Searched full:asymmetric (Results 1 – 25 of 207) sorted by relevance
123456789
/linux-6.12.1/Documentation/crypto/ |
D | asymmetric-keys.rst | 4 Asymmetric / Public-key Cryptography Key Type 11 - Accessing asymmetric keys. 13 - Asymmetric key subtypes. 21 The "asymmetric" key type is designed to be a container for the keys used in 25 The asymmetric key is given a subtype that defines what sort of data is 33 operations using that key. In such a case, the asymmetric key would then 56 The asymmetric key type's match function can then perform a wider range of 64 keyctl search @s asymmetric id:5acc2142 75 keyctl search @s asymmetric tpm:5acc2142 80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 [] [all …]
|
D | api-akcipher.rst | 1 Asymmetric Cipher Algorithm Definitions 7 Asymmetric Cipher API 16 Asymmetric Cipher Request Handle
|
/linux-6.12.1/Documentation/arch/arm64/ |
D | asymmetric-32bit.rst | 2 Asymmetric 32-bit SoCs 7 This document describes the impact of asymmetric 32-bit SoCs on the 38 allowing 32-bit tasks to run on an asymmetric 32-bit system requires an 42 For the remainder of this document we will refer to an *asymmetric 43 system* to mean an asymmetric 32-bit SoC running Linux with this kernel 49 32-bit tasks running on an asymmetric system behave in mostly the same 69 ``execve(2)``. This is not always possible on an asymmetric system, 106 (e.g. by calling ``sched_setattr(2)``) is rejected on an asymmetric 119 32-bit tasks on an asymmetric system. Failure to do so is likely to 125 The affinity of a 32-bit task on an asymmetric system may include CPUs [all …]
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | asymmetric_type.c | 2 /* Asymmetric public-key cryptography key type 4 * See Documentation/crypto/asymmetric-keys.rst 9 #include <keys/asymmetric-subtype.h> 10 #include <keys/asymmetric-parser.h> 140 * asymmetric_key_generate_id: Construct an asymmetric key ID 146 * Construct an asymmetric key ID from a pair of binary blobs. 167 * asymmetric_key_id_same - Return true if two asymmetric keys IDs are the same. 183 * asymmetric_key_id_partial - Return true if two asymmetric keys IDs 201 * asymmetric_match_key_ids - Search asymmetric key IDs 1 & 2 260 * Match asymmetric keys by an exact match on one of the first two IDs. [all …]
|
D | signature.c | 2 /* Signature verification with an asymmetric key 4 * See Documentation/crypto/asymmetric-keys.rst 11 #include <keys/asymmetric-subtype.h> 38 * query_asymmetric_key - Get information about an asymmetric key. 68 * encrypt_blob - Encrypt data using an asymmetric key 89 * decrypt_blob - Decrypt data using an asymmetric key 110 * create_signature - Sign some data using an asymmetric key 131 * verify_signature - Initiate the use of an asymmetric key to verify a signature 132 * @key: The asymmetric key to verify against
|
D | Kconfig | 3 bool "Asymmetric (public-key cryptographic) key type" 7 the asymmetric keys used for public key cryptographic operations such 14 tristate "Asymmetric public-key crypto algorithm subtype" 21 This option provides support for asymmetric public key type handling.
|
D | asymmetric_keys.h | 2 /* Internal definitions for asymmetric key type 8 #include <keys/asymmetric-type.h>
|
D | x509_loader.c | 5 #include <keys/asymmetric-type.h> 32 "asymmetric", in x509_load_certificate_list()
|
D | public_key.c | 2 /* In-software asymmetric public-key crypto subtype 4 * See Documentation/crypto/asymmetric-keys.rst 14 #include <keys/asymmetric-subtype.h> 23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype"); 469 * Public key algorithm asymmetric key subtype
|
/linux-6.12.1/include/keys/ |
D | asymmetric-subtype.h | 2 /* Asymmetric public-key cryptography key subtype 4 * See Documentation/crypto/asymmetric-keys.rst 14 #include <keys/asymmetric-type.h> 48 * asymmetric_key_subtype - Get the subtype from an asymmetric key 51 * Retrieves and returns the subtype pointer of the asymmetric key from the
|
D | asymmetric-type.h | 2 /* Asymmetric Public-key cryptography key type interface 4 * See Documentation/crypto/asymmetric-keys.rst 19 * The key payload is four words. The asymmetric-type key uses them as 30 * Identifiers for an asymmetric key ID. We have three ways of looking up a
|
D | asymmetric-parser.h | 2 /* Asymmetric public-key cryptography data parser 4 * See Documentation/crypto/asymmetric-keys.rst
|
/linux-6.12.1/security/integrity/ima/ |
D | ima_asymmetric_keys.c | 8 * Defines an IMA hook to measure asymmetric keys on key 12 #include <keys/asymmetric-type.h> 18 * ima_post_key_create_or_update - measure asymmetric keys 35 /* Only asymmetric keys are handled by this hook. */ in ima_post_key_create_or_update()
|
/linux-6.12.1/include/crypto/ |
D | public_key.h | 2 /* Asymmetric public-key algorithm definitions 4 * See Documentation/crypto/asymmetric-keys.rst 18 * Cryptographic data for the public-key subtype of the asymmetric key type.
