| /Linux-v5.15/tools/testing/selftests/arm64/pauth/ |
| D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 257 struct signatures signed_vals; in TEST() 296 struct signatures new_keys; in TEST() 297 struct signatures old_keys; in TEST() 330 struct signatures trash; in TEST() [all …]
|
| D | exec_target.c | 12 struct signatures signed_vals; in main() 31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
| D | helper.h | 11 struct signatures { struct
|
| /Linux-v5.15/security/integrity/ima/ |
| D | Kconfig | 190 bool "Appraise firmware signatures" 200 bool "Appraise kexec kernel image signatures" 208 Kernel image signatures can not be verified by the original 213 bool "Appraise kernel modules signatures" 220 Kernel module signatures can only be verified by IMA-appraisal, 241 bool "Support module-style signatures for appraisal" 248 Adds support for signatures appended to files. The format of the 251 to accept such signatures.
|
| D | ima_appraise.c | 451 * File signatures on some filesystems can not be properly verified. in ima_appraise_measurement() 464 /* Fix mode, but don't replace file signatures. */ in ima_appraise_measurement() 473 * Permit new files with file/EVM portable signatures, but in ima_appraise_measurement() 499 /* do not collect and update hash for digital signatures */ in ima_update_xattr()
|
| /Linux-v5.15/drivers/scsi/ |
| D | fdomain_isa.c | 40 * The following BIOS signature signatures are for boards which do *NOT* 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
| /Linux-v5.15/security/integrity/platform_certs/ |
| D | load_uefi.c | 102 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs() 115 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs() 158 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs() 175 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs() 190 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
|
| D | load_powerpc.c | 77 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs() 88 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs()
|
| /Linux-v5.15/Documentation/admin-guide/ |
| D | module-signing.rst | 13 .. - Non-valid signatures and unsigned modules. 30 involved. The signatures are not themselves encoded in any industrial standard 93 their signatures checked without causing a dependency loop. 128 Cryptographic keypairs are required to generate and check signatures. A 132 kernel so that it can be used to check the signatures as the modules are 260 Non-valid signatures and unsigned modules
|
| /Linux-v5.15/drivers/gpu/drm/nouveau/include/nvfw/ |
| D | acr.h | 95 u32 signatures[4]; member 125 u32 signatures[4]; member
|
| /Linux-v5.15/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 6 # both signatures depending on the IMA policy, or none. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 227 # Are there pe and ima signatures
|
| D | test_kexec_load.sh | 5 # signatures are required. (Dependent on CONFIG_IMA_ARCH_POLICY.)
|
| /Linux-v5.15/Documentation/process/ |
| D | maintainer-pgp-guide.rst | 29 Both git repositories and tarballs carry PGP signatures of the kernel 30 developers who create official kernel releases. These signatures offer a 35 - git repositories provide PGP signatures on all tags 36 - tarballs provide detached PGP signatures with all downloads 153 key using certifying key signatures (certificates). It is important to 234 much faster computationally and creates much smaller signatures when 250 The more signatures you have on your PGP key from other developers, the 410 your signatures (if they know the passphrase). Furthermore, each time a 769 verification, so it properly processes signatures made by ECC keys. 787 signatures. Furthermore, when rebasing your repository to match [all …]
|
| /Linux-v5.15/include/uapi/linux/ |
| D | fsverity.h | 67 * Format in which fs-verity file digests are signed in built-in signatures. 74 * is optional. fs-verity users may also verify signatures in userspace, in
|
| /Linux-v5.15/Documentation/security/ |
| D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem. 82 to generate signatures, to load keys into the kernel keyring.
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | evm | 56 signatures have been solved. 102 to be added at runtime. Any signatures generated after
|
| /Linux-v5.15/Documentation/kbuild/ |
| D | reproducible-builds.rst | 93 3. Create detached signatures for the modules, and publish them as 96 4. Perform a second build that attaches the module signatures. It
|
| /Linux-v5.15/lib/ |
| D | check_signature.c | 6 * check_signature - find BIOS signatures
|
| /Linux-v5.15/scripts/ |
| D | get_maintainer.pl | 245 'git-blame-signatures!' => \$email_git_blame_signatures, 248 'git-min-signatures=i' => \$email_git_min_signatures, 1046 --git-min-signatures => number of signatures required (default: $email_git_min_signatures) 1050 --git-blame-signatures => when used with --git-blame, also include all commit signers 1064 --fixes => for patches, add signatures of commits with 'Fixes: <commit>' (default: 1 (on)) 1111 --git-min-signatures, --git-max-maintainers, --git-min-percent, and 1574 ## Reformat email addresses (with names) to avoid badly written signatures 1587 my @signatures = (); 1602 @signatures = grep(/^[ \t]*${signature_pattern}.*\@.*$/, @lines); 1607 return (0, \@signatures, \@authors, \@stats) if !@signatures; [all …]
|
| /Linux-v5.15/security/integrity/evm/ |
| D | evm_crypto.c | 158 * signatures in hmac_add_misc() 247 * signatures/HMACs. in evm_calc_hmac_or_hash() 301 /* Portable EVM signatures must include an IMA hash */ in evm_calc_hmac_or_hash()
|
| /Linux-v5.15/Documentation/devicetree/bindings/nvmem/ |
| D | nintendo-otp.yaml | 11 which contains common and per-console keys, signatures and related data
|
| /Linux-v5.15/Documentation/sphinx/ |
| D | cdomain.py | 30 * Handle signatures of function-like macros well. Don't try to deduce 152 u"""Handles signatures of function-like macros.
|
| /Linux-v5.15/arch/powerpc/kernel/ |
| D | ima_arch.c | 17 * These rules verify the file signatures against known good values.
|
| /Linux-v5.15/arch/powerpc/include/uapi/asm/ |
| D | nvram.h | 14 /* Signatures for nvram partitions */
|
| /Linux-v5.15/fs/verity/ |
| D | Kconfig | 49 Support verifying signatures of verity files against the X.509
|