Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 155) sorted by relevance

1234567

/kernel/linux/linux-4.19/crypto/asymmetric_keys/
Dpkcs7_verify.c126 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
141 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
147 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
151 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key()
160 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
163 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
227 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
262 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
269 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
289 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
[all …]
Dx509_public_key.c1 /* Instantiate a public key crypto key from an X.509 Certificate
12 #define pr_fmt(fmt) "X.509: "fmt
24 * Set up the signature parameters in an X.509 certificate. This involves
103 * Check for self-signedness in an X.509 cert and if found, check the signature
273 MODULE_DESCRIPTION("X.509 certificate parser");
DKconfig26 tristate "X.509 certificate parser"
31 This option provides support for parsing X.509 format blobs for key
Dpkcs7.asn146 certificate Certificate, -- X.509
60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
Dx509_cert_parser.c1 /* X.509 certificate parser
12 #define pr_fmt(fmt) "X.509: "fmt
45 * Free an X.509 certificate
62 * Parse an X.509 certificate
474 * x509_decode_time - Decode an X.509 time ASN.1 object
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
Dpkcs7_verify.c154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
179 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key()
188 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
191 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
255 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
290 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
297 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
317 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
[all …]
Dx509_public_key.c2 /* Instantiate a public key crypto key from an X.509 Certificate
8 #define pr_fmt(fmt) "X.509: "fmt
20 * Set up the signature parameters in an X.509 certificate. This involves
101 * Check for self-signedness in an X.509 cert and if found, check the signature
271 MODULE_DESCRIPTION("X.509 certificate parser");
DKconfig38 tristate "X.509 certificate parser"
43 This option provides support for parsing X.509 format blobs for key
Dpkcs7.asn146 certificate Certificate, -- X.509
60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
/kernel/linux/linux-5.10/certs/
DKconfig32 string "Additional X.509 keys for default system keyring"
36 containing trusted X.509 certificates to be included in the default
96 string "X.509 certificates to be preloaded into the system blacklist keyring"
100 containing X.509 certificates to be included in the default blacklist
Dcommon.c42 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in load_certificate_list()
45 pr_notice("Loaded X.509 cert '%s'\n", in load_certificate_list()
55 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in load_certificate_list()
/kernel/linux/linux-4.19/certs/
Dsystem_keyring.c136 * Load the compiled-in list of X.509 certificates.
144 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list()
173 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in load_system_certificate_list()
176 pr_notice("Loaded X.509 cert '%s'\n", in load_system_certificate_list()
186 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in load_system_certificate_list()
DKconfig32 string "Additional X.509 keys for default system keyring"
36 containing trusted X.509 certificates to be included in the default
DMakefile56 @$(kecho) "### Now generating an X.509 key pair to be used for signing modules."
73 @$(kecho) Generating X.509 key generation config
/kernel/linux/linux-5.10/include/keys/
Dasymmetric-type.h31 * key derived from an X.509 certificate:
34 * map a PKCS#7 signature to an X.509 certificate.
37 * match X.509 certificates, but have fallen into disuse in favour of (3).
/kernel/linux/linux-4.19/include/keys/
Dasymmetric-type.h35 * key derived from an X.509 certificate:
38 * map a PKCS#7 signature to an X.509 certificate.
41 * match X.509 certificates, but have fallen into disuse in favour of (3).
/kernel/linux/linux-5.10/security/integrity/
Ddigsig.c160 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key()
162 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key()
188 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509()
201 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
/kernel/linux/linux-4.19/drivers/thermal/qcom/
Dtsens-8974.c217 p1[1] = 509; in calibrate_8974()
219 p1[3] = 509; in calibrate_8974()
221 p1[5] = 509; in calibrate_8974()
225 p1[9] = 509; in calibrate_8974()
/kernel/linux/linux-5.10/scripts/
Dsign-file.c36 * the options we have on specifying the X.509 certificate we want.
197 /* Assume raw DER encoded X.509 */ in read_x509()
200 /* Assume PEM encoded X.509 */ in read_x509()
294 /* Read the private key and the X.509 cert the PKCS#7 message in main()
Dextract-cert.c1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM.
135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
/kernel/linux/linux-4.19/scripts/
Dsign-file.c36 * the options we have on specifying the X.509 certificate we want.
197 /* Assume raw DER encoded X.509 */ in read_x509()
200 /* Assume PEM encoded X.509 */ in read_x509()
294 /* Read the private key and the X.509 cert the PKCS#7 message in main()
Dextract-cert.c1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM.
135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
/kernel/linux/linux-4.19/security/integrity/
Ddigsig.c140 pr_err("Problem loading X.509 certificate (%d): %s\n", in integrity_load_x509()
143 pr_notice("Loaded X.509 cert '%s': %s\n", in integrity_load_x509()
/kernel/linux/linux-4.19/Documentation/admin-guide/
Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
103 and its corresponding X.509 certificate in PEM form, or — on systems where
113 (5) :menuselection:`Additional X.509 keys for default system keyring`
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
103 and its corresponding X.509 certificate in PEM form, or — on systems where
113 (5) :menuselection:`Additional X.509 keys for default system keyring`
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key

1234567