/linux-6.1.9/tools/testing/selftests/arm64/pauth/ |
D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 257 struct signatures signed_vals; in TEST() 296 struct signatures new_keys; in TEST() 297 struct signatures old_keys; in TEST() 330 struct signatures trash; in TEST() [all …]
|
D | exec_target.c | 12 struct signatures signed_vals; in main() 31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
D | helper.h | 11 struct signatures { struct
|
/linux-6.1.9/drivers/scsi/ |
D | fdomain_isa.c | 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
D | aha152x.c | 3001 } signatures[] = variable 3303 for (j = 0; j<ARRAY_SIZE(signatures) && !ok; j++) in aha152x_init() 3304 ok = check_signature(p + signatures[j].sig_offset, in aha152x_init() 3305 signatures[j].signature, signatures[j].sig_length); in aha152x_init()
|
/linux-6.1.9/security/integrity/ima/ |
D | Kconfig | 188 bool "Appraise firmware signatures" 198 bool "Appraise kexec kernel image signatures" 206 Kernel image signatures can not be verified by the original 211 bool "Appraise kernel modules signatures" 218 Kernel module signatures can only be verified by IMA-appraisal, 239 bool "Support module-style signatures for appraisal" 246 Adds support for signatures appended to files. The format of the 249 to accept such signatures.
|
/linux-6.1.9/drivers/gpu/drm/nouveau/include/nvfw/ |
D | acr.h | 95 u32 signatures[4]; member 125 u32 signatures[4]; member
|
/linux-6.1.9/Documentation/security/ |
D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem. 82 to generate signatures, to load keys into the kernel keyring.
|
/linux-6.1.9/Documentation/admin-guide/ |
D | module-signing.rst | 13 .. - Non-valid signatures and unsigned modules. 30 involved. The signatures are not themselves encoded in any industrial standard 93 their signatures checked without causing a dependency loop. 128 Cryptographic keypairs are required to generate and check signatures. A 132 kernel so that it can be used to check the signatures as the modules are 260 Non-valid signatures and unsigned modules
|
/linux-6.1.9/scripts/ |
D | get_maintainer.pl | 1588 my @signatures = (); 1603 @signatures = grep(/^[ \t]*${signature_pattern}.*\@.*$/, @lines); 1608 return (0, \@signatures, \@authors, \@stats) if !@signatures; 1614 @signatures = grep(!/${penguin_chiefs}/i, @signatures); 1618 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures); 2130 my @signatures = ($line); 2131 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures);
|
/linux-6.1.9/Documentation/ABI/testing/ |
D | ima_policy | 56 limited to fsverity digest based signatures 146 Example of appraise rule allowing modsig appended signatures: 172 signatures (format version 3) stored in security.ima xattr.
|
D | evm | 57 signatures have been solved. 103 to be added at runtime. Any signatures generated after
|
/linux-6.1.9/Documentation/devicetree/bindings/nvmem/ |
D | nintendo-otp.yaml | 11 which contains common and per-console keys, signatures and related data
|
/linux-6.1.9/Documentation/process/ |
D | maintainer-pgp-guide.rst | 29 Both git repositories and tarballs carry PGP signatures of the kernel 30 developers who create official kernel releases. These signatures offer a 35 - git repositories provide PGP signatures on all tags 36 - tarballs provide detached PGP signatures with all downloads 225 faster computationally and creates much smaller signatures when 239 The more signatures you have on your PGP key from other developers, the 397 your signatures (if they know the passphrase). Furthermore, each time a 758 verification, so it properly processes signatures made by ECC keys. 776 signatures. Furthermore, when rebasing your repository to match 777 upstream, even your own PGP commit signatures will end up discarded. For [all …]
|
D | email-clients.rst | 56 Don't use PGP/GPG signatures in mail that contains patches.
|
/linux-6.1.9/Documentation/kbuild/ |
D | reproducible-builds.rst | 93 3. Create detached signatures for the modules, and publish them as 96 4. Perform a second build that attaches the module signatures. It
|
/linux-6.1.9/Documentation/x86/ |
D | zero-page.rst | 43 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
D | pti.rst | 164 Bugs in PTI cause a few different signatures of crashes
|
/linux-6.1.9/fs/verity/ |
D | Kconfig | 50 Support verifying signatures of verity files against the X.509
|
/linux-6.1.9/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 137 being set in the kernel. The signatures are checked against the builtin 156 has been authenticated in some way (cryptographic signatures, etc).
|
/linux-6.1.9/Documentation/crypto/ |
D | asymmetric-keys.rst | 235 have various checks that can be performed on it (eg. self-signatures, validity 397 A single keyring can be used to verify a chain of signatures by
|
/linux-6.1.9/kernel/module/ |
D | Kconfig | 95 Check modules for valid signatures upon load: the signature
|
/linux-6.1.9/drivers/nvmem/ |
D | Kconfig | 198 This memory contains common and per-console keys, signatures and
|
/linux-6.1.9/Documentation/bpf/ |
D | btf.rst | 594 pretty print types, dump func signatures and line info, etc. 713 func signatures and line info, along with byte/jit codes.
|
/linux-6.1.9/Documentation/input/devices/ |
D | alps.rst | 17 choice was made. The new touchpad signatures are named: "Rushmore",
|