/linux-5.10/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7 169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key() 175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key() 179 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key() 188 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key() 191 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key() 255 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain() 290 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain() 297 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain() 317 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain() [all …]
|
D | x509_public_key.c | 2 /* Instantiate a public key crypto key from an X.509 Certificate 8 #define pr_fmt(fmt) "X.509: "fmt 20 * Set up the signature parameters in an X.509 certificate. This involves 101 * Check for self-signedness in an X.509 cert and if found, check the signature 271 MODULE_DESCRIPTION("X.509 certificate parser");
|
D | Kconfig | 38 tristate "X.509 certificate parser" 43 This option provides support for parsing X.509 format blobs for key
|
D | pkcs7.asn1 | 46 certificate Certificate, -- X.509 60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
|
D | x509_cert_parser.c | 2 /* X.509 certificate parser 8 #define pr_fmt(fmt) "X.509: "fmt 44 * Free an X.509 certificate 61 * Parse an X.509 certificate 533 * x509_decode_time - Decode an X.509 time ASN.1 object
|
D | x509_akid.asn1 | 1 -- X.509 AuthorityKeyIdentifier
|
D | pkcs7_parser.c | 389 /* We have to correct for the header so that the X.509 parser can start in pkcs7_extract_cert() 390 * from the beginning. Note that since X.509 stipulates DER, there in pkcs7_extract_cert() 498 * with the signer's X.509 cert? in pkcs7_sig_note_authenticated_attr() 525 * are also used as extendedKeyUsage types in X.509 certs. in pkcs7_sig_note_authenticated_attr()
|
D | x509_parser.h | 2 /* X.509 certificate parser internal definitions
|
D | Makefile | 17 # X.509 Certificate handling
|
/linux-5.10/include/keys/ |
D | asymmetric-type.h | 31 * key derived from an X.509 certificate: 34 * map a PKCS#7 signature to an X.509 certificate. 37 * match X.509 certificates, but have fallen into disuse in favour of (3).
|
/linux-5.10/security/integrity/ |
D | digsig.c | 160 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key() 162 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key() 188 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509() 201 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
|
/linux-5.10/certs/ |
D | system_keyring.c | 135 * Load the compiled-in list of X.509 certificates. 143 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list() 172 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in load_system_certificate_list() 175 pr_notice("Loaded X.509 cert '%s'\n", in load_system_certificate_list() 185 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in load_system_certificate_list()
|
D | Kconfig | 32 string "Additional X.509 keys for default system keyring" 36 containing trusted X.509 certificates to be included in the default
|
D | Makefile | 56 @$(kecho) "### Now generating an X.509 key pair to be used for signing modules." 73 @$(kecho) Generating X.509 key generation config
|
/linux-5.10/scripts/ |
D | sign-file.c | 36 * the options we have on specifying the X.509 certificate we want. 197 /* Assume raw DER encoded X.509 */ in read_x509() 200 /* Assume PEM encoded X.509 */ in read_x509() 294 /* Read the private key and the X.509 cert the PKCS#7 message in main()
|
D | extract-cert.c | 1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM. 135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
|
/linux-5.10/Documentation/admin-guide/ |
D | module-signing.rst | 29 This facility uses X.509 ITU-T standard certificates to encode the public keys 103 and its corresponding X.509 certificate in PEM form, or — on systems where 113 (5) :menuselection:`Additional X.509 keys for default system keyring` 207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
|
/linux-5.10/include/linux/ |
D | module_signature.h | 19 PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
|
/linux-5.10/drivers/thermal/qcom/ |
D | tsens-v0_1.c | 435 p1[1] = 509; in calibrate_8974() 437 p1[3] = 509; in calibrate_8974() 439 p1[5] = 509; in calibrate_8974() 443 p1[9] = 509; in calibrate_8974()
|
/linux-5.10/fs/verity/ |
D | Kconfig | 45 Support verifying signatures of verity files against the X.509
|
/linux-5.10/drivers/gpu/drm/i915/gem/selftests/ |
D | i915_gem_object.c | 36 const unsigned int nreal = 509; /* just to be awkward */ in igt_gem_huge()
|
/linux-5.10/Documentation/devicetree/bindings/thermal/ |
D | thermal-sensor.yaml | 69 <GIC_SPI 509 IRQ_TYPE_LEVEL_HIGH>;
|
/linux-5.10/security/integrity/platform_certs/ |
D | load_powerpc.c | 48 * keyring and the blacklisted X.509 cert SHA256 hashes into the blacklist
|
/linux-5.10/Documentation/driver-api/ |
D | vfio-mediated-device.rst | 352 # echo "83b8f4f2-509f-382f-3c1e-e6bfe0fa1001" > \ 358 sysfsdev=/sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001 406 # echo 1 > /sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001/remove
|
/linux-5.10/drivers/misc/habanalabs/include/goya/ |
D | goya_async_events.h | 193 GOYA_ASYNC_EVENT_ID_FIX_THERMAL_ENV_S = 509,
|