|
D | akcipher.h | 286 * @req: asymmetric key request 303 * @req: asymmetric key request 356 * @req: asymmetric key request 373 * @req: asymmetric key request
|
/linux-6.12.1/drivers/target/ |
D | target_core_alua.c | 5 * This file contains SPC-3 compliant asymmetric logical unit assigntment (ALUA) 188 * Set the ASYMMETRIC ACCESS State in target_emulate_report_target_port_groups() 192 * Set supported ASYMMETRIC ACCESS State bits in target_emulate_report_target_port_groups() 324 * the state is a primary or secondary target port asymmetric in target_emulate_set_target_port_groups() 332 * an invalid combination of target port asymmetric in target_emulate_set_target_port_groups() 334 * unsupported target port asymmetric access state, in target_emulate_set_target_port_groups() 344 * If the ASYMMETRIC ACCESS STATE field (see table 267) in target_emulate_set_target_port_groups() 345 * specifies a primary target port asymmetric access state, in target_emulate_set_target_port_groups() 348 * port asymmetric access state shall be changed. If the in target_emulate_set_target_port_groups() 349 * ASYMMETRIC ACCESS STATE field specifies a secondary target in target_emulate_set_target_port_groups() [all …]
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | sysfs-driver-qat | 36 * asym: the device is configured for running asymmetric crypto 38 * asym;dc: the device is configured for running asymmetric 120 * asym: the ring pair is configured for running asymmetric crypto
|
/linux-6.12.1/drivers/nvme/host/ |
D | constants.c | 166 [NVME_SC_ANA_PERSISTENT_LOSS] = "Asymmetric Access Persistent Loss", 167 [NVME_SC_ANA_INACCESSIBLE] = "Asymmetric Access Inaccessible", 168 [NVME_SC_ANA_TRANSITION] = "Asymmetric Access Transition",
|
/linux-6.12.1/Documentation/devicetree/bindings/net/ |
D | ethernet-controller.yaml | 191 Asymmetric pause configuration. 0 for no asymmetric 192 pause, 1 for asymmetric pause
|
/linux-6.12.1/Documentation/scheduler/ |
D | sched-capacity.rst | 18 asymmetric CPU capacity systems, as they contain CPUs of different capacities. 59 Consider an hypothetical dual-core asymmetric CPU capacity system where 146 asymmetric CPU capacities complexify this somewhat; the following sections will 284 whether the system exhibits asymmetric CPU capacities. Should that be the 294 cater to asymmetric CPU capacity systems. Do note however that said key is 324 asymmetric CPU capacities is to:
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | verify_sig_setup.sh | 49 key_id=$(cat ${tmp_dir}/signing_key.der | keyctl padd asymmetric ebpf_testing_key @s) 58 keyctl unlink $(keyctl search @s asymmetric ebpf_testing_key) @s
|
/linux-6.12.1/security/integrity/ |
D | Kconfig | 34 bool "Enable asymmetric keys support" 43 asymmetric keys.
|
D | digsig_asymmetric.c | 14 #include <keys/asymmetric-type.h> 20 * Request an asymmetric key.
|
/linux-6.12.1/drivers/thunderbolt/ |
D | tb.c | 30 * asymmetric and back. This is selected as 45G which means when the 31 * request is higher than this, we switch the link to asymmetric, and 686 * symmetric to asymmetric 690 * additional banwdith if the links are transitioned into asymmetric to 701 * Can include asymmetric, only if it is actually supported by in tb_maximum_bandwidth() 722 * can switch it to asymmetric as needed. Report in tb_maximum_bandwidth() 755 * can switch it to asymmetric as needed. Report in tb_maximum_bandwidth() 788 * symmetric to asymmetric 796 * added when the links are transitioned into asymmetric (but does not 806 /* Maximum possible bandwidth asymmetric Gen 4 link is 120 Gb/s */ in tb_available_bandwidth() [all …]
|
/linux-6.12.1/Documentation/driver-api/cxl/ |
D | access-coordinates.rst | 19 maximizes performance. When asymmetric topology is detected, the calculation 20 is aborted. An asymmetric topology is detected during topology walk where the
|
123456789