Searched refs:trusted (Results 1 – 9 of 9) sorted by relevance
125 struct key *trusted, bool check_dest) in key_or_keyring_common() argument138 if (!trusted && !check_dest) in key_or_keyring_common()150 if (trusted) { in key_or_keyring_common()151 if (trusted->type == &key_type_keyring) { in key_or_keyring_common()153 key = find_asymmetric_key(trusted, sig->auth_ids[0], in key_or_keyring_common()157 } else if (trusted->type == &key_type_asymmetric) { in key_or_keyring_common()160 signer_ids = asymmetric_key_ids(trusted); in key_or_keyring_common()184 key = __key_get(trusted); in key_or_keyring_common()190 key = __key_get(trusted); in key_or_keyring_common()237 struct key *trusted) in restrict_link_by_key_or_keyring() argument[all …]
50 PKCS#7 message - provided the message is signed by a trusted key. If
61 struct key *trusted);66 struct key *trusted);
30 __u32 trusted; member
46 bool trusted; member
1015 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in simple_xattr_list() local1040 if (!trusted && xattr_is_trusted(xattr->name)) in simple_xattr_list()
186 Currently this enables support for the trusted.* and
1013 the content of the corrupted region can no longer be trusted.
8125 F: Documentation/security/keys/trusted-encrypted.rst8135 F: Documentation/security/keys/trusted-encrypted.rst8136 F: include/keys/trusted-type.h8137 F: security/keys/trusted.c8138 F: security/keys/trusted.h