| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | restrict.c | 121 struct key *trusted, bool check_dest) in key_or_keyring_common() argument 134 if (!trusted && !check_dest) in key_or_keyring_common() 146 if (trusted) { in key_or_keyring_common() 147 if (trusted->type == &key_type_keyring) { in key_or_keyring_common() 149 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common() 153 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common() 156 signer_ids = asymmetric_key_ids(trusted); in key_or_keyring_common() 180 key = __key_get(trusted); in key_or_keyring_common() 186 key = __key_get(trusted); in key_or_keyring_common() 233 struct key *trusted) in restrict_link_by_key_or_keyring() argument [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/ |
| H A D | CVE-2022-40617.patch | 34 - int pathlen, bool trusted, auth_cfg_t *auth) 43 - pathlen, trusted, auth); 52 - int pathlen, bool trusted, auth_cfg_t *auth) 59 - !check_lifetime(this, issuer, "issuer", pathlen + 1, trusted, auth)) 68 - online, pathlen, trusted, auth)) 83 DBG1(DBG_CFG, " using trusted ca certificate \"%Y\"", 85 - trusted = TRUE; 86 + trusted = is_anchor = TRUE; 94 + if (trusted) 97 + "trusted certificate \"%Y\"", [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 24 By default, trusted keys are sealed under the SRK, which has the default 49 keyctl add trusted name "new keylen [options]" ring 50 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring 84 'master' key can either be a trusted-key or user-key type. The main 85 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 104 key-type:= 'trusted' | 'user' 107 Examples of trusted and encrypted key usage: 109 Create and save a trusted key named "kmk" of length 32 bytes. 117 $ keyctl add trusted kmk "new 32" @u 124 440502848 --alswrv 500 500 \_ trusted: kmk [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/arm/firmware/ |
| H A D | tlm,trusted-foundations.txt | 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations";
|
| /OK3568_Linux_fs/u-boot/fit/ |
| H A D | u-boot.its | 33 os = "arm-trusted-firmware"; 45 os = "arm-trusted-firmware"; 57 os = "arm-trusted-firmware"; 69 os = "arm-trusted-firmware"; 81 os = "arm-trusted-firmware"; 93 os = "arm-trusted-firmware";
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/ |
| H A D | regression_8100.c | 181 static bool check(ADBG_Case_t *c, STACK_OF(X509) *trusted, in check() argument 209 X509_STORE_CTX_trusted_stack(csc, trusted); in check() 231 STACK_OF(X509) *trusted = NULL; in verify_cert() 235 trusted = sk_X509_new_null(); in verify_cert() 236 if (!ADBG_EXPECT_NOT_NULL(c, trusted)) in verify_cert() 246 if (!ADBG_EXPECT_TRUE(c, push_cert(c, ca, trusted))) in verify_cert() 249 ret = ADBG_EXPECT_TRUE(c, check(c, trusted, untrusted, crt)); in verify_cert() 255 sk_X509_pop_free(trusted, X509_free); in verify_cert()
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.armada-secureboot | 1 The trusted boot framework on Marvell Armada 38x 6 1. Overview of the trusted boot 15 1. Overview of the trusted boot 18 The Armada's trusted boot framework enables the SoC to cryptographically verify 48 image, which employs this trusted boot framework, the following tasks need to 61 The documentation of the trusted boot mode is contained in part 1, chapter 88 trusted boot (also known as "security header") 92 Trusted debug mode - A special mode for the trusted boot that allows 93 debugging of devices employing the trusted boot 124 For the trusted boot framework, a additional header is added to the boot image. [all …]
|
| /OK3568_Linux_fs/kernel/security/keys/trusted-keys/ |
| H A D | Makefile | 6 obj-$(CONFIG_TRUSTED_KEYS) += trusted.o 7 trusted-y += trusted_tpm1.o 8 trusted-y += trusted_tpm2.o
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Kconfig | 19 bool "Provide system-wide ring of trusted keys" 23 Provide a system keyring to which trusted keys can be added. Keys in 24 the keyring are considered to be trusted. Keys may be added at will 36 containing trusted X.509 certificates to be included in the default 38 also trusted. 49 image. This allows introducing a trusted certificate to the default 66 into the kernel or already in the secondary trusted keyring.
