Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 19 of 19) sorted by relevance

/Linux-v4.19/certs/
DKconfig9 Provide the file name of a private key/certificate in PEM format,
11 the URI should identify, both the certificate and its corresponding
16 certificate as described in Documentation/admin-guide/module-signing.rst
37 system keyring. Any certificate used for module signing is implicitly
45 bool "Reserve area for inserting a certificate without recompiling"
48 If set, space for an extra certificate will be reserved in the kernel
49 image. This allows introducing a trusted certificate to the default
53 int "Number of bytes to reserve for the extra certificate"
58 certificate to be inserted.
/Linux-v4.19/security/integrity/evm/
DKconfig58 bool "Load an X509 certificate onto the '.evm' trusted keyring"
62 Load an X509 certificate onto the '.evm' trusted keyring.
64 This option enables X509 certificate loading from the kernel
69 string "EVM X509 certificate path"
73 This option defines X509 certificate path.
/Linux-v4.19/Documentation/crypto/
Dasymmetric-keys.txt109 PGP-specific metadata, whereas X.509 has arbitrary certificate identifiers.
361 This allows for verification of certificate chains by adding each
362 certificate in order (starting closest to the root) to a keyring. For
365 certificate chain to be validated:
372 # Create and restrict a keyring for the certificate chain
376 # Attempt to add each certificate in the chain, starting with the
377 # certificate closest to the root.
382 If the final end-entity certificate is successfully added to the "chain"
387 restricting the keyring after linking the root certificate:
389 # Create a keyring for the certificate chain and add the root
[all …]
/Linux-v4.19/drivers/staging/greybus/
Dauthentication.c104 u8 *certificate, u32 *size, u8 *result) in cap_get_ims_certificate() argument
134 memcpy(certificate, response->certificate, *size); in cap_get_ims_certificate()
231 ims_cert->certificate, in cap_ioctl()
Dgreybus_authentication.h102 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE]; member
Dgreybus_protocols.h392 __u8 certificate[0]; member
/Linux-v4.19/crypto/asymmetric_keys/
Dpkcs7.asn141 -- Certificates and certificate lists
46 certificate Certificate, -- X.509
DKconfig25 tristate "X.509 certificate parser"
32 public key packet found inside the certificate.
/Linux-v4.19/security/integrity/ima/
DKconfig267 bool "Load X509 certificate onto the '.ima' trusted keyring"
274 .system keyring. This option enables X509 certificate
278 string "IMA X509 certificate path"
282 This option defines IMA X509 certificate path.
/Linux-v4.19/Documentation/admin-guide/
Dmodule-signing.rst103 and its corresponding X.509 certificate in PEM form, or — on systems where
106 certificate and a private key.
174 in the ``CONFIG_MODULE_SIG_KEY`` option, and the certificate and key therein will
Dkernel-parameters.txt465 the system trusted keyring to be used for certificate
/Linux-v4.19/Documentation/usb/
Dauthorization.txt87 Of course, this is lame, you'd want to do a real certificate
/Linux-v4.19/drivers/staging/greybus/Documentation/firmware/
Dfirmware-management261 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE];
294 'cert_size' bytes of the 'certificate' shall be read by the user and others
/Linux-v4.19/net/wireless/certs/
Dsforshee.hex1 /* Seth Forshee's regdb certificate */
/Linux-v4.19/Documentation/process/
Dchanges.rst120 Module signing and external certificate handling use the OpenSSL program and
/Linux-v4.19/Documentation/
DChanges120 Module signing and external certificate handling use the OpenSSL program and
/Linux-v4.19/Documentation/security/keys/
Dcore.rst887 One application of restricted keyrings is to verify X.509 certificate
888 chains or individual certificate signatures using the asymmetric key type.
/Linux-v4.19/include/linux/
Dfs.h2847 id(X509_CERTIFICATE, x509-certificate) \
/Linux-v4.19/
DMAINTAINERS54 of the Linux Foundation certificate of contribution and should