Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 105) sorted by relevance

12345

/Linux-v6.1/crypto/asymmetric_keys/
Dpkcs7_verify.c153 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
168 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
174 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
181 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
184 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
245 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
280 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
287 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
307 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
338 pr_devel("Using X.509[%u] for sig %u\n", in pkcs7_verify_one()
[all …]
Dx509_loader.c42 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in x509_load_certificate_list()
45 pr_notice("Loaded X.509 cert '%s'\n", in x509_load_certificate_list()
55 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in x509_load_certificate_list()
DKconfig26 tristate "X.509 certificate parser"
31 This option provides support for parsing X.509 format blobs for key
79 bool "Run FIPS selftests on the X.509+PKCS7 signature verification"
Dx509_public_key.c2 /* Instantiate a public key crypto key from an X.509 Certificate
8 #define pr_fmt(fmt) "X.509: "fmt
20 * Set up the signature parameters in an X.509 certificate. This involves
90 * Check for self-signedness in an X.509 cert and if found, check the signature
266 MODULE_DESCRIPTION("X.509 certificate parser");
Dpkcs7.asn146 certificate Certificate, -- X.509
60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
Dx509_cert_parser.c2 /* X.509 certificate parser
8 #define pr_fmt(fmt) "X.509: "fmt
42 * Free an X.509 certificate
59 * Parse an X.509 certificate
294 * In X.509 certificates, the signature's algorithm is stored in two in x509_note_signature()
593 * x509_decode_time - Decode an X.509 time ASN.1 object
Dx509_akid.asn11 -- X.509 AuthorityKeyIdentifier
Dpkcs7_parser.c415 /* We have to correct for the header so that the X.509 parser can start in pkcs7_extract_cert()
416 * from the beginning. Note that since X.509 stipulates DER, there in pkcs7_extract_cert()
524 * with the signer's X.509 cert? in pkcs7_sig_note_authenticated_attr()
551 * are also used as extendedKeyUsage types in X.509 certs. in pkcs7_sig_note_authenticated_attr()
Dx509_parser.h2 /* X.509 certificate parser internal definitions
DMakefile16 # X.509 Certificate handling
/Linux-v6.1/certs/
DKconfig57 string "Additional X.509 keys for default system keyring"
61 containing trusted X.509 certificates to be included in the default
124 string "X.509 certificates to be preloaded into the system blacklist keyring"
128 containing X.509 certificates to be included in the default blacklist
Dextract-cert.c1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM.
142 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
Dsystem_keyring.c183 pr_notice("Loading compiled-in module X.509 certificates\n"); in load_module_cert()
190 * Load the compiled-in list of X.509 certificates.
197 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list()
/Linux-v6.1/include/keys/
Dasymmetric-type.h31 * key derived from an X.509 certificate:
34 * map a PKCS#7 signature to an X.509 certificate.
37 * match X.509 certificates, but have fallen into disuse in favour of (3).
/Linux-v6.1/security/integrity/
Ddigsig.c174 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key()
176 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key()
202 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509()
215 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
/Linux-v6.1/arch/arm64/boot/dts/qcom/
Dsdm636.dtsi14 * 509 instead of 512 and lack of
22 /* Adreno 509 shares the frequency table with 512 */
/Linux-v6.1/Documentation/admin-guide/
Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
103 and its corresponding X.509 certificate in PEM form, or — on systems where
113 (5) :menuselection:`Additional X.509 keys for default system keyring`
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
/Linux-v6.1/scripts/
Dsign-file.c43 * the options we have on specifying the X.509 certificate we want.
204 /* Assume raw DER encoded X.509 */ in read_x509()
207 /* Assume PEM encoded X.509 */ in read_x509()
301 /* Read the private key and the X.509 cert the PKCS#7 message in main()
/Linux-v6.1/drivers/iio/test/
Diio-test-rescale.c128 .name = "small IIO_VAL_FRACTIONAL, 261/509 scaled by 90/1373754273",
130 .denominator = 509,
137 .name = "small IIO_VAL_FRACTIONAL, 90/1373754273 scaled by 261/509",
142 .schan_val2 = 509,
/Linux-v6.1/include/linux/
Dmodule_signature.h19 PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
/Linux-v6.1/drivers/thermal/qcom/
Dtsens-v0_1.c468 p1[1] = 509; in calibrate_8974()
470 p1[3] = 509; in calibrate_8974()
472 p1[5] = 509; in calibrate_8974()
476 p1[9] = 509; in calibrate_8974()
/Linux-v6.1/fs/verity/
DKconfig50 Support verifying signatures of verity files against the X.509
/Linux-v6.1/drivers/gpu/drm/i915/gem/selftests/
Di915_gem_object.c36 const unsigned int nreal = 509; /* just to be awkward */ in igt_gem_huge()
/Linux-v6.1/Documentation/driver-api/
Dvfio-mediated-device.rst317 # echo "83b8f4f2-509f-382f-3c1e-e6bfe0fa1001" > \
323 sysfsdev=/sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001
371 # echo 1 > /sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001/remove
/Linux-v6.1/Documentation/devicetree/bindings/thermal/
Dthermal-sensor.yaml72 <GIC_SPI 509 IRQ_TYPE_LEVEL_HIGH>;

12345