| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_verify.c | 154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7 169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key() 175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key() 179 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key() 188 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key() 191 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key() 255 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain() 290 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain() 297 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain() 317 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain() [all …]
|
| H A D | x509_public_key.c | 2 /* Instantiate a public key crypto key from an X.509 Certificate 8 #define pr_fmt(fmt) "X.509: "fmt 20 * Set up the signature parameters in an X.509 certificate. This involves 101 * Check for self-signedness in an X.509 cert and if found, check the signature 271 MODULE_DESCRIPTION("X.509 certificate parser");
|
| H A D | Kconfig | 38 tristate "X.509 certificate parser" 43 This option provides support for parsing X.509 format blobs for key
|
| H A D | pkcs7.asn1 | 46 certificate Certificate, -- X.509 60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
|
| H A D | x509_cert_parser.c | 2 /* X.509 certificate parser 8 #define pr_fmt(fmt) "X.509: "fmt 44 * Free an X.509 certificate 61 * Parse an X.509 certificate 533 * x509_decode_time - Decode an X.509 time ASN.1 object
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Kconfig | 32 string "Additional X.509 keys for default system keyring" 36 containing trusted X.509 certificates to be included in the default 96 string "X.509 certificates to be preloaded into the system blacklist keyring" 100 containing X.509 certificates to be included in the default blacklist
|
| H A D | common.c | 42 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", in load_certificate_list() 45 pr_notice("Loaded X.509 cert '%s'\n", in load_certificate_list() 55 pr_err("Problem parsing in-kernel X.509 certificate list\n"); in load_certificate_list()
|
| H A D | blacklist.c | 232 * Load the compiled-in list of revocation X.509 certificates. 237 pr_notice("Loading compiled-in revocation X.509 certificates\n"); in load_revocation_certificate_list()
|
| /OK3568_Linux_fs/kernel/security/integrity/ |
| H A D | digsig.c | 160 pr_err("Problem loading X.509 certificate %d\n", rc); in integrity_add_key() 162 pr_notice("Loaded X.509 cert '%s'\n", in integrity_add_key() 188 pr_info("Loading X.509 certificate: %s\n", path); in integrity_load_x509() 201 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
|
| /OK3568_Linux_fs/kernel/include/keys/ |
| H A D | asymmetric-type.h | 31 * key derived from an X.509 certificate: 34 * map a PKCS#7 signature to an X.509 certificate. 37 * match X.509 certificates, but have fallen into disuse in favour of (3).
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | x509.h | 5 * \brief X.509 generic defines and structures 113 * X.509 v3 Subject Alternative Name types. 135 * X.509 v3 Key Usage Extension flags 163 * X.509 extension types 206 * \name Structures for parsing X.509 certificates, CRLs and CSRs 239 /** \} name Structures for parsing X.509 certificates, CRLs and CSRs */
|
| H A D | x509_crt.h | 5 * \brief X.509 certificate parsing and writing 47 * \name Structures and functions for parsing and writing X.509 certificates 52 * Container for an X.509 certificate. The certificate may be chained. 61 int version; /**< The X.509 version. (1=v1, 2=v2, 3=v3) */ 77 mbedtls_x509_buf issuer_id; /**< Optional X.509 v2/v3 issuer unique identifier. */ 78 mbedtls_x509_buf subject_id; /**< Optional X.509 v2/v3 subject unique identifier. */ 79 mbedtls_x509_buf v3_ext; /**< Optional X.509 v3 extensions. */ 232 * \brief Context for resuming X.509 verify operations
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | x509.h | 5 * \brief X.509 generic defines and structures 113 * X.509 v3 Subject Alternative Name types. 135 * X.509 v3 Key Usage Extension flags 163 * X.509 extension types 206 * \name Structures for parsing X.509 certificates, CRLs and CSRs 239 /** \} name Structures for parsing X.509 certificates, CRLs and CSRs */
