/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | restrict.c | 62 * new certificate as being trusted. 65 * matching parent certificate in the trusted list, -EKEYREJECTED if the 121 struct key *trusted, bool check_dest) in key_or_keyring_common() 134 if (!trusted && !check_dest) in key_or_keyring_common() 146 if (trusted) { in key_or_keyring_common() 147 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 149 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common() 153 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 156 signer_ids = asymmetric_key_ids(trusted); in key_or_keyring_common() 180 key = __key_get(trusted); in key_or_keyring_common() 118 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) key_or_keyring_common() argument 230 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) restrict_link_by_key_or_keyring() argument 257 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) restrict_link_by_key_or_keyring_chain() argument [all...] |
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | restrict.c | 62 * new certificate as being trusted. 65 * matching parent certificate in the trusted list, -EKEYREJECTED if the 205 struct key *trusted, bool check_dest) in key_or_keyring_common() 218 if (!trusted && !check_dest) in key_or_keyring_common() 230 if (trusted) { in key_or_keyring_common() 231 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 233 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common() 238 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 242 asymmetric_key_ids(trusted)->id; in key_or_keyring_common() 266 key = __key_get(trusted); in key_or_keyring_common() 202 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) key_or_keyring_common() argument 324 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) restrict_link_by_key_or_keyring() argument 352 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) restrict_link_by_key_or_keyring_chain() argument [all...] |
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-verity-loadpin.c | 21 bool trusted = false; in is_trusted_verity_target() local 39 trusted = true; in is_trusted_verity_target() 46 return trusted; in is_trusted_verity_target() 51 * a verity device that is trusted by LoadPin. 59 bool trusted = false; in dm_verity_loadpin_is_bdev_trusted() local 79 trusted = true; in dm_verity_loadpin_is_bdev_trusted() 85 return trusted; in dm_verity_loadpin_is_bdev_trusted()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | public_key.h | 68 struct key *trusted); 73 struct key *trusted);
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ice/ |
H A D | ice_virtchnl_pf.h | 8 /* Restrict number of MAC Addr and VLAN that non-trusted VF can programmed */ 87 u8 trusted:1; member 126 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 192 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() 191 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) ice_set_vf_trust() argument
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | public_key.h | 69 struct key *trusted); 74 struct key *trusted);
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ice/ |
H A D | ice_sriov.h | 46 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 96 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() 95 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) ice_set_vf_trust() argument
|
H A D | ice_sriov.c | 1203 ivi->trusted = vf->trusted; in ice_get_vf_cfg() 1284 * @trusted: Boolean value to enable/disable trusted VF 1286 * Enable or disable a given VF as trusted 1288 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) in ice_set_vf_trust() argument 1307 /* Check if already trusted */ in ice_set_vf_trust() 1308 if (trusted == vf->trusted) { in ice_set_vf_trust() 1315 vf->trusted in ice_set_vf_trust() [all...] |
/kernel/linux/linux-6.6/include/keys/ |
H A D | trusted_tee.h | 12 #include <keys/trusted-type.h>
|
H A D | trusted_tpm.h | 5 #include <keys/trusted-type.h> 67 print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE, in dump_sess() 72 pr_info("trusted-key: enonce:\n"); in dump_sess()
|
/kernel/linux/linux-5.10/security/keys/ |
H A D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 16 #include <keys/trusted-type.h> 21 * request_trusted_key - request the trusted key 24 * manages both trusted/encrypted key-types, like the encrypted key type 25 * data, trusted key type data is not visible decrypted from userspace.
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | if_link.h | 30 __u32 trusted; member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | if_link.h | 30 __u32 trusted; member
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | Makefile | 31 obj-$(CONFIG_TRUSTED_KEYS) += trusted-keys/
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 16 #include <keys/trusted-type.h> 21 * request_trusted_key - request the trusted key 24 * manages both trusted/encrypted key-types, like the encrypted key type 25 * data, trusted key type data is not visible decrypted from userspace.
|
/kernel/linux/linux-5.10/drivers/net/ethernet/pensando/ionic/ |
H A D | ionic.h | 29 u8 trusted; member
|
/kernel/linux/linux-6.6/drivers/net/ethernet/pensando/ionic/ |
H A D | ionic.h | 34 u8 trusted; member
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_caam.c | 7 #include <keys/trusted-type.h>
|
/kernel/linux/linux-5.10/drivers/net/netdevsim/ |
H A D | netdev.c | 156 nsim_bus_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust() 179 ivi->trusted = nsim_bus_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
|
/kernel/linux/linux-6.6/drivers/net/netdevsim/ |
H A D | netdev.c | 161 nsim_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust() 184 ivi->trusted = nsim_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_virtchnl_pf.h | 82 bool trusted; member
|
/kernel/linux/linux-5.10/include/keys/ |
H A D | trusted_tpm.h | 5 #include <keys/trusted-type.h> 76 print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE, in dump_sess() 78 pr_info("trusted-key: secret:\n"); in dump_sess() 81 pr_info("trusted-key: enonce:\n"); in dump_sess()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth.h | 39 u8 trusted:1; member
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_virtchnl_pf.h | 82 bool trusted; member
|