/systemd-251/src/boot/efi/ |
D | secure-boot.c | 8 BOOLEAN secure; in secure_boot_enabled() local 11 err = efivar_get_boolean_u8(EFI_GLOBAL_GUID, L"SecureBoot", &secure); in secure_boot_enabled() 13 return !EFI_ERROR(err) && secure; in secure_boot_enabled() 17 BOOLEAN secure, audit = FALSE, deployed = FALSE, setup = FALSE; in secure_boot_mode() local 20 err = efivar_get_boolean_u8(EFI_GLOBAL_GUID, L"SecureBoot", &secure); in secure_boot_mode() 30 return decode_secure_boot_mode(secure, audit, deployed, setup); in secure_boot_mode()
|
D | meson.build | 341 'secure-boot.h', 356 'secure-boot.c',
|
D | boot.c | 470 SecureBootMode secure; in print_status() local 480 secure = secure_boot_mode(); in print_status() 493 …re boot: %s (%s)\n", yes_no(IN_SET(secure, SECURE_BOOT_USER, SECURE_BOOT_DEPLOYED)), secure_boot_m… in print_status()
|
/systemd-251/src/fundamental/ |
D | efivars-fundamental.c | 20 sd_bool secure, in decode_secure_boot_mode() argument 26 if (secure && deployed && !audit && !setup) in decode_secure_boot_mode() 28 if (secure && !deployed && !audit && !setup) in decode_secure_boot_mode() 30 if (!secure && !deployed && audit && setup) in decode_secure_boot_mode() 32 if (!secure && !deployed && !audit && setup) in decode_secure_boot_mode() 37 if (!secure && !deployed && !audit && !setup) in decode_secure_boot_mode()
|
D | efivars-fundamental.h | 34 sd_bool secure,
|
/systemd-251/src/basic/ |
D | efivars.c | 334 int secure = read_flag(EFI_GLOBAL_VARIABLE(SecureBoot)); in efi_get_secure_boot_mode() local 335 if (secure < 0) { in efi_get_secure_boot_mode() 336 if (secure != -ENOENT) in efi_get_secure_boot_mode() 337 …log_debug_errno(secure, "Error reading SecureBoot EFI variable, assuming not in SecureBoot mode: %… in efi_get_secure_boot_mode() 348 secure, audit, deployed, setup); in efi_get_secure_boot_mode() 350 return (cache = decode_secure_boot_mode(secure, audit > 0, deployed > 0, setup > 0)); in efi_get_secure_boot_mode()
|
D | hexdecoct.h | 21 int unhexmem_full(const char *p, size_t l, bool secure, void **mem, size_t *len); 44 int unbase64mem_full(const char *p, size_t l, bool secure, void **mem, size_t *len);
|
D | hexdecoct.c | 111 int unhexmem_full(const char *p, size_t l, bool secure, void **ret, size_t *ret_len) { in unhexmem_full() argument 159 if (secure) in unhexmem_full() 751 int unbase64mem_full(const char *p, size_t l, bool secure, void **ret, size_t *ret_size) { in unbase64mem_full() argument 862 if (secure) in unbase64mem_full()
|
/systemd-251/src/creds/ |
D | creds.c | 131 const char *secure, *secure_color = NULL; in add_credentials_to_table() local 166 secure = "encrypted"; in add_credentials_to_table() 169 …secure = "insecure"; /* Anything that is accessible more than read-only to its owner is insecure */ in add_credentials_to_table() 176 …secure = r ? "secure" : "weak"; /* ramfs is not swappable, hence "secure", everything else is "wea… in add_credentials_to_table() 187 TABLE_STRING, secure, in add_credentials_to_table()
|
/systemd-251/po/ |
D | POTFILES.skip | 2 src/boot/efi/secure-boot.c
|
/systemd-251/ |
D | .vimrc | 4 " You should consider setting 'set secure' as well, which is highly
|
D | TODO | 264 pass seed to kernel, but credit only if secure boot is used 572 disk the rootfs is on in a reasonably secure way. (or maybe: add 1405 traditional distros that generate initrds locally to secure them with TPM:
|
D | NEWS | 2766 FIDO2 or PKCS#11 authentication, as a secure fallback in case the 2861 secure way. It's supposed to be used to pass per-service secret data 3055 has been updated to turn on "secure" mode in "less" 5874 While turning on this option is a big step towards a more secure 6095 when the system is booted in UEFI "secure mode". 6778 with DynamicUser=yes as they provide secure, properly-owned, 11963 if it returns into the foreground. This allows secure 13979 even CAP_NET_ADMIN system-wide for secure systems.
|
/systemd-251/src/boot/ |
D | bootctl.c | 1602 SecureBootMode secure = efi_get_secure_boot_mode(); in verb_status() local 1606 enable_disable(IN_SET(secure, SECURE_BOOT_USER, SECURE_BOOT_DEPLOYED)), in verb_status() 1607 secure_boot_mode_to_string(secure)); in verb_status()
|
/systemd-251/docs/ |
D | HOME_DIRECTORY.md | 82 This is the most advanced and most secure storage mechanism and consists of a
|
D | CREDENTIALS.md | 274 useful to implement secure parameterization of vendor-built and signed
|
D | CONTAINER_INTERFACE.md | 371 run in a different, less secure environment when the capabilities are missing
|
D | RANDOM_SEEDS.md | 150 secure random numbers, but before it's initialized it has the nice effect of
|
D | USER_RECORD.md | 913 like Linux strives for being sufficiently secure even after a user acquired a 939 records is that they are self-sufficiently trusted, not relying on a secure
|
D | CGROUP_DELEGATION.md | 82 support for all kinds of per-cgroup BPF magic, supports secure delegation of
|
/systemd-251/hwdb.d/ |
D | usb.ids | 11462 5036 Portable secure storage for software licenses 12660 5803 BCM5880 Secure Applications Processor with secure keyboard 21349 9039 Tablet 2 secure multifunction biometric tablet 21350 904d Tablet 2 secure multifunction biometric tablet 21351 904e Tablet 2 secure multifunction biometric tablet 21352 9091 Tablet 2 secure multifunction biometric tablet 21353 9092 Tablet 2 secure multifunction biometric tablet 21354 f000 Tablet 2 secure multifunction biometric tablet 21355 f003 Tablet 2 secure multifunction biometric tablet 21356 f006 Tablet 2 secure multifunction biometric tablet [all …]
|
D | 20-usb-vendor-model.hwdb | 34320 ID_MODEL_FROM_DATABASE=Portable secure storage for software licenses 37914 ID_MODEL_FROM_DATABASE=BCM5880 Secure Applications Processor with secure keyboard 63981 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63984 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63987 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63990 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63993 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63996 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 63999 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet 64002 ID_MODEL_FROM_DATABASE=Tablet 2 secure multifunction biometric tablet [all …]
|