Searched refs:certificate (Results 1 – 23 of 23) sorted by relevance
/Linux-v5.4/certs/ |
D | Kconfig | 9 Provide the file name of a private key/certificate in PEM format, 11 the URI should identify, both the certificate and its corresponding 16 certificate as described in Documentation/admin-guide/module-signing.rst 37 system keyring. Any certificate used for module signing is implicitly 45 bool "Reserve area for inserting a certificate without recompiling" 48 If set, space for an extra certificate will be reserved in the kernel 49 image. This allows introducing a trusted certificate to the default 53 int "Number of bytes to reserve for the extra certificate" 58 certificate to be inserted.
|
/Linux-v5.4/security/integrity/evm/ |
D | Kconfig | 59 bool "Load an X509 certificate onto the '.evm' trusted keyring" 63 Load an X509 certificate onto the '.evm' trusted keyring. 65 This option enables X509 certificate loading from the kernel 70 string "EVM X509 certificate path" 74 This option defines X509 certificate path.
|
/Linux-v5.4/Documentation/crypto/ |
D | asymmetric-keys.txt | 109 PGP-specific metadata, whereas X.509 has arbitrary certificate identifiers. 377 This allows for verification of certificate chains by adding each 378 certificate in order (starting closest to the root) to a keyring. For 381 certificate chain to be validated: 388 # Create and restrict a keyring for the certificate chain 392 # Attempt to add each certificate in the chain, starting with the 393 # certificate closest to the root. 398 If the final end-entity certificate is successfully added to the "chain" 403 restricting the keyring after linking the root certificate: 405 # Create a keyring for the certificate chain and add the root [all …]
|
/Linux-v5.4/drivers/staging/greybus/ |
D | authentication.c | 103 u8 *certificate, u32 *size, u8 *result) in cap_get_ims_certificate() argument 133 memcpy(certificate, response->certificate, *size); in cap_get_ims_certificate() 230 ims_cert->certificate, in cap_ioctl()
|
D | greybus_authentication.h | 56 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE]; member
|
/Linux-v5.4/crypto/asymmetric_keys/ |
D | pkcs7.asn1 | 41 -- Certificates and certificate lists 46 certificate Certificate, -- X.509
|
D | Kconfig | 38 tristate "X.509 certificate parser" 45 public key packet found inside the certificate.
|
/Linux-v5.4/Documentation/process/ |
D | embargoed-hardware-issues.rst | 38 certificate. The list's PGP key and S/MIME certificate are available from 272 list's PGP key or with the list's S/MIME certificate. The mailing-list 274 subscriber with the subscriber's PGP key or S/MIME certificate. Details 283 the key and S/MIME certificate are conveyed to the subscribers by email 295 certificate. If a PGP key is used, it must be available from a public key 302 or the list's S/MIME certificate. The subscriber's email client can extract 303 the PGP key or the S/MIME certificate from the signature so the subscriber
|
D | changes.rst | 117 Module signing and external certificate handling use the OpenSSL program and
|
/Linux-v5.4/security/integrity/ima/ |
D | Kconfig | 290 bool "Load X509 certificate onto the '.ima' trusted keyring" 297 .system keyring. This option enables X509 certificate 301 string "IMA X509 certificate path" 305 This option defines IMA X509 certificate path.
|
/Linux-v5.4/Documentation/kbuild/ |
D | reproducible-builds.rst | 85 1. Generate a persistent signing key. Add the certificate for the key 89 signing key's certificate, set ``CONFIG_MODULE_SIG_KEY`` to an
|
/Linux-v5.4/Documentation/admin-guide/ |
D | module-signing.rst | 103 and its corresponding X.509 certificate in PEM form, or — on systems where 106 certificate and a private key. 174 in the ``CONFIG_MODULE_SIG_KEY`` option, and the certificate and key therein will
|
D | kernel-parameters.txt | 470 the system trusted keyring to be used for certificate
|
/Linux-v5.4/Documentation/usb/ |
D | authorization.rst | 91 Of course, this is lame, you'd want to do a real certificate
|
/Linux-v5.4/drivers/staging/greybus/Documentation/firmware/ |
D | firmware-management | 261 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE]; 294 'cert_size' bytes of the 'certificate' shall be read by the user and others
|
/Linux-v5.4/net/wireless/certs/ |
D | sforshee.hex | 1 /* Seth Forshee's regdb certificate */
|
/Linux-v5.4/Documentation/ |
D | Changes | 117 Module signing and external certificate handling use the OpenSSL program and
|
/Linux-v5.4/include/linux/greybus/ |
D | greybus_protocols.h | 348 __u8 certificate[0]; member
|
/Linux-v5.4/Documentation/security/keys/ |
D | core.rst | 913 One application of restricted keyrings is to verify X.509 certificate 914 chains or individual certificate signatures using the asymmetric key type.
|
/Linux-v5.4/Documentation/filesystems/ |
D | fsverity.rst | 160 - ``ENOKEY``: the fs-verity keyring doesn't contain the certificate
|
/Linux-v5.4/Documentation/translations/it_IT/process/ |
D | maintainer-pgp-guide.rst | 162 chiave principale attraverso firme certificate. È quindi importante
|
/Linux-v5.4/include/linux/ |
D | fs.h | 2968 id(X509_CERTIFICATE, x509-certificate) \
|
/Linux-v5.4/ |
D | MAINTAINERS | 54 of the Linux Foundation certificate of contribution and should
|