Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 25 of 33) sorted by relevance

12

/linux-6.6.21/tools/testing/selftests/arm64/pauth/
Dpac.c39 void sign_specific(struct signatures *sign, size_t val) in sign_specific()
47 void sign_all(struct signatures *sign, size_t val) in sign_all()
56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same()
70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set()
92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all()
179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all()
257 struct signatures signed_vals; in TEST()
296 struct signatures new_keys; in TEST()
297 struct signatures old_keys; in TEST()
330 struct signatures trash; in TEST()
[all …]
Dexec_target.c12 struct signatures signed_vals; in main()
31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
Dhelper.h11 struct signatures { struct
/linux-6.6.21/drivers/scsi/
Dfdomain_isa.c65 } signatures[] = { variable
84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures)
101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
103 signatures[i].length)) in fdomain_isa_match()
107 sig = &signatures[i]; in fdomain_isa_match()
Daha152x.c3001 } signatures[] = variable
3303 for (j = 0; j<ARRAY_SIZE(signatures) && !ok; j++) in aha152x_init()
3304 ok = check_signature(p + signatures[j].sig_offset, in aha152x_init()
3305 signatures[j].signature, signatures[j].sig_length); in aha152x_init()
/linux-6.6.21/security/integrity/ima/
DKconfig182 bool "Appraise firmware signatures"
192 bool "Appraise kexec kernel image signatures"
200 Kernel image signatures can not be verified by the original
205 bool "Appraise kernel modules signatures"
212 Kernel module signatures can only be verified by IMA-appraisal,
233 bool "Support module-style signatures for appraisal"
240 Adds support for signatures appended to files. The format of the
243 to accept such signatures.
/linux-6.6.21/fs/verity/
DKconfig43 fs-verity builtin signatures.
46 the only way to do signatures with fs-verity, and the
/linux-6.6.21/Documentation/security/
Ddigsig.rst20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
82 to generate signatures, to load keys into the kernel keyring.
/linux-6.6.21/drivers/gpu/drm/nouveau/include/nvfw/
Dacr.h180 u32 signatures[4]; member
210 u32 signatures[4]; member
/linux-6.6.21/Documentation/admin-guide/
Dmodule-signing.rst13 .. - Non-valid signatures and unsigned modules.
30 involved. The signatures are not themselves encoded in any industrial standard
93 their signatures checked without causing a dependency loop.
128 Cryptographic keypairs are required to generate and check signatures. A
132 kernel so that it can be used to check the signatures as the modules are
260 Non-valid signatures and unsigned modules
/linux-6.6.21/scripts/
Dget_maintainer.pl1588 my @signatures = ();
1603 @signatures = grep(/^[ \t]*${signature_pattern}.*\@.*$/, @lines);
1608 return (0, \@signatures, \@authors, \@stats) if !@signatures;
1614 @signatures = grep(!/${penguin_chiefs}/i, @signatures);
1618 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures);
2130 my @signatures = ($line);
2131 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures);
/linux-6.6.21/Documentation/ABI/testing/
Dima_policy56 limited to fsverity digest based signatures
146 Example of appraise rule allowing modsig appended signatures:
172 signatures (format version 3) stored in security.ima xattr.
Devm57 signatures have been solved.
103 to be added at runtime. Any signatures generated after
Dsysfs-class-firmware-attributes408 signatures when setting the signing key. When written,
419 public key that will be used by the BIOS to verify signatures
/linux-6.6.21/Documentation/devicetree/bindings/nvmem/
Dnintendo-otp.yaml11 which contains common and per-console keys, signatures and related data
/linux-6.6.21/Documentation/process/
Dmaintainer-pgp-guide.rst29 Both git repositories and tarballs carry PGP signatures of the kernel
30 developers who create official kernel releases. These signatures offer a
35 - git repositories provide PGP signatures on all tags
36 - tarballs provide detached PGP signatures with all downloads
212 The more signatures you have on your PGP key from other developers, the
370 your signatures (if they know the passphrase). Furthermore, each time a
734 signatures. Furthermore, when rebasing your repository to match
735 upstream, even your own PGP commit signatures will end up discarded. For
749 signatures will be valuable for such purposes.
786 purpose that puts cryptographic attestation signatures into message
[all …]
Demail-clients.rst56 Don't use PGP/GPG signatures in mail that contains patches.
/linux-6.6.21/Documentation/kbuild/
Dreproducible-builds.rst93 3. Create detached signatures for the modules, and publish them as
96 4. Perform a second build that attaches the module signatures. It
/linux-6.6.21/Documentation/arch/x86/
Dzero-page.rst43 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
Dpti.rst164 Bugs in PTI cause a few different signatures of crashes
/linux-6.6.21/Documentation/filesystems/
Dfsverity.rst81 library that supports digital signatures.
441 verification of fs-verity builtin signatures.
444 It is not the only way to do signatures with fs-verity, and the
477 signatures are not the only way to do signatures with fs-verity. See
479 fs-verity builtin signatures have some major limitations that should
511 - fs-verity builtin signatures are in PKCS#7 format, and the public
514 builtin signatures use them), and are very feature rich.
522 Ed25519 keys and signatures, and verifying signatures in userspace.
525 still consider that verifying those signatures in userspace is more
534 for its signatures, so it partially avoids the issues discussed
/linux-6.6.21/Documentation/admin-guide/device-mapper/
Dverity.rst137 being set in the kernel. The signatures are checked against the builtin
156 has been authenticated in some way (cryptographic signatures, etc).
/linux-6.6.21/Documentation/crypto/
Dasymmetric-keys.rst235 have various checks that can be performed on it (eg. self-signatures, validity
397 A single keyring can be used to verify a chain of signatures by
/linux-6.6.21/drivers/nvmem/
DKconfig212 This memory contains common and per-console keys, signatures and
/linux-6.6.21/Documentation/bpf/
Dbtf.rst594 pretty print types, dump func signatures and line info, etc.
713 func signatures and line info, along with byte/jit codes.

12