Home
last modified time | relevance | path

Searched full:signatures (Results 1 – 25 of 72) sorted by relevance

123

/linux/tools/testing/selftests/arm64/pauth/
H A Dpac.c39 void sign_specific(struct signatures *sign, size_t val) in sign_specific()
47 void sign_all(struct signatures *sign, size_t val) in sign_all()
56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same()
70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set()
92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all()
179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all()
260 struct signatures signed_vals; in TEST()
299 struct signatures new_keys; in TEST()
300 struct signatures old_keys; in TEST()
333 struct signatures trash; in TEST()
[all …]
H A Dexec_target.c12 struct signatures signed_vals; in main()
36 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
H A Dhelper.h11 struct signatures { struct
/linux/security/integrity/ima/
H A DKconfig183 bool "Appraise firmware signatures"
193 bool "Appraise kexec kernel image signatures"
201 Kernel image signatures can not be verified by the original
206 bool "Appraise kernel modules signatures"
213 Kernel module signatures can only be verified by IMA-appraisal,
234 bool "Support module-style signatures for appraisal"
241 Adds support for signatures appended to files. The format of the
244 to accept such signatures.
H A Dima_appraise.c545 * File signatures on some filesystems can not be properly verified. in ima_appraise_measurement()
558 /* Fix mode, but don't replace file signatures. */ in ima_appraise_measurement()
572 * Permit new files with file/EVM portable signatures, but in ima_appraise_measurement()
598 /* do not collect and update hash for digital signatures */ in ima_appraise_measurement()
/linux/fs/verity/
H A Dsignature.c3 * Verification of builtin signatures
9 * This file implements verification of fs-verity builtin signatures. Please
11 * signatures with fs-verity, and the alternatives (such as userspace signature
45 * against the certificates in the fs-verity keyring. Note that signatures
72 * The ".fs-verity" keyring is empty, due to builtin signatures in fsverity_verify_signature()
H A DKconfig40 fs-verity builtin signatures.
43 the only way to do signatures with fs-verity, and the
/linux/drivers/scsi/
H A Dfdomain_isa.c40 * The following BIOS signature signatures are for boards which do *NOT*
65 } signatures[] = { variable
84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures)
101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
103 signatures[i].length)) in fdomain_isa_match()
107 sig = &signatures[i]; in fdomain_isa_match()
/linux/security/integrity/platform_certs/
H A Dload_uefi.c130 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs()
143 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs()
193 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs()
210 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs()
229 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
H A Dload_powerpc.c105 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs()
122 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs()
138 pr_err("Couldn't parse trustedcadb signatures: %d\n", rc); in load_powerpc_certs()
154 pr_err("Couldn't parse moduledb signatures: %d\n", rc); in load_powerpc_certs()
/linux/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh6 # both signatures depending on the IMA policy, or none.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
228 # Are there pe and ima signatures
H A Dtest_kexec_load.sh5 # signatures are required. (Dependent on CONFIG_IMA_ARCH_POLICY.)
/linux/include/uapi/linux/
H A Dfsverity.h67 * Format in which fs-verity file digests are signed in built-in signatures.
74 * is optional. fs-verity users may also verify signatures in userspace, in
/linux/Documentation/security/
H A Ddigsig.rst20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
82 to generate signatures, to load keys into the kernel keyring.
/linux/drivers/gpu/drm/nouveau/include/nvfw/
H A Dacr.h180 u32 signatures[4]; member
210 u32 signatures[4]; member
/linux/arch/powerpc/include/asm/
H A Dsyscalls.h85 * Architecture specific signatures required by long long munging:
87 * The following signatures provide a machine long parameter for
/linux/lib/
H A Dcheck_signature.c6 * check_signature - find BIOS signatures
/linux/security/integrity/evm/
H A Devm_main.c575 * Writing other xattrs is safe for portable signatures, as portable
576 * signatures are immutable and can never be updated.
718 * Writing other xattrs is safe for portable signatures, as portable
719 * signatures are immutable and can never be updated.
979 * Writing attrs is safe for portable signatures, as portable signatures in evm_inode_copy_up_xattr()
H A Devm_crypto.c149 * unsigned long to allow existing HMAC and signatures from in hmac_add_misc()
162 * signatures in hmac_add_misc()
263 * signatures/HMACs. in evm_calc_hmac_or_hash()
313 /* Portable EVM signatures must include an IMA hash */ in evm_calc_hmac_or_hash()
/linux/Documentation/devicetree/bindings/nvmem/
H A Dnintendo-otp.yaml11 which contains common and per-console keys, signatures and related data
/linux/arch/powerpc/include/uapi/asm/
H A Dnvram.h14 /* Signatures for nvram partitions */
/linux/Documentation/arch/x86/
H A Dzero-page.rst43 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_sig_in_xattr.c31 * Note that, generating signatures based on fsverity_formatted_digest is
/linux/drivers/nvmem/
H A Dnintendo-otp.c7 * This memory contains common and per-console keys, signatures and
/linux/scripts/package/
H A Dmkspec37 # because the signatures will be stripped off the modules. However, due

123