Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 22 of 22) sorted by relevance

/systemd-251/src/boot/efi/
Dsecure-boot.c8 BOOLEAN secure; in secure_boot_enabled() local
11 err = efivar_get_boolean_u8(EFI_GLOBAL_GUID, L"SecureBoot", &secure); in secure_boot_enabled()
13 return !EFI_ERROR(err) && secure; in secure_boot_enabled()
17 BOOLEAN secure, audit = FALSE, deployed = FALSE, setup = FALSE; in secure_boot_mode() local
20 err = efivar_get_boolean_u8(EFI_GLOBAL_GUID, L"SecureBoot", &secure); in secure_boot_mode()
30 return decode_secure_boot_mode(secure, audit, deployed, setup); in secure_boot_mode()
Dmeson.build341 'secure-boot.h',
356 'secure-boot.c',
Dboot.c470 SecureBootMode secure; in print_status() local
480 secure = secure_boot_mode(); in print_status()
493 …re boot: %s (%s)\n", yes_no(IN_SET(secure, SECURE_BOOT_USER, SECURE_BOOT_DEPLOYED)), secure_boot_m… in print_status()
/systemd-251/src/fundamental/
Defivars-fundamental.c20 sd_bool secure, in decode_secure_boot_mode() argument
26 if (secure && deployed && !audit && !setup) in decode_secure_boot_mode()
28 if (secure && !deployed && !audit && !setup) in decode_secure_boot_mode()
30 if (!secure && !deployed && audit && setup) in decode_secure_boot_mode()
32 if (!secure && !deployed && !audit && setup) in decode_secure_boot_mode()
37 if (!secure && !deployed && !audit && !setup) in decode_secure_boot_mode()
Defivars-fundamental.h34 sd_bool secure,
/systemd-251/src/basic/
Defivars.c334 int secure = read_flag(EFI_GLOBAL_VARIABLE(SecureBoot)); in efi_get_secure_boot_mode() local
335 if (secure < 0) { in efi_get_secure_boot_mode()
336 if (secure != -ENOENT) in efi_get_secure_boot_mode()
337 …log_debug_errno(secure, "Error reading SecureBoot EFI variable, assuming not in SecureBoot mode: %… in efi_get_secure_boot_mode()
348 secure, audit, deployed, setup); in efi_get_secure_boot_mode()
350 return (cache = decode_secure_boot_mode(secure, audit > 0, deployed > 0, setup > 0)); in efi_get_secure_boot_mode()
Dhexdecoct.h21 int unhexmem_full(const char *p, size_t l, bool secure, void **mem, size_t *len);
44 int unbase64mem_full(const char *p, size_t l, bool secure, void **mem, size_t *len);
Dhexdecoct.c111 int unhexmem_full(const char *p, size_t l, bool secure, void **ret, size_t *ret_len) { in unhexmem_full() argument
159 if (secure) in unhexmem_full()
751 int unbase64mem_full(const char *p, size_t l, bool secure, void **ret, size_t *ret_size) { in unbase64mem_full() argument
862 if (secure) in unbase64mem_full()
/systemd-251/src/creds/
Dcreds.c131 const char *secure, *secure_color = NULL; in add_credentials_to_table() local
166 secure = "encrypted"; in add_credentials_to_table()
169secure = "insecure"; /* Anything that is accessible more than read-only to its owner is insecure */ in add_credentials_to_table()
176secure = r ? "secure" : "weak"; /* ramfs is not swappable, hence "secure", everything else is "wea… in add_credentials_to_table()
187 TABLE_STRING, secure, in add_credentials_to_table()
/systemd-251/po/
DPOTFILES.skip2 src/boot/efi/secure-boot.c
/systemd-251/
D.vimrc4 " You should consider setting 'set secure' as well, which is highly
DTODO264 pass seed to kernel, but credit only if secure boot is used
572 disk the rootfs is on in a reasonably secure way. (or maybe: add
1405 traditional distros that generate initrds locally to secure them with TPM:
DNEWS2766 FIDO2 or PKCS#11 authentication, as a secure fallback in case the
2861 secure way. It's supposed to be used to pass per-service secret data
3055 has been updated to turn on "secure" mode in "less"
5874 While turning on this option is a big step towards a more secure
6095 when the system is booted in UEFI "secure mode".
6778 with DynamicUser=yes as they provide secure, properly-owned,
11963 if it returns into the foreground. This allows secure
13979 even CAP_NET_ADMIN system-wide for secure systems.
/systemd-251/src/boot/
Dbootctl.c1602 SecureBootMode secure = efi_get_secure_boot_mode(); in verb_status() local
1606 enable_disable(IN_SET(secure, SECURE_BOOT_USER, SECURE_BOOT_DEPLOYED)), in verb_status()
1607 secure_boot_mode_to_string(secure)); in verb_status()
/systemd-251/docs/
DHOME_DIRECTORY.md82 This is the most advanced and most secure storage mechanism and consists of a
DCREDENTIALS.md274 useful to implement secure parameterization of vendor-built and signed
DCONTAINER_INTERFACE.md371 run in a different, less secure environment when the capabilities are missing
DRANDOM_SEEDS.md150 secure random numbers, but before it's initialized it has the nice effect of
DUSER_RECORD.md913 like Linux strives for being sufficiently secure even after a user acquired a
939 records is that they are self-sufficiently trusted, not relying on a secure
DCGROUP_DELEGATION.md82 support for all kinds of per-cgroup BPF magic, supports secure delegation of
/systemd-251/hwdb.d/
Dusb.ids11462 5036 Portable secure storage for software licenses
12660 5803 BCM5880 Secure Applications Processor with secure keyboard
21349 9039 Tablet 2 secure multifunction biometric tablet
21350 904d Tablet 2 secure multifunction biometric tablet
21351 904e Tablet 2 secure multifunction biometric tablet
21352 9091 Tablet 2 secure multifunction biometric tablet
21353 9092 Tablet 2 secure multifunction biometric tablet
21354 f000 Tablet 2 secure multifunction biometric tablet
21355 f003 Tablet 2 secure multifunction biometric tablet
21356 f006 Tablet 2 secure multifunction biometric tablet
[all …]
D20-usb-vendor-model.hwdb34320 ID_MODEL_FROM_DATABASE=Portable secure storage for software licenses
37914 ID_MODEL_FROM_DATABASE=BCM5880 Secure Applications Processor with secure keyboard
63981 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63984 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63987 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63990 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63993 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63996 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
63999 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
64002 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet
[all …]