|
| H A D | x509_crt.h | 5 * \brief X.509 certificate parsing and writing 47 * \name Structures and functions for parsing and writing X.509 certificates 52 * Container for an X.509 certificate. The certificate may be chained. 61 int version; /**< The X.509 version. (1=v1, 2=v2, 3=v3) */ 77 mbedtls_x509_buf issuer_id; /**< Optional X.509 v2/v3 issuer unique identifier. */ 78 mbedtls_x509_buf subject_id; /**< Optional X.509 v2/v3 subject unique identifier. */ 79 mbedtls_x509_buf v3_ext; /**< Optional X.509 v3 extensions. */ 232 * \brief Context for resuming X.509 verify operations
|
| H A D | oid.h | 49 /* This is for the benefit of X.509, but defined here in order to avoid 50 * having a "backwards" include of x.509.h here */ 52 * X.509 extension types (internal, arbitrary values for bitsets) 198 * X.509 v3 Extended key usage OIDs 464 * \brief Translate an X.509 extension OID into local values 474 * \brief Translate an X.509 attribute type OID into the short name
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | x509.h | 5 * \brief X.509 generic defines and structures 113 * X.509 v3 Subject Alternative Name types. 135 * X.509 v3 Key Usage Extension flags 163 * X.509 extension types 206 * \name Structures for parsing X.509 certificates, CRLs and CSRs 239 /** \} name Structures for parsing X.509 certificates, CRLs and CSRs */
|
| H A D | x509_crt.h | 5 * \brief X.509 certificate parsing and writing 47 * \name Structures and functions for parsing and writing X.509 certificates 52 * Container for an X.509 certificate. The certificate may be chained. 61 int version; /**< The X.509 version. (1=v1, 2=v2, 3=v3) */ 77 mbedtls_x509_buf issuer_id; /**< Optional X.509 v2/v3 issuer unique identifier. */ 78 mbedtls_x509_buf subject_id; /**< Optional X.509 v2/v3 subject unique identifier. */ 79 mbedtls_x509_buf v3_ext; /**< Optional X.509 v3 extensions. */ 232 * \brief Context for resuming X.509 verify operations
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | x509.h | 5 * \brief X.509 generic defines and structures 113 * X.509 v3 Subject Alternative Name types. 135 * X.509 v3 Key Usage Extension flags 163 * X.509 extension types 206 * \name Structures for parsing X.509 certificates, CRLs and CSRs 239 /** \} name Structures for parsing X.509 certificates, CRLs and CSRs */
|
| H A D | x509_crt.h | 5 * \brief X.509 certificate parsing and writing 47 * \name Structures and functions for parsing and writing X.509 certificates 52 * Container for an X.509 certificate. The certificate may be chained. 61 int version; /**< The X.509 version. (1=v1, 2=v2, 3=v3) */ 77 mbedtls_x509_buf issuer_id; /**< Optional X.509 v2/v3 issuer unique identifier. */ 78 mbedtls_x509_buf subject_id; /**< Optional X.509 v2/v3 subject unique identifier. */ 79 mbedtls_x509_buf v3_ext; /**< Optional X.509 v3 extensions. */ 232 * \brief Context for resuming X.509 verify operations
|
| /OK3568_Linux_fs/yocto/poky/meta-selftest/files/ |
| H A D | static-passwd | 7 avahi:x:509:509::/:/bin/nologin
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/libksba/ |
| H A D | libksba_1.6.3.bb | 1 SUMMARY = "Easy API to create and parse X.509 and CMS related objects" 2 DESCRIPTION = "A library to make the tasks of working with X.509 certificates, \
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | module-signing.rst | 29 This facility uses X.509 ITU-T standard certificates to encode the public keys 103 and its corresponding X.509 certificate in PEM form, or — on systems where 113 (5) :menuselection:`Additional X.509 keys for default system keyring` 207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | sign-file.c | 43 * the options we have on specifying the X.509 certificate we want. 204 /* Assume raw DER encoded X.509 */ in read_x509() 207 /* Assume PEM encoded X.509 */ in read_x509() 301 /* Read the private key and the X.509 cert the PKCS#7 message in main()
|
| H A D | extract-cert.c | 1 /* Extract X.509 certificate in DER form from PKCS#11 or PEM. 148 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/qemu/qemu/ |
| H A D | 0008-target-ppc-Update-float_invalid_op_div-for-new-flags.patch | 27 @@ -509,17 +509,14 @@ float64 helper_fmul(CPUPPCState *env, float64 arg1, float64 arg2)
|