Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 54 of 54) sorted by relevance

/linux-4.1.27/crypto/asymmetric_keys/
Dpkcs7_trust.c33 bool trusted; in pkcs7_validate_trust_one() local
46 trusted = x509->trusted; in pkcs7_validate_trust_one()
121 trusted = test_bit(KEY_FLAG_TRUSTED, &key->flags); in pkcs7_validate_trust_one()
135 p->trusted = trusted; in pkcs7_validate_trust_one()
138 sinfo->trusted = trusted; in pkcs7_validate_trust_one()
190 *_trusted |= sinfo->trusted; in pkcs7_validate_trust()
Dpkcs7_key_type.c29 bool trusted; in pkcs7_preparse() local
46 ret = pkcs7_validate_trust(pkcs7, system_trusted_keyring, &trusted); in pkcs7_preparse()
49 if (!trusted) in pkcs7_preparse()
Dpkcs7_parser.h25 bool trusted; member
Dx509_parser.h43 bool trusted; member
Dx509_public_key.c288 } else if (!prep->trusted) { in x509_key_preparse()
291 prep->trusted = 1; in x509_key_preparse()
DKconfig55 PKCS#7 message - provided the message is signed by a trusted key. If
/linux-4.1.27/Documentation/security/
Dkeys-trusted-encrypted.txt19 By default, trusted keys are sealed under the SRK, which has the default
24 keyctl add trusted name "new keylen [options]" ring
25 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring
50 'master' key can either be a trusted-key or user-key type. The main
51 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
67 key-type:= 'trusted' | 'user'
70 Examples of trusted and encrypted key usage:
72 Create and save a trusted key named "kmk" of length 32 bytes:
74 $ keyctl add trusted kmk "new 32" @u
81 440502848 --alswrv 500 500 \_ trusted: kmk
[all …]
Dkeys-ecryptfs.txt33 time after the unsealing of a 'trusted' key in order to perform the mount in a
44 key-type:= 'trusted' | 'user'
D00-INDEX19 keys-trusted-encrypted.txt
Dkeys.txt1306 accessed. key->datalen cannot be trusted to stay consistent with the
/linux-4.1.27/Documentation/devicetree/bindings/arm/firmware/
Dtlm,trusted-foundations.txt5 presence by declaring a node compatible with "tlm,trusted-foundations"
9 - compatible: "tlm,trusted-foundations"
15 trusted-foundations {
16 compatible = "tlm,trusted-foundations";
/linux-4.1.27/Documentation/ABI/testing/
Devm11 with a trusted/encrypted key for the HMAC-sha1 operation.
19 of the trusted boot. For more information on creating and
20 loading existing trusted/encrypted keys, refer to:
21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
22 patch, which loads the trusted/encrypted key and enables
Dsysfs-class-bdi50 be trusted to play fair.
/linux-4.1.27/security/integrity/ima/
DKconfig132 keyring be signed by a key on the system trusted keyring.
135 bool "Load X509 certificate onto the '.ima' trusted keyring"
140 loaded on the .ima trusted keyring. These public keys are
141 X509 certificates signed by a trusted key on the
143 loading from the kernel onto the '.ima' trusted keyring.
/linux-4.1.27/security/keys/
DMakefile27 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o
Dkey.c816 prep.trusted = flags & KEY_ALLOC_TRUSTED; in key_create_or_update()
833 if (!prep.trusted && test_bit(KEY_FLAG_TRUSTED_ONLY, &keyring->flags)) in key_create_or_update()
835 flags |= prep.trusted ? KEY_ALLOC_TRUSTED : 0; in key_create_or_update()
DKconfig79 'master' key can be either a trusted-key or user-key type.
/linux-4.1.27/arch/x86/kernel/
Dkexec-bzimage64.c534 bool trusted; in bzImage64_verify_sig() local
538 system_trusted_keyring, &trusted); in bzImage64_verify_sig()
541 if (!trusted) in bzImage64_verify_sig()
/linux-4.1.27/Documentation/devicetree/bindings/arm/
Dtegra.txt41 "tlm,trusted-foundations" binding's documentation for more details.
