/linux-4.1.27/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 33 bool trusted; in pkcs7_validate_trust_one() local 46 trusted = x509->trusted; in pkcs7_validate_trust_one() 121 trusted = test_bit(KEY_FLAG_TRUSTED, &key->flags); in pkcs7_validate_trust_one() 135 p->trusted = trusted; in pkcs7_validate_trust_one() 138 sinfo->trusted = trusted; in pkcs7_validate_trust_one() 190 *_trusted |= sinfo->trusted; in pkcs7_validate_trust()
|
D | pkcs7_key_type.c | 29 bool trusted; in pkcs7_preparse() local 46 ret = pkcs7_validate_trust(pkcs7, system_trusted_keyring, &trusted); in pkcs7_preparse() 49 if (!trusted) in pkcs7_preparse()
|
D | pkcs7_parser.h | 25 bool trusted; member
|
D | x509_parser.h | 43 bool trusted; member
|
D | x509_public_key.c | 288 } else if (!prep->trusted) { in x509_key_preparse() 291 prep->trusted = 1; in x509_key_preparse()
|
D | Kconfig | 55 PKCS#7 message - provided the message is signed by a trusted key. If
|
/linux-4.1.27/Documentation/security/ |
D | keys-trusted-encrypted.txt | 19 By default, trusted keys are sealed under the SRK, which has the default 24 keyctl add trusted name "new keylen [options]" ring 25 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring 50 'master' key can either be a trusted-key or user-key type. The main 51 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 67 key-type:= 'trusted' | 'user' 70 Examples of trusted and encrypted key usage: 72 Create and save a trusted key named "kmk" of length 32 bytes: 74 $ keyctl add trusted kmk "new 32" @u 81 440502848 --alswrv 500 500 \_ trusted: kmk [all …]
|
D | keys-ecryptfs.txt | 33 time after the unsealing of a 'trusted' key in order to perform the mount in a 44 key-type:= 'trusted' | 'user'
|
D | 00-INDEX | 19 keys-trusted-encrypted.txt
|
D | keys.txt | 1306 accessed. key->datalen cannot be trusted to stay consistent with the
|
/linux-4.1.27/Documentation/devicetree/bindings/arm/firmware/ |
D | tlm,trusted-foundations.txt | 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations";
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | evm | 11 with a trusted/encrypted key for the HMAC-sha1 operation. 19 of the trusted boot. For more information on creating and 20 loading existing trusted/encrypted keys, refer to: 21 Documentation/keys-trusted-encrypted.txt. (A sample dracut 22 patch, which loads the trusted/encrypted key and enables
|
D | sysfs-class-bdi | 50 be trusted to play fair.
|
/linux-4.1.27/security/integrity/ima/ |
D | Kconfig | 132 keyring be signed by a key on the system trusted keyring. 135 bool "Load X509 certificate onto the '.ima' trusted keyring" 140 loaded on the .ima trusted keyring. These public keys are 141 X509 certificates signed by a trusted key on the 143 loading from the kernel onto the '.ima' trusted keyring.
|
/linux-4.1.27/security/keys/ |
D | Makefile | 27 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o
|
D | key.c | 816 prep.trusted = flags & KEY_ALLOC_TRUSTED; in key_create_or_update() 833 if (!prep.trusted && test_bit(KEY_FLAG_TRUSTED_ONLY, &keyring->flags)) in key_create_or_update() 835 flags |= prep.trusted ? KEY_ALLOC_TRUSTED : 0; in key_create_or_update()
|
D | Kconfig | 79 'master' key can be either a trusted-key or user-key type.
|
/linux-4.1.27/arch/x86/kernel/ |
D | kexec-bzimage64.c | 534 bool trusted; in bzImage64_verify_sig() local 538 system_trusted_keyring, &trusted); in bzImage64_verify_sig() 541 if (!trusted) in bzImage64_verify_sig()
|
/linux-4.1.27/Documentation/devicetree/bindings/arm/ |
D | tegra.txt | 41 "tlm,trusted-foundations" binding's documentation for more details.
|
/linux-4.1.27/arch/arm/firmware/ |
D | Kconfig | 24 tlm,trusted-foundations device tree binding documentation for details
|
/linux-4.1.27/Documentation/devicetree/bindings/i2c/ |
D | trivial-devices.txt | 36 atmel,at97sc3204t i2c trusted platform module (TPM) 75 nuvoton,npct501 i2c trusted platform module (TPM) 103 winbond,wpct301 i2c trusted platform module (TPM)
|
/linux-4.1.27/include/linux/ |
D | key-type.h | 49 bool trusted; /* True if key is trusted */ member
|
/linux-4.1.27/arch/arm/boot/dts/ |
D | tegra114-tn7.dts | 23 trusted-foundations { 24 compatible = "tlm,trusted-foundations";
|
D | tegra114-roth.dts | 23 trusted-foundations { 24 compatible = "tlm,trusted-foundations";
|
/linux-4.1.27/include/net/ |
D | af_vsock.h | 41 bool trusted; member
|
/linux-4.1.27/Documentation/ABI/stable/ |
D | sysfs-bus-usb | 126 be trusted, as the device may have a smaller config descriptor 128 can be trusted, and can be used to seek forward one (sub)
|
/linux-4.1.27/Documentation/netlabel/ |
D | cipso_ipv4.txt | 13 labeled networking and is used in many trusted operating systems.
