Searched refs:signing (Results 1 – 23 of 23) sorted by relevance
| /Linux-v5.4/Documentation/admin-guide/ |
| D | module-signing.rst | 1 Kernel module signing facility 7 .. - Configuring module signing. 8 .. - Generating signing keys. 10 .. - Manually signing modules. 21 The kernel module signing facility cryptographically signs modules during 24 or modules signed with an invalid key. Module signing increases security by 38 Configuring module signing 41 The module signing facility is enabled by going to the 96 (4) :menuselection:`File name or PKCS#11 URI of module signing key` 100 ``certs/signing_key.pem`` will disable the autogeneration of signing keys [all …]
|
| D | index.rst | 67 module-signing
|
| /Linux-v5.4/Documentation/kbuild/ |
| D | reproducible-builds.rst | 74 Module signing 79 modules being unreproducible. However, including a signing key with 80 your source would presumably defeat the purpose of signing modules. 85 1. Generate a persistent signing key. Add the certificate for the key 89 signing key's certificate, set ``CONFIG_MODULE_SIG_KEY`` to an
|
| D | kbuild.rst | 224 utility when signing kernel modules, if the private key requires such.
|
| /Linux-v5.4/certs/ |
| D | Kconfig | 5 string "File name or PKCS#11 URI of module signing key" 16 certificate as described in Documentation/admin-guide/module-signing.rst 37 system keyring. Any certificate used for module signing is implicitly
|
| /Linux-v5.4/fs/cifs/ |
| D | smb2transport.c | 320 struct derivation signing; member 331 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey() 332 ptriplet->signing.context, ses->smb3signingkey, in generate_smb3signingkey() 377 d = &triplet.signing; in generate_smb30signingkey() 405 d = &triplet.signing; in generate_smb311signingkey()
|
| D | Kconfig | 45 signing, Unicode and other internationalization improvements.
|
| /Linux-v5.4/crypto/asymmetric_keys/ |
| D | mscode.asn1 | 1 --- Microsoft individual code signing data blob parser
|
| /Linux-v5.4/Documentation/crypto/ |
| D | asymmetric-keys.txt | 348 The kernel builtin trusted keyring will be searched for the signing key. 359 signing key. If the secondary trusted keyring is not configured, this 372 a group of keys may be searched for the signing key by providing the 376 within the destination keyring will also be searched for signing keys. 399 keyring, we can be certain that it has a valid signing chain going back to 420 keyring, we can be certain that there is a valid signing chain going back 424 In all of these cases, if the signing key is found the signature of the key to 425 be linked will be verified using the signing key. The requested key is added
|
| /Linux-v5.4/net/wimax/ |
| D | Kconfig | 15 Please note that most of these devices require signing up
|
| /Linux-v5.4/ |
| D | .gitignore | 128 # Leavings from module signing
|
| D | MAINTAINERS | 3827 F: Documentation/admin-guide/module-signing.rst
|
| /Linux-v5.4/Documentation/admin-guide/cifs/ |
| D | usage.rst | 83 and encrypted shares and stronger signing and authentication algorithms. 225 cifs signing enabled (and the physical network is insecure), consider use 643 Must use packet signing (helps avoid unwanted data modification 644 by intermediate systems in the route). Note that signing 674 Use Kerberos authentication and packet signing 678 Use NTLM password hashing with signing (if 680 server requires signing also can be the default) 684 Use NTLMv2 password hashing with packet signing 724 also packet signing. Authentication (may/must) 726 the signing flags. Specifying two different password [all …]
|
| D | introduction.rst | 29 signing, large files, Unicode support and other internationalization
|
| D | todo.rst | 121 and when signing is disabled to request larger read sizes (larger than
|
| /Linux-v5.4/Documentation/ |
| D | digsig.txt | 81 The signing and key management utilities evm-utils provide functionality
|
| D | Changes | 117 Module signing and external certificate handling use the OpenSSL program and 120 You will need openssl to build kernels 3.7 and higher if module signing is
|
| /Linux-v5.4/Documentation/filesystems/nfs/ |
| D | rpc-server-gss.txt | 33 - integrity/privacy protection (signing and encrypting of individual
|
| /Linux-v5.4/Documentation/process/ |
| D | changes.rst | 117 Module signing and external certificate handling use the OpenSSL program and 120 You will need openssl to build kernels 3.7 and higher if module signing is
|
| D | maintainer-pgp-guide.rst | 161 - **[S]** key can be used for signing 220 signing subkey:: 237 recommend that you create an ECC signing subkey for your kernel 295 such as when making changes to your own key or signing other people's 319 like editing identities, adding or revoking subkeys, or signing other 789 this reason, most kernel developers don't bother signing their commits
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | core.rst | 982 only need the public parts to be available, but for decryption and signing 1713 blob, signing a blob and verifying the signature on a blob. The following
|
| /Linux-v5.4/init/ |
| D | Kconfig | 2058 <file:Documentation/admin-guide/module-signing.rst>. 2061 kernel build dependency so that the signing tool can use its crypto
|
| /Linux-v5.4/arch/arm64/ |
| D | Kconfig | 1424 instructions for signing and authenticating pointers against secret
|