/linux-master/security/keys/trusted-keys/ |
H A D | Makefile | 3 # Makefile for trusted keys 6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o 7 trusted-y += trusted_core.o 8 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm1.o 11 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += trusted_tpm2.o 12 trusted-$(CONFIG_TRUSTED_KEYS_TPM) += tpm2key.asn1.o 14 trusted-$(CONFIG_TRUSTED_KEYS_TEE) += trusted_tee.o 16 trusted-$(CONFIG_TRUSTED_KEYS_CAAM) += trusted_caam.o
|
H A D | trusted_caam.c | 7 #include <keys/trusted-type.h>
|
H A D | trusted_core.c | 6 * See Documentation/security/keys/trusted-encrypted.rst 10 #include <keys/trusted-type.h> 29 MODULE_PARM_DESC(rng, "Select trusted key RNG"); 33 MODULE_PARM_DESC(source, "Select trusted keys source (tpm, tee or caam)"); 138 * trusted_instantiate - create a new trusted key 140 * Unseal an existing trusted blob or, for a new key, get a 141 * random key, then seal and create a trusted key-type key, 284 * On success, return to userspace the trusted key datablob size. 314 .name = "trusted", 340 * We always support trusted [all...] |
H A D | trusted_tpm2.c | 14 #include <keys/trusted-type.h> 219 * tpm2_seal_trusted() - seal the payload of a trusted key 520 * tpm2_unseal_trusted() - unseal the payload of a trusted key
|
/linux-master/include/keys/ |
H A D | trusted_tee.h | 12 #include <keys/trusted-type.h>
|
H A D | trusted_tpm.h | 5 #include <keys/trusted-type.h> 67 print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE, 72 pr_info("trusted-key: enonce:\n");
|
/linux-master/drivers/md/ |
H A D | dm-verity-loadpin.c | 21 bool trusted = false; local 39 trusted = true; 46 return trusted; 51 * a verity device that is trusted by LoadPin. 59 bool trusted = false; local 79 trusted = true; 85 return trusted;
|
/linux-master/crypto/asymmetric_keys/ |
H A D | restrict.c | 62 * new certificate as being trusted. 65 * matching parent certificate in the trusted list, -EKEYREJECTED if the 209 struct key *trusted, bool check_dest) 222 if (!trusted && !check_dest) 234 if (trusted) { 235 if (trusted->type == &key_type_keyring) { 237 key = find_asymmetric_key(trusted, sig->auth_ids[0], 242 } else if (trusted->type == &key_type_asymmetric) { 246 asymmetric_key_ids(trusted)->id; 270 key = __key_get(trusted); 206 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) argument 328 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument 356 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument [all...] |
/linux-master/include/linux/ |
H A D | if_link.h | 30 __u32 trusted; member in struct:ifla_vf_info
|
/linux-master/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 16 #include <keys/trusted-type.h> 21 * request_trusted_key - request the trusted key 24 * manages both trusted/encrypted key-types, like the encrypted key type 25 * data, trusted key type data is not visible decrypted from userspace.
|
/linux-master/security/keys/ |
H A D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
/linux-master/include/crypto/ |
H A D | public_key.h | 70 struct key *trusted); 75 struct key *trusted);
|
/linux-master/drivers/net/ethernet/intel/ice/ |
H A D | ice_sriov.h | 46 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 98 int __always_unused vf_id, bool __always_unused trusted) 97 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) argument
|
H A D | ice_sriov.c | 1409 ivi->trusted = vf->trusted; 1490 * @trusted: Boolean value to enable/disable trusted VF 1492 * Enable or disable a given VF as trusted 1494 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) argument 1513 /* Check if already trusted */ 1514 if (trusted == vf->trusted) { 1521 vf->trusted [all...] |
H A D | ice_vf_lib.h | 108 u8 trusted:1; member in struct:ice_vf
|
/linux-master/drivers/net/ethernet/pensando/ionic/ |
H A D | ionic.h | 34 u8 trusted; member in struct:ionic_vf
|
/linux-master/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_virtchnl_pf.h | 84 bool trusted; member in struct:i40e_vf
|
/linux-master/drivers/net/netdevsim/ |
H A D | netdev.c | 179 nsim_dev->vfconfigs[vf].trusted = val; 202 ivi->trusted = nsim_dev->vfconfigs[vf].trusted;
|
H A D | netdevsim.h | 277 bool trusted; member in struct:nsim_vf_config
|
/linux-master/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth.h | 39 u8 trusted:1; member in struct:fun_vport_info
|
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_sriov.c | 110 adapter->vfinfo[i].trusted = false; 956 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && 997 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && 1178 !adapter->vfinfo[vf].trusted) { 1821 if (adapter->vfinfo[vf].trusted == setting) 1824 adapter->vfinfo[vf].trusted = setting; 1849 ivi->trusted = adapter->vfinfo[vf].trusted;
|
/linux-master/include/net/ |
H A D | af_vsock.h | 40 bool trusted; member in struct:vsock_sock
|
/linux-master/drivers/net/ethernet/netronome/nfp/ |
H A D | nfp_net_sriov.c | 293 ivi->trusted = FIELD_GET(NFP_NET_VF_CFG_CTRL_TRUST, flags);
|
/linux-master/drivers/net/ethernet/broadcom/bnxt/ |
H A D | bnxt_sriov.c | 161 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trusted) argument 170 if (trusted) 205 ivi->trusted = bnxt_is_trusted_vf(bp, vf);
|
/linux-master/fs/ |
H A D | xattr.c | 133 * The trusted.* namespace can only be accessed by privileged users. 1310 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); local 1324 /* skip "trusted." attributes for unprivileged callers */ 1325 if (!trusted && xattr_is_trusted(xattr->name))
|