/linux-6.3-rc2/crypto/asymmetric_keys/ |
A D | restrict.c | 121 struct key *trusted, bool check_dest) in key_or_keyring_common() argument 134 if (!trusted && !check_dest) in key_or_keyring_common() 146 if (trusted) { in key_or_keyring_common() 147 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 154 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 158 asymmetric_key_ids(trusted)->id; in key_or_keyring_common() 182 key = __key_get(trusted); in key_or_keyring_common() 189 key = __key_get(trusted); in key_or_keyring_common() 195 key = __key_get(trusted); in key_or_keyring_common() 243 struct key *trusted) in restrict_link_by_key_or_keyring() argument [all …]
|
/linux-6.3-rc2/security/keys/trusted-keys/ |
A D | Makefile | 6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o 7 trusted-y += trusted_core.o 8 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm1.o 11 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm2.o 12 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += tpm2key.asn1.o 14 trusted-$(CONFIG_TRUSTED_KEYS_TEE) += trusted_tee.o 16 trusted-$(CONFIG_TRUSTED_KEYS_CAAM) += trusted_caam.o
|
A D | Kconfig | 2 bool "TPM-based trusted keys" 13 Enable use of the Trusted Platform Module (TPM) as trusted key 20 bool "TEE-based trusted keys" 24 Enable use of the Trusted Execution Environment (TEE) as trusted 28 bool "CAAM-based trusted keys" 34 (CAAM) as trusted key backend.
|
/linux-6.3-rc2/drivers/md/ |
A D | dm-verity-loadpin.c | 21 bool trusted = false; in is_trusted_verity_target() local 39 trusted = true; in is_trusted_verity_target() 46 return trusted; in is_trusted_verity_target() 59 bool trusted = false; in dm_verity_loadpin_is_bdev_trusted() local 76 trusted = true; in dm_verity_loadpin_is_bdev_trusted() 82 return trusted; in dm_verity_loadpin_is_bdev_trusted()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/arm/firmware/ |
A D | tlm,trusted-foundations.yaml | 4 $id: "http://devicetree.org/schemas/arm/firmware/tlm,trusted-foundations.yaml#" 18 const: trusted-foundations 21 const: tlm,trusted-foundations 41 trusted-foundations { 42 compatible = "tlm,trusted-foundations";
|
/linux-6.3-rc2/Documentation/security/keys/ |
A D | trusted-encrypted.rst | 176 keyctl add trusted name "new keylen [options]" ring 213 keyctl add trusted name "new keylen" ring 214 keyctl add trusted name "load hex_blob" ring 226 keyctl add trusted name "new keylen" ring 227 keyctl add trusted name "load hex_blob" ring 253 key-type:= 'trusted' | 'user' 255 Examples of trusted and encrypted key usage 266 $ keyctl add trusted kmk "new 32" @u 287 Load a trusted key from the saved blob:: 289 $ keyctl add trusted kmk "load `cat kmk.blob`" @u [all …]
|
A D | index.rst | 11 trusted-encrypted
|
A D | ecryptfs.rst | 35 time after the unsealing of a 'trusted' key in order to perform the mount in a 49 key-type:= 'trusted' | 'user'
|
/linux-6.3-rc2/security/loadpin/ |
A D | Kconfig | 28 digests it considers trusted. A verity backed filesystem is 29 considered trusted if its root digest is found in the list 30 of trusted digests. 32 The list of trusted verity can be populated through an ioctl
|
/linux-6.3-rc2/certs/ |
A D | Kconfig | 43 bool "Provide system-wide ring of trusted keys" 48 Provide a system keyring to which trusted keys can be added. Keys in 49 the keyring are considered to be trusted. Keys may be added at will 61 containing trusted X.509 certificates to be included in the default 63 also trusted. 74 image. This allows introducing a trusted certificate to the default 91 into the kernel or already in the secondary trusted keyring. 137 they are signed and vouched by a certificate from the builtin trusted
|
/linux-6.3-rc2/security/integrity/ima/ |
A D | Kconfig | 203 be signed and verified by a public key on the trusted IMA 216 and verified by a public key on the trusted IMA keyring. 228 and verified by a key on the trusted IMA keyring. 259 keyring be signed by a key on the system trusted keyring. 273 secondary trusted keyrings. 278 built-in or secondary trusted keyrings. 292 bool "Load X509 certificate onto the '.ima' trusted keyring" 297 loaded on the .ima trusted keyring. These public keys are 298 X509 certificates signed by a trusted key on the 300 loading from the kernel onto the '.ima' trusted keyring. [all …]
