Searched refs:certificates (Results 1 – 14 of 14) sorted by relevance
/linux-6.3-rc2/certs/ |
A D | Kconfig | 61 containing trusted X.509 certificates to be included in the default 115 bool "Provide system-wide ring of revocation certificates" 119 If set, this allows revocation certificates to be stored in the 124 string "X.509 certificates to be preloaded into the system blacklist keyring" 128 containing X.509 certificates to be included in the default blacklist
|
/linux-6.3-rc2/net/wireless/ |
A D | Kconfig | 25 # may need to update this when certificates are changed and are 108 which certificates are part of the kernel sources 119 certificates like in the kernel sources (net/wireless/certs/) 123 for your certificates, and if cfg80211 is built-in they also must be.
|
/linux-6.3-rc2/arch/s390/include/asm/ |
A D | ipl.h | 119 struct list_head certificates; member
|
/linux-6.3-rc2/crypto/asymmetric_keys/ |
A D | pkcs7.asn1 | 12 certificates CHOICE {
|
/linux-6.3-rc2/fs/verity/ |
A D | Kconfig | 43 certificates that have been loaded into the ".fs-verity"
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | module-signing.rst | 29 This facility uses X.509 ITU-T standard certificates to encode the public keys 117 additional certificates which will be included in the system keyring by 192 trusted certificates can be provided in a PEM-encoded file referenced by the
|
/linux-6.3-rc2/arch/s390/kernel/ |
A D | ipl.c | 2418 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2440 INIT_LIST_HEAD(&report->certificates); in ipl_report_init() 2488 list_for_each_entry(cert, &report->certificates, list) { in ipl_report_finish() 2495 list_for_each_entry(cert, &report->certificates, list) { in ipl_report_finish() 2513 list_for_each_entry_safe(cert, ncert, &report->certificates, list) in ipl_report_free()
|
/linux-6.3-rc2/Documentation/crypto/ |
A D | asymmetric-keys.rst | 375 certificates, with a separate, restricted keyring set up for each 378 # Create and populate a keyring for root certificates 395 one of the root certificates.
|
/linux-6.3-rc2/arch/powerpc/boot/dts/ |
A D | turris1x.dts | 300 label = "certificates";
|
/linux-6.3-rc2/drivers/staging/greybus/Documentation/firmware/ |
A D | firmware-management | 290 cryptographic certificates held by the Interface for use in Component
|
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/ |
A D | verity.rst | 141 also gain new certificates at run time if they are signed by a certificate
|
/linux-6.3-rc2/security/integrity/ima/ |
A D | Kconfig | 298 X509 certificates signed by a trusted key on the
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | fsverity.rst | 441 created. The root user can add trusted X.509 certificates to this 444 certificates from being added. 450 file's actual digest against this signature, using the certificates
|
/linux-6.3-rc2/Documentation/process/ |
A D | maintainer-pgp-guide.rst | 861 looking up public keys, GnuPG will validate DNSSEC or TLS certificates,
|
Completed in 22 milliseconds