|
| /OK3568_Linux_fs/buildroot/boot/optee-os/ |
| H A D | Config.in | 7 also provides generic trusted application one can embedded 69 kit for building OP-TEE trusted application images. It is 77 This option installs the service trusted applications and 78 trusted shared libraries built from OP-TEE OS source tree. 80 as other trusted applications. At runtime OP-TEE OS can
|
| /OK3568_Linux_fs/buildroot/package/optee-examples/ |
| H A D | Config.in | 12 secure trusted applications. OP-TEE examples is a 16 directory /lib/optee_armtz as other trusted applications. 17 At runtime OP-TEE OS can load trusted applications from this
|
| /OK3568_Linux_fs/buildroot/package/optee-test/ |
| H A D | Config.in | 18 OP-TEE trusted applications. 21 directory /lib/optee_armtz as other trusted applications. 22 At runtime OP-TEE OS can load trusted applications from this
|
| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | Kconfig | 203 be signed and verified by a public key on the trusted IMA 216 and verified by a public key on the trusted IMA keyring. 228 and verified by a key on the trusted IMA keyring. 259 keyring be signed by a key on the system trusted keyring. 273 secondary trusted keyrings. 278 built-in or secondary trusted keyrings. 292 bool "Load X509 certificate onto the '.ima' trusted keyring" 297 loaded on the .ima trusted keyring. These public keys are 298 X509 certificates signed by a trusted key on the 300 loading from the kernel onto the '.ima' trusted keyring. [all …]
|
| /OK3568_Linux_fs/u-boot/board/rockchip/evb_rk3328/ |
| H A D | README | 31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 38 > cd arm-trusted-firmware 57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | evm | 12 trusted/encrypted key stored in the Kernel Key 82 as part of the trusted boot. For more information on 83 creating and loading existing trusted/encrypted keys, 85 Documentation/security/keys/trusted-encrypted.rst. Both
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | public_key.h | 68 struct key *trusted); 73 struct key *trusted);
|
| /OK3568_Linux_fs/buildroot/boot/edk2/ |
| H A D | edk2.mk | 86 EDK2_DEPENDENCIES += host-dtc arm-trusted-firmware 105 EDK2_DEPENDENCIES += host-dtc arm-trusted-firmware 114 EDK2_DEPENDENCIES += arm-trusted-firmware
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | Kconfig | 59 bool "Load an X509 certificate onto the '.evm' trusted keyring" 63 Load an X509 certificate onto the '.evm' trusted keyring. 66 onto the '.evm' trusted keyring. A public key can be used to
|
| /OK3568_Linux_fs/buildroot/package/libkrb5/ |
| H A D | Config.in | 11 on a network. Kerberos is a trusted third-party service. 13 that is trusted by all the entities on the network (users
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/intel/ice/ |
| H A D | ice_virtchnl_pf.h | 87 u8 trusted:1; member 126 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 192 int __always_unused vf_id, bool __always_unused trusted) in ice_set_vf_trust() argument
|
| /OK3568_Linux_fs/external/rknn-toolkit2/docker/docker_file/ubuntu_18_04_cp36/ |
| H A D | Dockerfile_ubuntu_18_04_for_cp36 | 19 RUN python -m pip install --upgrade pip -i https://mirror.baidu.com/pypi/simple --trusted-host=mirr… 21 RUN pip3 config set install.trusted-host mirror.baidu.com
|
| /OK3568_Linux_fs/kernel/security/integrity/ |
| H A D | Kconfig | 52 .evm keyrings be signed by a key on the system trusted 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which
|
| /OK3568_Linux_fs/u-boot/board/rockchip/evb_rk3399/ |
| H A D | README | 34 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 41 > cd arm-trusted-firmware 88 > cp arm-trusted-firmware/build/rk3399/release/bl31.elf rkbin/rk33
|
| /OK3568_Linux_fs/u-boot/cmd/mvebu/ |
| H A D | bubt.c | 63 u32 trusted; member 543 u32 trusted = hdr->trusted; in check_image_header() local 546 if (trusted == 1) { in check_image_header()
|
| /OK3568_Linux_fs/kernel/drivers/net/netdevsim/ |
| H A D | netdev.c | 156 nsim_bus_dev->vfconfigs[vf].trusted = val; in nsim_set_vf_trust() 179 ivi->trusted = nsim_bus_dev->vfconfigs[vf].trusted; in nsim_get_vf_config()
|