Security Documentation¶
- Credentials in Linux
- Confidential Computing in Linux for x86 virtualization
- IMA Template Management Mechanism
- Kernel Keys
- Linux Security Modules: General Security Hooks for Linux
- Linux Security Module Development
- Linux Secure Attention Key (SAK) handling
- SCTP
- Kernel Self-Protection
- SipHash - a short input PRF
- HalfSipHash - SipHash’s insecure younger cousin
- Trusted Platform Module documentation
- Digital Signature Verification API
- Landlock LSM: kernel documentation
- Secrets documentation
- Integrity Policy Enforcement (IPE) - Kernel Documentation