|
/linux-4.1.27/Documentation/ |
D | cpu-load.txt | 22 this data sometimes it can not be trusted at all.
|
D | binfmt_misc.txt | 60 should be used with care - the interpreter has to be trusted not to
|
D | module-signing.txt | 28 trusted userspace bits.
|
D | intel_txt.txt | 6 provide the building blocks for creating trusted platforms.
|
D | md.txt | 59 'dirty' means that the parity cannot be trusted, and the fact that it
|
D | kernel-parameters.txt | 571 the system trusted keyring to be used for certificate
|
/linux-4.1.27/Documentation/tpm/ |
D | xen-tpmfront.txt | 17 these domains (manager, vTPM, and guest) is trusted, the vTPM subsystem extends
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | TODO | 47 k) implement support for security and trusted categories of xattrs
|
/linux-4.1.27/fs/ |
D | xattr.c | 935 bool trusted = capable(CAP_SYS_ADMIN); in simple_xattr_list() local 944 if (!trusted && xattr_is_trusted(xattr->name)) in simple_xattr_list()
|
D | Kconfig | 155 Currently this enables support for the trusted.* and
|
/linux-4.1.27/Documentation/filesystems/ |
D | overlayfs.txt | 47 is it must support the creation of trusted.* extended attributes, and 97 A directory is made opaque by setting the xattr "trusted.overlay.opaque"
|
D | squashfs.txt | 217 ("user.", "trusted." etc) and it also encodes how the name/value fields
|
D | ramfs-rootfs-initramfs.txt | 63 got any backing store. Because of this, only root (or a trusted user) should
|
/linux-4.1.27/net/vmw_vsock/ |
D | af_vsock.c | 624 vsk->trusted = psk->trusted; in __vsock_create() 628 vsk->trusted = capable(CAP_NET_ADMIN); in __vsock_create()
|
D | vmci_transport.c | 509 return vsock->trusted || in vmci_transport_is_trusted() 541 u32 peer, u32 flags, bool trusted) in vmci_transport_queue_pair_alloc() argument 545 if (trusted) { in vmci_transport_queue_pair_alloc()
|
/linux-4.1.27/Documentation/scsi/ |
D | ChangeLog.sym53c8xx_2 | 36 since BIOS settings were trusted instead on first load.
|
/linux-4.1.27/Documentation/block/ |
D | biovecs.txt | 104 * bi_vcnt can't be trusted or relied upon by driver code - i.e. anything that
|
D | biodoc.txt | 217 done in some scenarios where the low level driver cannot be trusted to
|
/linux-4.1.27/Documentation/device-mapper/ |
D | verity.txt | 60 and the salt. This hash should be trusted as there is no other authenticity
|
/linux-4.1.27/Documentation/ia64/ |
D | fsys.txt | 45 - neither the memory-stack nor the register-stack can be trusted while
|
/linux-4.1.27/Documentation/RCU/ |
D | checklist.txt | 269 superuser or some other trusted user, then it might not
|
/linux-4.1.27/init/ |
D | Kconfig | 1750 bool "Provide system-wide ring of trusted keys" 1753 Provide a system keyring to which trusted keys can be added. Keys in 1754 the keyring are considered to be trusted. Keys may be added at will
|
/linux-4.1.27/Documentation/hwmon/ |
D | sysfs-interface | 637 channel should not be trusted.
|
/linux-4.1.27/drivers/scsi/aic7xxx/ |
D | aic79xx.seq | 555 * CURRSCB nor LASTSCB can be trusted. We must 714 * will be NULL, CURRSCB and LASTSCB cannot be trusted,
|
/linux-4.1.27/Documentation/x86/ |
D | boot.txt | 263 wide, and therefore cannot be trusted for the size of a kernel if
|
/linux-4.1.27/lib/ |
D | Kconfig.debug | 863 the content of the corrupted region can no longer be trusted.
|
/linux-4.1.27/ |
D | MAINTAINERS | 5743 F: Documentation/security/keys-trusted-encrypted.txt 5744 F: include/keys/trusted-type.h 5745 F: security/keys/trusted.c 5746 F: security/keys/trusted.h 5754 F: Documentation/security/keys-trusted-encrypted.txt
|