Searched refs:trusted (Results 1 - 25 of 53) sorted by relevance

123

/linux-master/security/keys/trusted-keys/
H A DMakefile3 # Makefile for trusted keys
6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o
7 trusted-y += trusted_core.o
8 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm1.o
11 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm2.o
12 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += tpm2key.asn1.o
14 trusted-$(CONFIG_TRUSTED_KEYS_TEE) += trusted_tee.o
16 trusted-$(CONFIG_TRUSTED_KEYS_CAAM) += trusted_caam.o
H A Dtrusted_caam.c7 #include <keys/trusted-type.h>
H A Dtrusted_core.c6 * See Documentation/security/keys/trusted-encrypted.rst
10 #include <keys/trusted-type.h>
29 MODULE_PARM_DESC(rng, "Select trusted key RNG");
33 MODULE_PARM_DESC(source, "Select trusted keys source (tpm, tee or caam)");
138 * trusted_instantiate - create a new trusted key
140 * Unseal an existing trusted blob or, for a new key, get a
141 * random key, then seal and create a trusted key-type key,
284 * On success, return to userspace the trusted key datablob size.
314 .name = "trusted",
340 * We always support trusted
[all...]
H A Dtrusted_tpm2.c14 #include <keys/trusted-type.h>
219 * tpm2_seal_trusted() - seal the payload of a trusted key
520 * tpm2_unseal_trusted() - unseal the payload of a trusted key
/linux-master/include/keys/
H A Dtrusted_tee.h12 #include <keys/trusted-type.h>
H A Dtrusted_tpm.h5 #include <keys/trusted-type.h>
67 print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE,
72 pr_info("trusted-key: enonce:\n");
/linux-master/drivers/md/
H A Ddm-verity-loadpin.c21 bool trusted = false; local
39 trusted = true;
46 return trusted;
51 * a verity device that is trusted by LoadPin.
59 bool trusted = false; local
79 trusted = true;
85 return trusted;
/linux-master/crypto/asymmetric_keys/
H A Drestrict.c62 * new certificate as being trusted.
65 * matching parent certificate in the trusted list, -EKEYREJECTED if the
209 struct key *trusted, bool check_dest)
222 if (!trusted && !check_dest)
234 if (trusted) {
235 if (trusted->type == &key_type_keyring) {
237 key = find_asymmetric_key(trusted, sig->auth_ids[0],
242 } else if (trusted->type == &key_type_asymmetric) {
246 asymmetric_key_ids(trusted)->id;
270 key = __key_get(trusted);
206 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) argument
328 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument
356 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument
[all...]
/linux-master/include/linux/
H A Dif_link.h30 __u32 trusted; member in struct:ifla_vf_info
/linux-master/security/keys/encrypted-keys/
H A Dmasterkey_trusted.c11 * See Documentation/security/keys/trusted-encrypted.rst
16 #include <keys/trusted-type.h>
21 * request_trusted_key - request the trusted key
24 * manages both trusted/encrypted key-types, like the encrypted key type
25 * data, trusted key type data is not visible decrypted from userspace.
/linux-master/security/keys/
H A DMakefile31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
/linux-master/include/crypto/
H A Dpublic_key.h70 struct key *trusted);
75 struct key *trusted);
/linux-master/drivers/net/ethernet/intel/ice/
H A Dice_sriov.h46 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted);
98 int __always_unused vf_id, bool __always_unused trusted)
97 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) argument
H A Dice_sriov.c1409 ivi->trusted = vf->trusted;
1490 * @trusted: Boolean value to enable/disable trusted VF
1492 * Enable or disable a given VF as trusted
1494 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) argument
1513 /* Check if already trusted */
1514 if (trusted == vf->trusted) {
1521 vf->trusted
[all...]
H A Dice_vf_lib.h108 u8 trusted:1; member in struct:ice_vf
/linux-master/drivers/net/ethernet/pensando/ionic/
H A Dionic.h34 u8 trusted; member in struct:ionic_vf
/linux-master/drivers/net/ethernet/intel/i40e/
H A Di40e_virtchnl_pf.h84 bool trusted; member in struct:i40e_vf
/linux-master/drivers/net/netdevsim/
H A Dnetdev.c179 nsim_dev->vfconfigs[vf].trusted = val;
202 ivi->trusted = nsim_dev->vfconfigs[vf].trusted;
H A Dnetdevsim.h277 bool trusted; member in struct:nsim_vf_config
/linux-master/drivers/net/ethernet/fungible/funeth/
H A Dfuneth.h39 u8 trusted:1; member in struct:fun_vport_info
/linux-master/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_sriov.c110 adapter->vfinfo[i].trusted = false;
956 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted &&
997 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted &&
1178 !adapter->vfinfo[vf].trusted) {
1821 if (adapter->vfinfo[vf].trusted == setting)
1824 adapter->vfinfo[vf].trusted = setting;
1849 ivi->trusted = adapter->vfinfo[vf].trusted;
/linux-master/include/net/
H A Daf_vsock.h40 bool trusted; member in struct:vsock_sock
/linux-master/drivers/net/ethernet/netronome/nfp/
H A Dnfp_net_sriov.c293 ivi->trusted = FIELD_GET(NFP_NET_VF_CFG_CTRL_TRUST, flags);
/linux-master/drivers/net/ethernet/broadcom/bnxt/
H A Dbnxt_sriov.c161 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trusted) argument
170 if (trusted)
205 ivi->trusted = bnxt_is_trusted_vf(bp, vf);
/linux-master/fs/
H A Dxattr.c133 * The trusted.* namespace can only be accessed by privileged users.
1310 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); local
1324 /* skip "trusted." attributes for unprivileged callers */
1325 if (!trusted && xattr_is_trusted(xattr->name))

Completed in 270 milliseconds

123