc2/fs/ksmbd/
A Dserver.h33 short signing; member
A Dauth.c756 const struct derivation *signing) in generate_smb3signingkey() argument
766 if (conn->dialect >= SMB30_PROT_ID && signing->binding) in generate_smb3signingkey()
771 rc = generate_key(conn, sess, signing->label, signing->context, key, in generate_smb3signingkey()
776 if (!(conn->dialect >= SMB30_PROT_ID && signing->binding)) in generate_smb3signingkey()
A DKconfig41 compound requests, multi-credit, packet signing, RDMA(smbdirect),
A Dksmbd_netlink.h84 __s32 signing; /* Signing enabled */ member
A Dtransport_ipc.c293 server_conf.signing = req->signing; in ipc_server_config_on_startup()
/linux-6.3-rc2/kernel/module/
A DMakefile12 obj-$(CONFIG_MODULE_SIG) += signing.o
A DKconfig97 <file:Documentation/admin-guide/module-signing.rst>.
100 kernel build dependency so that the signing tool can use its crypto
/linux-6.3-rc2/crypto/asymmetric_keys/
A Dmscode.asn11 --- Microsoft individual code signing data blob parser
/linux-6.3-rc2/Documentation/crypto/
A Dasymmetric-keys.rst343 The kernel builtin trusted keyring will be searched for the signing key.
354 signing key. If the secondary trusted keyring is not configured, this
367 a group of keys may be searched for the signing key by providing the
371 within the destination keyring will also be searched for signing keys.
394 keyring, we can be certain that it has a valid signing chain going back to
415 keyring, we can be certain that there is a valid signing chain going back
419 In all of these cases, if the signing key is found the signature of the key to
420 be linked will be verified using the signing key. The requested key is added
/linux-6.3-rc2/Documentation/translations/zh_CN/admin-guide/
A Dindex.rst109 * module-signing
/linux-6.3-rc2/Documentation/translations/zh_TW/admin-guide/
A Dindex.rst109 module-signing
/linux-6.3-rc2/Documentation/admin-guide/cifs/
A Dusage.rst643 by intermediate systems in the route). Note that signing
673 Use Kerberos authentication and packet signing
677 Use NTLM password hashing with signing (if
679 server requires signing also can be the default)
683 Use NTLMv2 password hashing with packet signing
724 also packet signing. Authentication (may/must)
726 the signing flags. Specifying two different password
732 (NTLM, NTLMv2 and packet signing allowed). The maximum
735 plaintext, ntlm, ntlmv2, signing allowed). Some
746 may use packet signing 0x00001
[all …]
A Dintroduction.rst29 signing, large files, Unicode support and other internationalization
A Dtodo.rst123 and when signing is disabled to request larger read sizes (larger than
/linux-6.3-rc2/
A D.gitignore145 # Leavings from module signing
/linux-6.3-rc2/Documentation/security/
A Ddigsig.rst81 The signing and key management utilities evm-utils provide functionality
/linux-6.3-rc2/Documentation/filesystems/nfs/
A Drpc-server-gss.rst36 - integrity/privacy protection (signing and encrypting of individual
/linux-6.3-rc2/Documentation/process/
A Dmaintainer-pgp-guide.rst127 - **[S]** keys can be used for signing
146 subkeys, 3 valid signing subkeys, but only one valid certification
198 separate signing subkey::
255 such as when making changes to your own key or signing other people's
279 like editing identities, adding or revoking subkeys, or signing other
736 this reason, most kernel developers don't bother signing their commits
801 further configuration. You can start signing your patches by installing

Completed in 43 milliseconds

12