|
/linux-6.3-rc2/include/crypto/ |
A D | public_key.h | 67 struct key *trusted); 72 struct key *trusted);
|
/linux-6.3-rc2/security/integrity/evm/ |
A D | Kconfig | 59 bool "Load an X509 certificate onto the '.evm' trusted keyring" 63 Load an X509 certificate onto the '.evm' trusted keyring. 66 onto the '.evm' trusted keyring. A public key can be used to
|
/linux-6.3-rc2/Documentation/admin-guide/hw-vuln/ |
A D | core-scheduling.rst | 21 user-designated trusted group can share a core. This increase in core sharing 101 trusted (same cookie) at any point in time. Kernel threads are assumed trusted. 110 the idle task is selected. Idle task is globally trusted. 126 priority task is not trusted with respect to the core wide highest priority 127 task. If a sibling does not have a trusted task to run, it will be forced idle 157 and are considered system-wide trusted. The forced-idling of siblings running 166 Core scheduling tries to guarantee that only trusted tasks run concurrently on a 168 concurrently or kernel could be running concurrently with a task not trusted by 173 Core scheduling selects only trusted tasks to run together. IPI is used to notify 207 allowing system processes (trusted tasks) to share a core.
|
/linux-6.3-rc2/security/integrity/ |
A D | Kconfig | 52 .evm keyrings be signed by a key on the system trusted 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 76 be trusted within the kernel.
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | evm | 13 trusted/encrypted key stored in the Kernel Key 89 as part of the trusted boot. For more information on 90 creating and loading existing trusted/encrypted keys, 92 Documentation/security/keys/trusted-encrypted.rst. Both
|
A D | sysfs-class-bdi | 71 be trusted to play fair. 84 which cannot be trusted to play fair. 112 trusted to play fair, or a nbd device.
|
/linux-6.3-rc2/drivers/net/ethernet/intel/ice/ |
A D | ice_sriov.h | 50 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 111 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() argument
|
A D | ice_sriov.c | 1253 ivi->trusted = vf->trusted; in ice_get_vf_cfg() 1338 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) in ice_set_vf_trust() argument 1358 if (trusted == vf->trusted) { in ice_set_vf_trust() 1365 vf->trusted = trusted; in ice_set_vf_trust() 1368 vf_id, trusted ? "" : "un"); in ice_set_vf_trust()
|
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/ |
A D | verity.rst | 64 and the salt. This hash should be trusted as there is no other authenticity 138 trusted keyring by default, or the secondary trusted keyring if 140 trusted keyring includes by default the builtin trusted keyring, and it can 142 already in the secondary trusted keyring.
|
/linux-6.3-rc2/include/linux/ |
A D | if_link.h | 30 __u32 trusted; member
|
/linux-6.3-rc2/security/keys/ |
A D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
/linux-6.3-rc2/drivers/net/netdevsim/ |
A D | netdev.c | 161 nsim_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust() 184 ivi->trusted = nsim_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
|
/linux-6.3-rc2/drivers/net/ethernet/pensando/ionic/ |
A D | ionic.h | 34 u8 trusted; member
|
/linux-6.3-rc2/drivers/net/ethernet/intel/ixgbe/ |
A D | ixgbe_sriov.c | 109 adapter->vfinfo[i].trusted = false; in __ixgbe_enable_sriov() 958 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_mac_addr() 1000 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_macvlan_msg() 1181 !adapter->vfinfo[vf].trusted) { in ixgbe_update_vf_xcast_mode() 1824 if (adapter->vfinfo[vf].trusted == setting) in ixgbe_ndo_set_vf_trust() 1827 adapter->vfinfo[vf].trusted = setting; in ixgbe_ndo_set_vf_trust() 1852 ivi->trusted = adapter->vfinfo[vf].trusted; in ixgbe_ndo_get_vf_config()
|