Home
last modified time | relevance | path

Searched full:asymmetric (Results 1 – 25 of 207) sorted by relevance

123456789

/linux-6.12.1/Documentation/crypto/
Dasymmetric-keys.rst4 Asymmetric / Public-key Cryptography Key Type
11 - Accessing asymmetric keys.
13 - Asymmetric key subtypes.
21 The "asymmetric" key type is designed to be a container for the keys used in
25 The asymmetric key is given a subtype that defines what sort of data is
33 operations using that key. In such a case, the asymmetric key would then
56 The asymmetric key type's match function can then perform a wider range of
64 keyctl search @s asymmetric id:5acc2142
75 keyctl search @s asymmetric tpm:5acc2142
80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 []
[all …]
Dapi-akcipher.rst1 Asymmetric Cipher Algorithm Definitions
7 Asymmetric Cipher API
16 Asymmetric Cipher Request Handle
/linux-6.12.1/Documentation/arch/arm64/
Dasymmetric-32bit.rst2 Asymmetric 32-bit SoCs
7 This document describes the impact of asymmetric 32-bit SoCs on the
38 allowing 32-bit tasks to run on an asymmetric 32-bit system requires an
42 For the remainder of this document we will refer to an *asymmetric
43 system* to mean an asymmetric 32-bit SoC running Linux with this kernel
49 32-bit tasks running on an asymmetric system behave in mostly the same
69 ``execve(2)``. This is not always possible on an asymmetric system,
106 (e.g. by calling ``sched_setattr(2)``) is rejected on an asymmetric
119 32-bit tasks on an asymmetric system. Failure to do so is likely to
125 The affinity of a 32-bit task on an asymmetric system may include CPUs
[all …]
/linux-6.12.1/crypto/asymmetric_keys/
Dasymmetric_type.c2 /* Asymmetric public-key cryptography key type
4 * See Documentation/crypto/asymmetric-keys.rst
9 #include <keys/asymmetric-subtype.h>
10 #include <keys/asymmetric-parser.h>
140 * asymmetric_key_generate_id: Construct an asymmetric key ID
146 * Construct an asymmetric key ID from a pair of binary blobs.
167 * asymmetric_key_id_same - Return true if two asymmetric keys IDs are the same.
183 * asymmetric_key_id_partial - Return true if two asymmetric keys IDs
201 * asymmetric_match_key_ids - Search asymmetric key IDs 1 & 2
260 * Match asymmetric keys by an exact match on one of the first two IDs.
[all …]
Dsignature.c2 /* Signature verification with an asymmetric key
4 * See Documentation/crypto/asymmetric-keys.rst
11 #include <keys/asymmetric-subtype.h>
38 * query_asymmetric_key - Get information about an asymmetric key.
68 * encrypt_blob - Encrypt data using an asymmetric key
89 * decrypt_blob - Decrypt data using an asymmetric key
110 * create_signature - Sign some data using an asymmetric key
131 * verify_signature - Initiate the use of an asymmetric key to verify a signature
132 * @key: The asymmetric key to verify against
DKconfig3 bool "Asymmetric (public-key cryptographic) key type"
7 the asymmetric keys used for public key cryptographic operations such
14 tristate "Asymmetric public-key crypto algorithm subtype"
21 This option provides support for asymmetric public key type handling.
Dasymmetric_keys.h2 /* Internal definitions for asymmetric key type
8 #include <keys/asymmetric-type.h>
Dx509_loader.c5 #include <keys/asymmetric-type.h>
32 "asymmetric", in x509_load_certificate_list()
Dpublic_key.c2 /* In-software asymmetric public-key crypto subtype
4 * See Documentation/crypto/asymmetric-keys.rst
14 #include <keys/asymmetric-subtype.h>
23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype");
469 * Public key algorithm asymmetric key subtype
/linux-6.12.1/include/keys/
Dasymmetric-subtype.h2 /* Asymmetric public-key cryptography key subtype
4 * See Documentation/crypto/asymmetric-keys.rst
14 #include <keys/asymmetric-type.h>
48 * asymmetric_key_subtype - Get the subtype from an asymmetric key
51 * Retrieves and returns the subtype pointer of the asymmetric key from the
Dasymmetric-type.h2 /* Asymmetric Public-key cryptography key type interface
4 * See Documentation/crypto/asymmetric-keys.rst
19 * The key payload is four words. The asymmetric-type key uses them as
30 * Identifiers for an asymmetric key ID. We have three ways of looking up a
Dasymmetric-parser.h2 /* Asymmetric public-key cryptography data parser
4 * See Documentation/crypto/asymmetric-keys.rst
