/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 14 This is a X.509 public certificate in PEM format. PEM wiki - 17 An X.509 certificate contains a public key, validity, and an identity 20 https://en.wikipedia.org/wiki/X.509 for details. 67 Refer X.509 certificate wiki for the "Issuer" Key and value details. 77 Refer X.509 certificate wiki for the "Subject" Key and value details. 78 Refer https://en.wikipedia.org/wiki/X.509
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 153 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7 168 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key() 174 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key() 181 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key() 184 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key() 245 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain() 280 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain() 287 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain() 307 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain() 338 pr_devel("Using X.509[%u] for sig %u\n", in pkcs7_verify_one() [all …]
|
H A D | x509_loader.c | 42 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in x509_load_certificate_list() 45 pr_notice("Loaded X.509 cert '%s'\n", in x509_load_certificate_list() 55 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in x509_load_certificate_list()
|
H A D | Kconfig | 27 tristate "X.509 certificate parser" 32 This option provides support for parsing X.509 format blobs for key 80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
|
H A D | x509_public_key.c | 2 /* Instantiate a public key crypto key from an X.509 Certificate 8 #define pr_fmt(fmt) "X.509: "fmt 22 * Set up the signature parameters in an X.509 certificate. This involves 103 * Check for self-signedness in an X.509 cert and if found, check the signature 278 MODULE_DESCRIPTION("X.509 certificate parser");
|
H A D | pkcs7.asn1 | 46 certificate Certificate, -- X.509 60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
|
H A D | x509_cert_parser.c | 2 /* X.509 certificate parser 8 #define pr_fmt(fmt) "X.509: "fmt 42 * Free an X.509 certificate 59 * Parse an X.509 certificate 294 * In X.509 certificates, the signature's algorithm is stored in two in x509_note_signature() 643 * x509_decode_time - Decode an X.509 time ASN.1 object
|
/openbmc/linux/certs/ |
H A D | Kconfig | 57 string "Additional X.509 keys for default system keyring" 61 containing trusted X.509 certificates to be included in the default 124 string "X.509 certificates to be preloaded into the system blacklist keyring" 128 containing X.509 certificates to be included in the default blacklist
|
H A D | system_keyring.c | 177 pr_err("Problem loading X.509 certificate from %s to secondary keyring %ld\n", in add_to_secondary_keyring() 182 pr_notice("Loaded X.509 cert '%s'\n", key_ref_to_ptr(key)->description); in add_to_secondary_keyring() 270 pr_notice("Loading compiled-in module X.509 certificates\n"); in load_module_cert() 277 * Load the compiled-in list of X.509 certificates. 284 pr_notice("Loading compiled-in X.509 certificates\n"); in load_system_certificate_list()
|
H A D | extract-cert.c | 1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM. 145 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
|
/openbmc/linux/include/keys/ |
H A D | asymmetric-type.h | 31 * key derived from an X.509 certificate: 34 * map a PKCS#7 signature to an X.509 certificate. 37 * match X.509 certificates, but have fallen into disuse in favour of (3).
|
/openbmc/linux/arch/arm64/boot/dts/qcom/ |
H A D | sdm636.dtsi | 14 * 509 instead of 512 and lack of 22 /* Adreno 509 shares the frequency table with 512 */
|
/openbmc/linux/security/integrity/ |
H A D | digsig.c | 182 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key() 184 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key() 210 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509() 223 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
|
/openbmc/qemu/include/hw/mem/ |
H A D | memory-device.h | 147 * Traditionally, KVM/vhost in many setups supported 509 memslots, whereby 156 * If we have less than 509 memslots, we will instruct memory devices that 160 * Hotplugging vhost devices with at least 509 memslots is not expected to 165 #define MEMORY_DEVICES_SAFE_MAX_MEMSLOTS 509
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/flatpak/flatpak/ |
H A D | 0001-flatpak-pc-add-pc_sysrootdir.patch | 17 @@ -509,7 +509,7 @@ pkgconfig_variables += 'exec_prefix=${prefix}'
|
/openbmc/linux/samples/vfio-mdev/ |
H A D | README.rst | 45 # echo "83b8f4f2-509f-382f-3c1e-e6bfe0fa1001" > \ 51 sysfsdev=/sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001 99 # echo 1 > /sys/bus/mdev/devices/83b8f4f2-509f-382f-3c1e-e6bfe0fa1001/remove
|
/openbmc/openbmc/poky/meta/recipes-support/libksba/ |
H A D | libksba_1.6.7.bb | 1 SUMMARY = "Easy API to create and parse X.509 and CMS related objects" 2 DESCRIPTION = "A library to make the tasks of working with X.509 certificates, \
|
/openbmc/openbmc/poky/meta-selftest/files/ |
H A D | static-passwd | 7 avahi:x:509:509::/:/bin/nologin
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | nft_audit.sh | 157 'table=t2 family=2 entries=509 op=nft_reset_rule' 161 table=t2 family=2 entries=509 op=nft_reset_rule' 222 'table=t2 family=2 entries=509 op=nft_unregister_rule'
|
/openbmc/linux/scripts/ |
H A D | sign-file.c | 43 * the options we have on specifying the X.509 certificate we want. 204 /* Assume raw DER encoded X.509 */ in read_x509() 207 /* Assume PEM encoded X.509 */ in read_x509() 301 /* Read the private key and the X.509 cert the PKCS#7 message in main()
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 29 This facility uses X.509 ITU-T standard certificates to encode the public keys 103 and its corresponding X.509 certificate in PEM form, or — on systems where 113 (5) :menuselection:`Additional X.509 keys for default system keyring` 207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
|
/openbmc/linux/Documentation/networking/ |
H A D | tls-handshake.rst | 84 Authentication material such as x.509 certificates, private certificate 91 To request an x.509-authenticated TLS session, the consumer fills in 93 keys containing an x.509 certificate and the private key for that
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/extract-cert/ |
H A D | extract-cert_0.3.bb | 1 SUMMARY = "small helper program to extract X.509 certificates from PKCS#11 tokens"
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-sentry-sdk_1.45.0.bb | 18 SRC_URI[sha256sum] = "509aa9678c0512344ca886281766c2e538682f8acfa50fd8d405f8c417ad0625"
|
/openbmc/qemu/include/crypto/ |
H A D | x509-utils.h | 2 * X.509 certificate related helpers
|