Home
last modified time | relevance | path

Searched refs:certificates (Results 1 – 19 of 19) sorted by relevance

/linux-6.12.1/certs/
DKconfig63 containing trusted X.509 certificates to be included in the default
100 If set, only certificates signed by keys on the builtin trusted
131 bool "Provide system-wide ring of revocation certificates"
135 If set, this allows revocation certificates to be stored in the
140 string "X.509 certificates to be preloaded into the system blacklist keyring"
144 containing X.509 certificates to be included in the default blacklist
/linux-6.12.1/net/wireless/
DKconfig25 # may need to update this when certificates are changed and are
108 which certificates are part of the kernel sources
119 certificates like in the kernel sources (net/wireless/certs/)
123 for your certificates, and if cfg80211 is built-in they also must be.
/linux-6.12.1/arch/s390/include/asm/
Dipl.h119 struct list_head certificates; member
/linux-6.12.1/crypto/asymmetric_keys/
Dpkcs7.asn119 certificates CHOICE {
/linux-6.12.1/drivers/platform/x86/hp/
DKconfig72 using digital certificates and public-key cryptography that eliminate
/linux-6.12.1/Documentation/admin-guide/
Dmodule-signing.rst29 This facility uses X.509 ITU-T standard certificates to encode the public keys
118 additional certificates which will be included in the system keyring by
197 trusted certificates can be provided in a PEM-encoded file referenced by the
/linux-6.12.1/Documentation/hwmon/
Dsht3x.rst70 certificates through an API.
/linux-6.12.1/arch/s390/kernel/
Dipl.c2378 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate()
2400 INIT_LIST_HEAD(&report->certificates); in ipl_report_init()
2448 list_for_each_entry(cert, &report->certificates, list) { in ipl_report_finish()
2455 list_for_each_entry(cert, &report->certificates, list) { in ipl_report_finish()
2473 list_for_each_entry_safe(cert, ncert, &report->certificates, list) in ipl_report_free()
/linux-6.12.1/Documentation/crypto/
Dasymmetric-keys.rst375 certificates, with a separate, restricted keyring set up for each
378 # Create and populate a keyring for root certificates
395 one of the root certificates.
/linux-6.12.1/arch/s390/
DKconfig543 bool "Get user certificates via DIAG320"
548 certificates via DIAG 0x320.
550 These certificates will be made available via the keyring named
/linux-6.12.1/Documentation/networking/
Dtls-handshake.rst84 Authentication material such as x.509 certificates, private certificate
/linux-6.12.1/arch/powerpc/boot/dts/
Dturris1x.dts300 label = "certificates";
/linux-6.12.1/Documentation/admin-guide/device-mapper/
Dverity.rst141 also gain new certificates at run time if they are signed by a certificate
/linux-6.12.1/drivers/staging/greybus/Documentation/firmware/
Dfirmware-management290 cryptographic certificates held by the Interface for use in Component
/linux-6.12.1/security/integrity/ima/
DKconfig282 X509 certificates signed by a trusted key on the
/linux-6.12.1/Documentation/security/tpm/
Dtpm-security.rst158 Every TPM comes shipped with a couple of X.509 certificates for the
/linux-6.12.1/Documentation/filesystems/
Dfsverity.rst462 root user can add trusted X.509 certificates to this keyring using
469 file's actual digest against this signature, using the certificates
/linux-6.12.1/Documentation/admin-guide/LSM/
Dipe.rst559 Controls loading IMA certificates through the Kconfigs,
/linux-6.12.1/Documentation/process/
Dmaintainer-pgp-guide.rst861 looking up public keys, GnuPG will validate DNSSEC or TLS certificates,