/linux-4.1.27/arch/arm/firmware/
DKconfig24 tlm,trusted-foundations device tree binding documentation for details
/linux-4.1.27/Documentation/devicetree/bindings/i2c/
Dtrivial-devices.txt36 atmel,at97sc3204t i2c trusted platform module (TPM)
75 nuvoton,npct501 i2c trusted platform module (TPM)
103 winbond,wpct301 i2c trusted platform module (TPM)
/linux-4.1.27/include/linux/
Dkey-type.h49 bool trusted; /* True if key is trusted */ member
/linux-4.1.27/arch/arm/boot/dts/
Dtegra114-tn7.dts23 trusted-foundations {
24 compatible = "tlm,trusted-foundations";
Dtegra114-roth.dts23 trusted-foundations {
24 compatible = "tlm,trusted-foundations";
/linux-4.1.27/include/net/
Daf_vsock.h41 bool trusted; member
/linux-4.1.27/Documentation/ABI/stable/
Dsysfs-bus-usb126 be trusted, as the device may have a smaller config descriptor
128 can be trusted, and can be used to seek forward one (sub)
/linux-4.1.27/Documentation/netlabel/
Dcipso_ipv4.txt13 labeled networking and is used in many trusted operating systems.
/linux-4.1.27/Documentation/
Dcpu-load.txt22 this data sometimes it can not be trusted at all.
Dbinfmt_misc.txt60 should be used with care - the interpreter has to be trusted not to
Dmodule-signing.txt28 trusted userspace bits.
Dintel_txt.txt6 provide the building blocks for creating trusted platforms.
Dmd.txt59 'dirty' means that the parity cannot be trusted, and the fact that it
Dkernel-parameters.txt571 the system trusted keyring to be used for certificate
/linux-4.1.27/Documentation/tpm/
Dxen-tpmfront.txt17 these domains (manager, vTPM, and guest) is trusted, the vTPM subsystem extends
/linux-4.1.27/Documentation/filesystems/cifs/
DTODO47 k) implement support for security and trusted categories of xattrs
/linux-4.1.27/fs/
Dxattr.c935 bool trusted = capable(CAP_SYS_ADMIN); in simple_xattr_list() local
944 if (!trusted && xattr_is_trusted(xattr->name)) in simple_xattr_list()
DKconfig155 Currently this enables support for the trusted.* and
/linux-4.1.27/Documentation/filesystems/
Doverlayfs.txt47 is it must support the creation of trusted.* extended attributes, and
97 A directory is made opaque by setting the xattr "trusted.overlay.opaque"
Dsquashfs.txt217 ("user.", "trusted." etc) and it also encodes how the name/value fields
Dramfs-rootfs-initramfs.txt63 got any backing store. Because of this, only root (or a trusted user) should
/linux-4.1.27/net/vmw_vsock/
Daf_vsock.c624 vsk->trusted = psk->trusted; in __vsock_create()
628 vsk->trusted = capable(CAP_NET_ADMIN); in __vsock_create()
Dvmci_transport.c509 return vsock->trusted || in vmci_transport_is_trusted()
541 u32 peer, u32 flags, bool trusted) in vmci_transport_queue_pair_alloc() argument
545 if (trusted) { in vmci_transport_queue_pair_alloc()
/linux-4.1.27/Documentation/scsi/
DChangeLog.sym53c8xx_236 since BIOS settings were trusted instead on first load.
/linux-4.1.27/Documentation/block/
Dbiovecs.txt104 * bi_vcnt can't be trusted or relied upon by driver code - i.e. anything that
Dbiodoc.txt217 done in some scenarios where the low level driver cannot be trusted to
/linux-4.1.27/Documentation/device-mapper/
Dverity.txt60 and the salt. This hash should be trusted as there is no other authenticity
/linux-4.1.27/Documentation/ia64/
Dfsys.txt45 - neither the memory-stack nor the register-stack can be trusted while
/linux-4.1.27/Documentation/RCU/
Dchecklist.txt269 superuser or some other trusted user, then it might not
/linux-4.1.27/init/
DKconfig1750 bool "Provide system-wide ring of trusted keys"
1753 Provide a system keyring to which trusted keys can be added. Keys in
1754 the keyring are considered to be trusted. Keys may be added at will
/linux-4.1.27/Documentation/hwmon/
Dsysfs-interface637 channel should not be trusted.
/linux-4.1.27/drivers/scsi/aic7xxx/
Daic79xx.seq555 * CURRSCB nor LASTSCB can be trusted. We must
714 * will be NULL, CURRSCB and LASTSCB cannot be trusted,
/linux-4.1.27/Documentation/x86/
Dboot.txt263 wide, and therefore cannot be trusted for the size of a kernel if
/linux-4.1.27/lib/
DKconfig.debug863 the content of the corrupted region can no longer be trusted.
/linux-4.1.27/
DMAINTAINERS5743 F: Documentation/security/keys-trusted-encrypted.txt
5744 F: include/keys/trusted-type.h
5745 F: security/keys/trusted.c
5746 F: security/keys/trusted.h
5754 F: Documentation/security/keys-trusted-encrypted.txt