| /linux/security/keys/trusted-keys/ |
| H A D | Makefile | 3 # Makefile for trusted keys 6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o 7 trusted-y += trusted_core.o 8 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm1.o 11 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm2.o 12 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += tpm2key.asn1.o 14 trusted-$(CONFIG_TRUSTED_KEYS_TEE) += trusted_tee.o 16 trusted-$(CONFIG_TRUSTED_KEYS_CAAM) += trusted_caam.o 18 trusted-$(CONFIG_TRUSTED_KEYS_DCP) += trusted_dcp.o 20 trusted [all...] |
| /linux/crypto/asymmetric_keys/ |
| H A D | restrict.c | 212 struct key *trusted, bool check_dest) in key_or_keyring_common() argument 225 if (!trusted && !check_dest) in key_or_keyring_common() 237 if (trusted) { in key_or_keyring_common() 238 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 240 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common() 245 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 249 asymmetric_key_ids(trusted)->id; in key_or_keyring_common() 273 key = __key_get(trusted); in key_or_keyring_common() 280 key = __key_get(trusted); in key_or_keyring_common() 286 key = __key_get(trusted); in key_or_keyring_common() [all …]
|
| /linux/drivers/md/ |
| H A D | dm-verity-loadpin.c | 21 bool trusted = false; in is_trusted_verity_target() local 39 trusted = true; in is_trusted_verity_target() 46 return trusted; in is_trusted_verity_target() 59 bool trusted = false; in dm_verity_loadpin_is_bdev_trusted() local 79 trusted = true; in dm_verity_loadpin_is_bdev_trusted() 85 return trusted; in dm_verity_loadpin_is_bdev_trusted()
|
| /linux/security/integrity/ima/ |
| H A D | Kconfig | 198 be signed and verified by a public key on the trusted IMA 211 and verified by a public key on the trusted IMA keyring. 223 and verified by a key on the trusted IMA keyring. 256 machine (if configured), or secondary trusted keyrings. The 262 built-in, machine (if configured) or secondary trusted keyrings. 276 bool "Load X509 certificate onto the '.ima' trusted keyring" 281 loaded on the .ima trusted keyring. These public keys are 282 X509 certificates signed by a trusted key on the 284 loading from the kernel onto the '.ima' trusted keyring. 316 trusted boo [all...] |
| /linux/Documentation/tee/ |
| H A D | ts-tee.rst | 59 [1] https://www.trustedfirmware.org/projects/trusted-services/ 67 [5] https://trusted-services.readthedocs.io/en/v1.0.0/developer/service-access-protocols.html#abi 69 [6] https://git.trustedfirmware.org/TS/trusted-services.git/tree/components/rpc/ts_rpc/caller/linux… 71 [7] https://git.trustedfirmware.org/TS/trusted-services.git/tree/deployments/libts/arm-linux/CMakeL…
|
| H A D | tee.rst | 12 A TEE is a trusted OS running in some secure environment, for example,
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | core-scheduling.rst | 21 user-designated trusted group can share a core. This increase in core sharing 101 trusted (same cookie) at any point in time. Kernel threads are assumed trusted. 110 the idle task is selected. Idle task is globally trusted. 126 priority task is not trusted with respect to the core wide highest priority 127 task. If a sibling does not have a trusted task to run, it will be forced idle 157 and are considered system-wide trusted. The forced-idling of siblings running 166 Core scheduling tries to guarantee that only trusted tasks run concurrently on a 168 concurrently or kernel could be running concurrently with a task not trusted by 173 Core scheduling selects only trusted tasks to run together. IPI is used to notify 207 allowing system processes (trusted tasks) to share a core.
|
| /linux/Documentation/ABI/testing/ |
| H A D | evm | 13 trusted/encrypted key stored in the Kernel Key 89 as part of the trusted boot. For more information on 90 creating and loading existing trusted/encrypted keys, 92 Documentation/security/keys/trusted-encrypted.rst. Both
|
| H A D | sysfs-class-bdi | 71 be trusted to play fair. 84 which cannot be trusted to play fair. 112 trusted to play fair, or a nbd device.
