| /linux/tools/testing/selftests/arm64/pauth/ |
| H A D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 260 struct signatures signed_vals; in TEST() 299 struct signatures new_keys; in TEST() 300 struct signatures old_keys; in TEST() 333 struct signatures trash; in TEST() [all …]
|
| H A D | exec_target.c | 12 struct signatures signed_vals; in main() 36 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
| H A D | helper.h | 11 struct signatures { struct
|
| /linux/drivers/scsi/ |
| H A D | fdomain_isa.c | 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
| /linux/security/integrity/ima/ |
| H A D | Kconfig | 183 bool "Appraise firmware signatures" 193 bool "Appraise kexec kernel image signatures" 201 Kernel image signatures can not be verified by the original 206 bool "Appraise kernel modules signatures" 213 Kernel module signatures can only be verified by IMA-appraisal, 234 bool "Support module-style signatures for appraisal" 241 Adds support for signatures appended to files. The format of the 244 to accept such signatures.
|
| /linux/fs/verity/ |
| H A D | Kconfig | 40 fs-verity builtin signatures. 43 the only way to do signatures with fs-verity, and the
|
| /linux/drivers/gpu/drm/nouveau/include/nvfw/ |
| H A D | acr.h | 180 u32 signatures[4]; member 210 u32 signatures[4]; member
|
| /linux/Documentation/security/ |
| H A D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem. 82 to generate signatures, to load keys into the kernel keyring.
|
| /linux/Documentation/arch/x86/ |
| H A D | zero-page.rst | 43 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
| H A D | pti.rst | 162 Bugs in PTI cause a few different signatures of crashes
|
| /linux/drivers/gpu/nova-core/gsp/ |
| H A D | fw.rs | 227 sysmemAddrOfSignature: gsp_firmware.signatures.dma_handle(), in new() 228 sizeOfSignature: u64::from_safe_cast(gsp_firmware.signatures.size()), in new()
|
| /linux/Documentation/arch/riscv/ |
| H A D | zicfilp.rst | 54 The compiler can generate a hash over function signatures and set them
|
| /linux/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 235 have various checks that can be performed on it (eg. self-signatures, validity 397 A single keyring can be used to verify a chain of signatures by
|
| /linux/Documentation/input/devices/ |
| H A D | alps.rst | 17 choice was made. The new touchpad signatures are named: "Rushmore",
|
| /linux/kernel/module/ |
| H A D | Kconfig | 256 Check modules for valid signatures upon load: the signature
|
| /linux/scripts/ |
| H A D | checkpatch.pl | 2718 my %signatures = (); 3207 if (defined $signatures{$sig_nospace}) { 3211 $signatures{$sig_nospace} = 1;
|
| /linux/Documentation/networking/ |
| H A D | tcp_ao.rst | 145 segments with unknown key signatures are discarded with warnings logged.
|
| /linux/Documentation/security/keys/ |
| H A D | core.rst | 914 chains or individual certificate signatures using the asymmetric key type.
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 2369 firmware, policy, etc) based on file signatures. 4194 modules without (valid) signatures will fail to load.
|
| /linux/ |
| H A D | MAINTAINERS | 54 to also notify the people that have git commit signatures.
|