Lines Matching refs:module
8 - Configuring module signing.
22 The kernel module signing facility cryptographically signs modules during
23 installation and then checks the signature upon loading the module. This
26 making it harder to load a malicious module into the kernel. The module
42 The module signing facility is enabled by going to the "Enable Loadable Module
51 This specifies how the kernel should deal with a module that has a
52 signature for which the key is not known or a module that is unsigned.
63 Irrespective of the setting here, if the module has a signature block that
88 than being a module) so that modules signed with that algorithm can have
92 (4) "File name or PKCS#11 URI of module signing key" (CONFIG_MODULE_SIG_KEY)
114 Note that enabling module signing adds a dependency on the OpenSSL devel
185 Beyond the public key generated specifically for module signing, additional
209 To manually sign a module, use the scripts/sign-file tool available in
215 4. The kernel module to be signed
217 The following is an example to sign a kernel module:
220 kernel-signkey.x509 module.ko
234 A signed module has a digital signature simply appended at the end. The string
235 "~Module signature appended~." at the end of the module's file confirms that a
240 attached. Note the entire module is the signed payload, including any and all
260 unsigned. Any module for which the kernel has a key, but which proves to have
263 Any module that has an unparseable signature will be rejected.