|
| /linux/security/integrity/evm/ |
| H A D | Kconfig | 60 bool "Load an X509 certificate onto the '.evm' trusted keyring" 64 Load an X509 certificate onto the '.evm' trusted keyring. 67 onto the '.evm' trusted keyring. A public key can be used to
|
| /linux/security/integrity/ |
| H A D | Kconfig | 53 .evm keyrings be signed by a key on the system trusted 57 bool "Provide keyring for platform/firmware trusted keys" 61 Provide a separate, distinct keyring for platform trusted keys, which 76 be trusted within the kernel.
|
| /linux/Documentation/userspace-api/ |
| H A D | check_exec.rst | 57 For such secure execution environment to make sense, only trusted code should 109 No threat, everyone and everything is trusted, but we can get ahead of 121 The threat is (potential) malicious scripts run by trusted (and not fooled) 139 The threat is malicious scripts run by untrusted users (but trusted code). 140 This makes sense for system services that may only execute trusted scripts.
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 64 and the salt. This hash should be trusted as there is no other authenticity 147 trusted keyring by default, or the secondary trusted keyring if 149 trusted keyring includes by default the builtin trusted keyring, and it can 151 already in the secondary trusted keyring.
|
| /linux/drivers/net/ethernet/intel/ice/ |
| H A D | ice_sriov.c | 1274 ivi->trusted = vf->trusted; in ice_get_vf_cfg() 1375 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) in ice_set_vf_trust() argument 1395 if (trusted == vf->trusted) { in ice_set_vf_trust() 1402 while (!trusted && vf->num_mac_lldp) in ice_set_vf_trust() 1405 vf->trusted = trusted; in ice_set_vf_trust() 1408 vf_id, trusted ? "" : "un"); in ice_set_vf_trust()
|
| /linux/Documentation/security/keys/ |
| H A D | index.rst | 11 trusted-encrypted
|
| H A D | ecryptfs.rst | 35 time after the unsealing of a 'trusted' key in order to perform the mount in a 49 key-type:= 'trusted' | 'user'
|
| /linux/include/linux/ |
| H A D | if_link.h | 30 __u32 trusted; member
|
| /linux/security/keys/ |
| H A D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
| /linux/drivers/net/ethernet/intel/ixgbe/ |
| H A D | ixgbe_sriov.c | 109 adapter->vfinfo[i].trusted = false; in __ixgbe_enable_sriov() 961 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_mac_addr() 1002 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && in ixgbe_set_vf_macvlan_msg() 1193 !adapter->vfinfo[vf].trusted) { in ixgbe_update_vf_xcast_mode() 1950 if (adapter->vfinfo[vf].trusted == setting) in ixgbe_ndo_set_vf_trust() 1953 adapter->vfinfo[vf].trusted = setting; in ixgbe_ndo_set_vf_trust() 1978 ivi->trusted = adapter->vfinfo[vf].trusted; in ixgbe_ndo_get_vf_config()
|
| /linux/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 343 The kernel builtin trusted keyring will be searched for the signing key. 344 If the builtin trusted keyring is not configured, all links will be 348 2) Restrict using the kernel builtin and secondary trusted keyrings 353 The kernel builtin and secondary trusted keyrings will be searched for the 354 signing key. If the secondary trusted keyring is not configured, this
|
| /linux/Documentation/security/ |
| H A D | snp-tdx-threat-model.rst | 42 trusted components. 55 a trusted intermediary between the guest VM and the underlying platform 109 trusted HW platform with all of the firmware and bootloaders included on 112 privileged enough to perform trusted actions. In addition, external
|
| /linux/arch/arm/boot/dts/nvidia/ |
| H A D | tegra114-tn7.dts | 24 trusted-foundations { 25 compatible = "tlm,trusted-foundations";
|
| /linux/drivers/net/ethernet/intel/i40e/ |
| H A D | i40e_virtchnl_pf.h | 91 bool trusted; member
|
| /linux/drivers/crypto/ccp/ |
| H A D | Kconfig | 48 enable third-party trusted applications.
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-bus-usb | 128 be trusted, as the device may have a smaller config descriptor 130 can be trusted, and can be used to seek forward one (sub)
|