Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 25 of 27) sorted by relevance

12

/Linux-v5.4/drivers/scsi/
Dfdomain_isa.c65 } signatures[] = { variable
84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures)
101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
103 signatures[i].length)) in fdomain_isa_match()
107 sig = &signatures[i]; in fdomain_isa_match()
Daha152x.c2949 } signatures[] = variable
3251 for (j = 0; j<ARRAY_SIZE(signatures) && !ok; j++) in aha152x_init()
3252 ok = check_signature(p + signatures[j].sig_offset, in aha152x_init()
3253 signatures[j].signature, signatures[j].sig_length); in aha152x_init()
/Linux-v5.4/security/integrity/ima/
DKconfig186 bool "Appraise firmware signatures"
196 bool "Appraise kexec kernel image signatures"
204 Kernel image signatures can not be verified by the original
209 bool "Appraise kernel modules signatures"
216 Kernel module signatures can only be verified by IMA-appraisal,
237 bool "Support module-style signatures for appraisal"
244 Adds support for signatures appended to files. The format of the
247 to accept such signatures.
/Linux-v5.4/Documentation/
Ddigsig.txt20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
82 to generate signatures, to load keys into the kernel keyring.
/Linux-v5.4/Documentation/admin-guide/
Dmodule-signing.rst13 .. - Non-valid signatures and unsigned modules.
30 involved. The signatures are not themselves encoded in any industrial standard
93 their signatures checked without causing a dependency loop.
128 Cryptographic keypairs are required to generate and check signatures. A
132 kernel so that it can be used to check the signatures as the modules are
260 Non-valid signatures and unsigned modules
/Linux-v5.4/scripts/
Dget_maintainer.pl1580 my @signatures = ();
1595 @signatures = grep(/^[ \t]*${signature_pattern}.*\@.*$/, @lines);
1600 return (0, \@signatures, \@authors, \@stats) if !@signatures;
1606 @signatures = grep(!/${penguin_chiefs}/i, @signatures);
1610 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures);
2096 my @signatures = ($line);
2097 my ($types_ref, $signers_ref) = extract_formatted_signatures(@signatures);
Dcheckpatch.pl2329 my %signatures = ();
2686 if (defined $signatures{$sig_nospace}) {
2690 $signatures{$sig_nospace} = 1;
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/subdev/secboot/
Dacr_r364.c35 u32 signatures[4]; member
Dacr_r367.c324 u32 signatures[4]; member
Dacr_r352.c115 u32 signatures[4]; member
/Linux-v5.4/Documentation/kbuild/
Dreproducible-builds.rst93 3. Create detached signatures for the modules, and publish them as
96 4. Perform a second build that attaches the module signatures. It
/Linux-v5.4/Documentation/x86/
Dzero-page.rst41 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
Dpti.rst164 Bugs in PTI cause a few different signatures of crashes
/Linux-v5.4/Documentation/process/
Dmaintainer-pgp-guide.rst29 Both git repositories and tarballs carry PGP signatures of the kernel
30 developers who create official kernel releases. These signatures offer a
35 - git repositories provide PGP signatures on all tags
36 - tarballs provide detached PGP signatures with all downloads
153 key using certifying key signatures (certificates). It is important to
234 much faster computationally and creates much smaller signatures when
250 The more signatures you have on your PGP key from other developers, the
410 your signatures (if they know the passphrase). Furthermore, each time a
769 verification, so it properly processes signatures made by ECC keys.
787 signatures. Furthermore, when rebasing your repository to match
[all …]
Demail-clients.rst51 Don't use PGP/GPG signatures in mail that contains patches.
/Linux-v5.4/fs/verity/
DKconfig45 Support verifying signatures of verity files against the X.509
/Linux-v5.4/Documentation/ABI/testing/
Devm67 to be added at runtime. Any signatures generated after
Dima_policy109 Example of appraise rule allowing modsig appended signatures:
/Linux-v5.4/Documentation/crypto/
Dasymmetric-keys.txt239 have various checks that can be performed on it (eg. self-signatures, validity
402 A single keyring can be used to verify a chain of signatures by
/Linux-v5.4/Documentation/admin-guide/device-mapper/
Dverity.rst143 has been authenticated in some way (cryptographic signatures, etc).
/Linux-v5.4/Documentation/bpf/
Dbtf.rst495 pretty print types, dump func signatures and line info, etc.
617 func signatures and line info, along with byte/jit codes.
/Linux-v5.4/Documentation/input/devices/
Dalps.rst17 choice was made. The new touchpad signatures are named: "Rushmore",
/Linux-v5.4/Documentation/filesystems/
Dubifs-authentication.rst426 UBIFS can exchange all digital signatures with HMACs on first mount similar
/Linux-v5.4/Documentation/security/keys/
Dcore.rst914 chains or individual certificate signatures using the asymmetric key type.
/Linux-v5.4/init/
DKconfig2056 Check modules for valid signatures upon load: the signature

12