Searched refs:signing (Results 1 – 24 of 24) sorted by relevance
| /Linux-v5.10/Documentation/admin-guide/ |
| D | module-signing.rst | 1 Kernel module signing facility 7 .. - Configuring module signing. 8 .. - Generating signing keys. 10 .. - Manually signing modules. 21 The kernel module signing facility cryptographically signs modules during 24 or modules signed with an invalid key. Module signing increases security by 38 Configuring module signing 41 The module signing facility is enabled by going to the 96 (4) :menuselection:`File name or PKCS#11 URI of module signing key` 100 ``certs/signing_key.pem`` will disable the autogeneration of signing keys [all …]
|
| D | index.rst | 101 module-signing
|
| /Linux-v5.10/Documentation/kbuild/ |
| D | reproducible-builds.rst | 74 Module signing 79 modules being unreproducible. However, including a signing key with 80 your source would presumably defeat the purpose of signing modules. 85 1. Generate a persistent signing key. Add the certificate for the key 89 signing key's certificate, set ``CONFIG_MODULE_SIG_KEY`` to an
|
| D | kbuild.rst | 224 utility when signing kernel modules, if the private key requires such.
|
| /Linux-v5.10/fs/cifs/ |
| D | smb2transport.c | 383 struct derivation signing; member 405 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey() 406 ptriplet->signing.context, in generate_smb3signingkey() 412 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey() 413 ptriplet->signing.context, in generate_smb3signingkey() 464 d = &triplet.signing; in generate_smb30signingkey() 492 d = &triplet.signing; in generate_smb311signingkey()
|
| D | Kconfig | 45 signing, Unicode and other internationalization improvements.
|
| /Linux-v5.10/certs/ |
| D | Kconfig | 5 string "File name or PKCS#11 URI of module signing key" 16 certificate as described in Documentation/admin-guide/module-signing.rst 37 system keyring. Any certificate used for module signing is implicitly
|
| /Linux-v5.10/crypto/asymmetric_keys/ |
| D | mscode.asn1 | 1 --- Microsoft individual code signing data blob parser
|
| /Linux-v5.10/Documentation/crypto/ |
| D | asymmetric-keys.rst | 343 The kernel builtin trusted keyring will be searched for the signing key. 354 signing key. If the secondary trusted keyring is not configured, this 367 a group of keys may be searched for the signing key by providing the 371 within the destination keyring will also be searched for signing keys. 394 keyring, we can be certain that it has a valid signing chain going back to 415 keyring, we can be certain that there is a valid signing chain going back 419 In all of these cases, if the signing key is found the signature of the key to 420 be linked will be verified using the signing key. The requested key is added
|
| /Linux-v5.10/Documentation/translations/zh_CN/admin-guide/ |
| D | index.rst | 98 module-signing
|
| /Linux-v5.10/net/wimax/ |
| D | Kconfig | 15 Please note that most of these devices require signing up
|
| /Linux-v5.10/Documentation/admin-guide/cifs/ |
| D | usage.rst | 82 and encrypted shares and stronger signing and authentication algorithms. 224 cifs signing enabled (and the physical network is insecure), consider use 642 Must use packet signing (helps avoid unwanted data modification 643 by intermediate systems in the route). Note that signing 673 Use Kerberos authentication and packet signing 677 Use NTLM password hashing with signing (if 679 server requires signing also can be the default) 683 Use NTLMv2 password hashing with packet signing 723 also packet signing. Authentication (may/must) 725 the signing flags. Specifying two different password [all …]
|
| D | introduction.rst | 29 signing, large files, Unicode support and other internationalization
|
| D | todo.rst | 121 and when signing is disabled to request larger read sizes (larger than
|
| /Linux-v5.10/ |
| D | .gitignore | 131 # Leavings from module signing
|
| D | MAINTAINERS | 4102 F: Documentation/admin-guide/module-signing.rst
|
| /Linux-v5.10/Documentation/security/ |
| D | digsig.rst | 81 The signing and key management utilities evm-utils provide functionality
|
| /Linux-v5.10/Documentation/filesystems/nfs/ |
| D | rpc-server-gss.rst | 36 - integrity/privacy protection (signing and encrypting of individual
|
| /Linux-v5.10/Documentation/process/ |
| D | changes.rst | 127 Module signing and external certificate handling use the OpenSSL program and 130 You will need openssl to build kernels 3.7 and higher if module signing is
|
| D | maintainer-pgp-guide.rst | 161 - **[S]** key can be used for signing 220 signing subkey:: 237 recommend that you create an ECC signing subkey for your kernel 295 such as when making changes to your own key or signing other people's 319 like editing identities, adding or revoking subkeys, or signing other 789 this reason, most kernel developers don't bother signing their commits
|
| /Linux-v5.10/Documentation/ |
| D | Changes | 127 Module signing and external certificate handling use the OpenSSL program and 130 You will need openssl to build kernels 3.7 and higher if module signing is
|
| /Linux-v5.10/Documentation/security/keys/ |
| D | core.rst | 986 only need the public parts to be available, but for decryption and signing 1774 blob, signing a blob and verifying the signature on a blob. The following
|
| /Linux-v5.10/init/ |
| D | Kconfig | 2140 <file:Documentation/admin-guide/module-signing.rst>. 2143 kernel build dependency so that the signing tool can use its crypto
|
| /Linux-v5.10/arch/arm64/ |
| D | Kconfig | 1507 instructions for signing and authenticating pointers against secret
|