/linux-6.12.1/security/integrity/ima/
Dima_asymmetric_keys.c8 * Defines an IMA hook to measure asymmetric keys on key
12 #include <keys/asymmetric-type.h>
18 * ima_post_key_create_or_update - measure asymmetric keys
35 /* Only asymmetric keys are handled by this hook. */ in ima_post_key_create_or_update()
/linux-6.12.1/include/crypto/
Dpublic_key.h2 /* Asymmetric public-key algorithm definitions
4 * See Documentation/crypto/asymmetric-keys.rst
18 * Cryptographic data for the public-key subtype of the asymmetric key type.
Dakcipher.h286 * @req: asymmetric key request
303 * @req: asymmetric key request
356 * @req: asymmetric key request
373 * @req: asymmetric key request
/linux-6.12.1/drivers/target/
Dtarget_core_alua.c5 * This file contains SPC-3 compliant asymmetric logical unit assigntment (ALUA)
188 * Set the ASYMMETRIC ACCESS State in target_emulate_report_target_port_groups()
192 * Set supported ASYMMETRIC ACCESS State bits in target_emulate_report_target_port_groups()
324 * the state is a primary or secondary target port asymmetric in target_emulate_set_target_port_groups()
332 * an invalid combination of target port asymmetric in target_emulate_set_target_port_groups()
334 * unsupported target port asymmetric access state, in target_emulate_set_target_port_groups()
344 * If the ASYMMETRIC ACCESS STATE field (see table 267) in target_emulate_set_target_port_groups()
345 * specifies a primary target port asymmetric access state, in target_emulate_set_target_port_groups()
348 * port asymmetric access state shall be changed. If the in target_emulate_set_target_port_groups()
349 * ASYMMETRIC ACCESS STATE field specifies a secondary target in target_emulate_set_target_port_groups()
[all …]
/linux-6.12.1/Documentation/ABI/testing/
Dsysfs-driver-qat36 * asym: the device is configured for running asymmetric crypto
38 * asym;dc: the device is configured for running asymmetric
120 * asym: the ring pair is configured for running asymmetric crypto
/linux-6.12.1/drivers/nvme/host/
Dconstants.c166 [NVME_SC_ANA_PERSISTENT_LOSS] = "Asymmetric Access Persistent Loss",
167 [NVME_SC_ANA_INACCESSIBLE] = "Asymmetric Access Inaccessible",
168 [NVME_SC_ANA_TRANSITION] = "Asymmetric Access Transition",
/linux-6.12.1/Documentation/devicetree/bindings/net/
Dethernet-controller.yaml191 Asymmetric pause configuration. 0 for no asymmetric
192 pause, 1 for asymmetric pause
/linux-6.12.1/Documentation/scheduler/
Dsched-capacity.rst18 asymmetric CPU capacity systems, as they contain CPUs of different capacities.
59 Consider an hypothetical dual-core asymmetric CPU capacity system where
146 asymmetric CPU capacities complexify this somewhat; the following sections will
284 whether the system exhibits asymmetric CPU capacities. Should that be the
294 cater to asymmetric CPU capacity systems. Do note however that said key is
324 asymmetric CPU capacities is to:
/linux-6.12.1/tools/testing/selftests/bpf/
Dverify_sig_setup.sh49 key_id=$(cat ${tmp_dir}/signing_key.der | keyctl padd asymmetric ebpf_testing_key @s)
58 keyctl unlink $(keyctl search @s asymmetric ebpf_testing_key) @s
/linux-6.12.1/security/integrity/
DKconfig34 bool "Enable asymmetric keys support"
43 asymmetric keys.
Ddigsig_asymmetric.c14 #include <keys/asymmetric-type.h>
20 * Request an asymmetric key.
/linux-6.12.1/drivers/thunderbolt/
Dtb.c30 * asymmetric and back. This is selected as 45G which means when the
31 * request is higher than this, we switch the link to asymmetric, and
686 * symmetric to asymmetric
690 * additional banwdith if the links are transitioned into asymmetric to
701 * Can include asymmetric, only if it is actually supported by in tb_maximum_bandwidth()
722 * can switch it to asymmetric as needed. Report in tb_maximum_bandwidth()
755 * can switch it to asymmetric as needed. Report in tb_maximum_bandwidth()
788 * symmetric to asymmetric
796 * added when the links are transitioned into asymmetric (but does not
806 /* Maximum possible bandwidth asymmetric Gen 4 link is 120 Gb/s */ in tb_available_bandwidth()
[all …]
/linux-6.12.1/Documentation/driver-api/cxl/
Daccess-coordinates.rst19 maximizes performance. When asymmetric topology is detected, the calculation
20 is aborted. An asymmetric topology is detected during topology walk where the

123456789