Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 82) sorted by relevance

1234

/linux-5.10/crypto/asymmetric_keys/
Dpkcs7_verify.c154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
179 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key()
188 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
191 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
255 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
290 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
297 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
317 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
[all …]
Dx509_public_key.c2 /* Instantiate a public key crypto key from an X.509 Certificate
8 #define pr_fmt(fmt) "X.509: "fmt
20 * Set up the signature parameters in an X.509 certificate. This involves
101 * Check for self-signedness in an X.509 cert and if found, check the signature
271 MODULE_DESCRIPTION("X.509 certificate parser");
DKconfig38 tristate "X.509 certificate parser"
43 This option provides support for parsing X.509 format blobs for key
Dpkcs7.asn146 certificate Certificate, -- X.509
60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
Dx509_cert_parser.c2 /* X.509 certificate parser
8 #define pr_fmt(fmt) "X.509: "fmt
44 * Free an X.509 certificate
61 * Parse an X.509 certificate
533 * x509_decode_time - Decode an X.509 time ASN.1 object
Dx509_akid.asn11 -- X.509 AuthorityKeyIdentifier
Dpkcs7_parser.c389 /* We have to correct for the header so that the X.509 parser can start in pkcs7_extract_cert()
390 * from the beginning. Note that since X.509 stipulates DER, there in pkcs7_extract_cert()
498 * with the signer's X.509 cert? in pkcs7_sig_note_authenticated_attr()
525 * are also used as extendedKeyUsage types in X.509 certs. in pkcs7_sig_note_authenticated_attr()
Dx509_parser.h2 /* X.509 certificate parser internal definitions
DMakefile17 # X.509 Certificate handling
/linux-5.10/include/keys/
Dasymmetric-type.h31 * key derived from an X.509 certificate:
34 * map a PKCS#7 signature to an X.509 certificate.
37 * match X.509 certificates, but have fallen into disuse in favour of (3).
/linux-5.10/security/integrity/
Ddigsig.c160 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key()
162 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key()
188 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509()
201 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
/linux-5.10/certs/
Dsystem_keyring.c135 * Load the compiled-in list of X.509 certificates.
143 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list()
172 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in load_system_certificate_list()
175 pr_notice("Loaded X.509 cert '%s'\n", in load_system_certificate_list()
185 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in load_system_certificate_list()
DKconfig32 string "Additional X.509 keys for default system keyring"
36 containing trusted X.509 certificates to be included in the default
DMakefile56 @$(kecho) "### Now generating an X.509 key pair to be used for signing modules."
73 @$(kecho) Generating X.509 key generation config
/linux-5.10/scripts/
Dsign-file.c36 * the options we have on specifying the X.509 certificate we want.
197 /* Assume raw DER encoded X.509 */ in read_x509()
200 /* Assume PEM encoded X.509 */ in read_x509()
294 /* Read the private key and the X.509 cert the PKCS#7 message in main()
Dextract-cert.c1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM.
135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
/linux-5.10/Documentation/admin-guide/
Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
103 and its corresponding X.509 certificate in PEM form, or — on systems where
113 (5) :menuselection:`Additional X.509 keys for default system keyring`
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
/linux-5.10/include/linux/
Dmodule_signature.h19 PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
/linux-5.10/drivers/thermal/qcom/
Dtsens-v0_1.c435 p1[1] = 509; in calibrate_8974()
437 p1[3] = 509; in calibrate_8974()
439 p1[5] = 509; in calibrate_8974()
443 p1[9] = 509; in calibrate_8974()
/linux-5.10/fs/verity/
DKconfig45 Support verifying signatures of verity files against the X.509
/linux-5.10/drivers/gpu/drm/i915/gem/selftests/
Di915_gem_object.c36 const unsigned int nreal = 509; /* just to be awkward */ in igt_gem_huge()
/linux-5.10/Documentation/devicetree/bindings/thermal/
Dthermal-sensor.yaml69 <GIC_SPI 509 IRQ_TYPE_LEVEL_HIGH>;
/linux-5.10/security/integrity/platform_certs/
Dload_powerpc.c48 * keyring and the blacklisted X.509 cert SHA256 hashes into the blacklist
/linux-5.10/Documentation/driver-api/
Dvfio-mediated-device.rst352 # echo "83b8f4f2-509f-382f-3c1e-e6bfe0fa1001" > \
358 sysfsdev=/sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001
406 # echo 1 > /sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001/remove
/linux-5.10/drivers/misc/habanalabs/include/goya/
Dgoya_async_events.h193 GOYA_ASYNC_EVENT_ID_FIX_THERMAL_ENV_S = 509,

1234