Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 88) sorted by relevance

1234

/linux/crypto/asymmetric_keys/
H A Dx509_loader.c42 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in x509_load_certificate_list()
45 pr_notice("Loaded X.509 cert '%s'\n", in x509_load_certificate_list()
55 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in x509_load_certificate_list()
H A DKconfig27 tristate "X.509 certificate parser"
32 This option provides support for parsing X.509 format blobs for key
80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
H A Dx509_public_key.c2 /* Instantiate a public key crypto key from an X.509 Certificate
8 #define pr_fmt(fmt) "X.509: "fmt
21 * Set up the signature parameters in an X.509 certificate. This involves
90 * Check for self-signedness in an X.509 cert and if found, check the signature
252 MODULE_DESCRIPTION("X.509 certificate parser");
H A Dpkcs7.asn153 certificate Certificate, -- X.509
67 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
H A Dpkcs7_parser.c417 /* We have to correct for the header so that the X.509 parser can start in pkcs7_extract_cert()
418 * from the beginning. Note that since X.509 stipulates DER, there in pkcs7_extract_cert()
526 * with the signer's X.509 cert? in pkcs7_sig_note_authenticated_attr()
553 * are also used as extendedKeyUsage types in X.509 certs. in pkcs7_sig_note_authenticated_attr()
H A Dx509_akid.asn16 -- X.509 AuthorityKeyIdentifier
H A Dselftest.c70 MODULE_DESCRIPTION("X.509 self tests");
H A Dx509_parser.h2 /* X.509 certificate parser internal definitions
/linux/Documentation/sound/soc/
H A Ddapm-graph.svg63 …C282.19,-435.06 288.26,-449.42 291,-463 295.05,-483.04 296.67,-489.36 291,-509 288.25,-518.54 283.…
69 <polygon fill="#f2f2f2" stroke="#4d4d4d" points="192,-509 118,-509 118,-471 192,-471 192,-509"/>
89 <polygon fill="#f2f2f2" stroke="#4d4d4d" points="876,-509 736,-509 736,-471 876,-471 876,-509"/>
109 …lygon fill="#f2f2f2" stroke="#4d4d4d" points="717.5,-509 568.5,-509 568.5,-471 717.5,-471 717.5,-5…
248 …lygon fill="#f2f2f2" stroke="#4d4d4d" points="399.5,-509 338.5,-509 338.5,-471 399.5,-471 399.5,-5…
275 …lygon fill="#f2f2f2" stroke="#4d4d4d" points="550.5,-509 417.5,-509 417.5,-471 550.5,-471 550.5,-5…
351 …lygon fill="#f2f2f2" stroke="#4d4d4d" points="281.5,-509 210.5,-509 210.5,-471 281.5,-471 281.5,-5…
/linux/certs/
H A DKconfig59 string "Additional X.509 keys for default system keyring"
63 containing trusted X.509 certificates to be included in the default
140 string "X.509 certificates to be preloaded into the system blacklist keyring"
144 containing X.509 certificates to be included in the default blacklist
H A Dsystem_keyring.c177 pr_err("Problem loading X.509 certificate from %s to secondary keyring %ld\n", in add_to_secondary_keyring()
182 pr_notice("Loaded X.509 cert '%s'\n", key_ref_to_ptr(key)->description); in add_to_secondary_keyring()
270 pr_notice("Loading compiled-in module X.509 certificates\n"); in load_module_cert()
277 * Load the compiled-in list of X.509 certificates.
284 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list()
H A Dextract-cert.c1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM.
116 ERR(!parms.cert, "Get X.509 from PKCS#11"); in load_cert_pkcs11()
H A Dblacklist.c363 * Load the compiled-in list of revocation X.509 certificates.
368 pr_notice("Loading compiled-in revocation X.509 certificates\n"); in load_revocation_certificate_list()
/linux/include/keys/
H A Dasymmetric-type.h31 * key derived from an X.509 certificate:
34 * map a PKCS#7 signature to an X.509 certificate.
37 * match X.509 certificates, but have fallen into disuse in favour of (3).
/linux/security/integrity/
H A Ddigsig.c183 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key()
185 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key()
211 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509()
224 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
/linux/arch/arm64/boot/dts/qcom/
H A Dsdm636.dtsi14 * 509 instead of 512 and lack of
22 /* Adreno 509 shares the frequency table with 512 */
/linux/samples/vfio-mdev/
H A DREADME.rst45 # echo "83b8f4f2-509f-382f-3c1e-e6bfe0fa1001" > \
51 sysfsdev=/sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001
99 # echo 1 > /sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001/remove
/linux/Documentation/admin-guide/
H A Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
104 and its corresponding X.509 certificate in PEM form, or — on systems where
114 (5) :menuselection:`Additional X.509 keys for default system keyring`
212 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
/linux/scripts/
H A Dsign-file.c46 * the options we have on specifying the X.509 certificate we want.
208 /* Assume raw DER encoded X.509 */ in read_x509()
211 /* Assume PEM encoded X.509 */ in read_x509()
305 /* Read the private key and the X.509 cert the PKCS#7 message in main()
/linux/tools/testing/selftests/net/netfilter/
H A Dnft_audit.sh180 'table=t2 family=2 entries=509 op=nft_reset_rule'
184 table=t2 family=2 entries=509 op=nft_reset_rule'
245 'table=t2 family=2 entries=509 op=nft_unregister_rule'
/linux/Documentation/networking/
H A Dtls-handshake.rst84 Authentication material such as x.509 certificates, private certificate
91 To request an x.509-authenticated TLS session, the consumer fills in
93 keys containing an x.509 certificate and the private key for that
/linux/drivers/iio/test/
H A Diio-test-rescale.c128 .name = "small IIO_VAL_FRACTIONAL, 261/509 scaled by 90/1373754273",
130 .denominator = 509,
137 .name = "small IIO_VAL_FRACTIONAL, 90/1373754273 scaled by 261/509",
142 .schan_val2 = 509,
/linux/include/linux/
H A Dmodule_signature.h19 PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
/linux/Documentation/filesystems/
H A Dfsverity.rst467 root user can add trusted X.509 certificates to this keyring using
540 keys are in X.509 format. These formats are commonly used,
548 fs-verity users who do not need advanced features of X.509 and
552 fs-verity users who choose to use X.509 and PKCS#7 anyway should
557 it can even be necessary, since advanced X.509 and PKCS#7 features
559 kernel does not check X.509 certificate validity times.
563 here. IMA appraisal does use X.509.
/linux/drivers/gpu/drm/i915/gem/selftests/
H A Di915_gem_object.c36 const unsigned long nreal = 509; /* just to be awkward */ in igt_gem_huge()

1234