| /crypto/asymmetric_keys/ |
| A D | restrict.c | 88 if (!sig) in restrict_link_by_signature() 90 if (!sig->auth_ids[0] && !sig->auth_ids[1] && !sig->auth_ids[2]) in restrict_link_by_signature() 98 sig->auth_ids[0], sig->auth_ids[1], in restrict_link_by_signature() 229 if (!sig) in key_or_keyring_common() 231 if (!sig->auth_ids[0] && !sig->auth_ids[1] && !sig->auth_ids[2]) in key_or_keyring_common() 238 sig->auth_ids[1], in key_or_keyring_common() 267 if (!sig->auth_ids[0] && !sig->auth_ids[1]) { in key_or_keyring_common() 269 sig->auth_ids[2])) in key_or_keyring_common() 272 } else if (!sig->auth_ids[0] || !sig->auth_ids[1]) { in key_or_keyring_common() 275 auth_id = sig->auth_ids[0] ?: sig->auth_ids[1]; in key_or_keyring_common() [all …]
|
| A D | pkcs7_verify.c | 25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 186 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data); in pkcs7_find_key() 224 sig = x509->sig; in pkcs7_verify_sig_chain() 225 if (sig->auth_ids[0]) in pkcs7_verify_sig_chain() 227 sig->auth_ids[0]->len, sig->auth_ids[0]->data); in pkcs7_verify_sig_chain() [all …]
|
| A D | x509_public_key.c | 26 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local 35 if (!sig->s) in x509_get_sig_params() 56 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 57 if (!sig->digest) in x509_get_sig_params() 67 sig->digest); in x509_get_sig_params() 72 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params() 76 sig->digest_size, sig->digest); in x509_get_sig_params() 104 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { in x509_check_for_self_signed() 116 cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) in x509_check_for_self_signed() 173 cert->sig->pkey_algo, cert->sig->hash_algo); in x509_key_preparse() [all …]
|
| A D | public_key.c | 74 *sig = true; in software_key_determine_akcipher() 86 if (!*sig) { in software_key_determine_akcipher() 111 *sig = false; in software_key_determine_akcipher() 195 if (IS_ERR(sig)) { in software_key_query() 196 ret = PTR_ERR(sig); in software_key_query() 299 if (IS_ERR(sig)) { in software_key_eds_op() 300 ret = PTR_ERR(sig); in software_key_eds_op() 380 BUG_ON(!sig); in public_key_verify_signature() 381 BUG_ON(!sig->s); in public_key_verify_signature() 428 ret = crypto_sig_verify(tfm, sig->s, sig->s_size, in public_key_verify_signature() [all …]
|
| A D | pkcs7_trust.c | 26 struct public_key_signature *sig = sinfo->sig; in pkcs7_validate_trust_one() local 75 sig = last->sig; in pkcs7_validate_trust_one() 81 if (last && (last->sig->auth_ids[0] || last->sig->auth_ids[1])) { in pkcs7_validate_trust_one() 83 last->sig->auth_ids[0], in pkcs7_validate_trust_one() 84 last->sig->auth_ids[1], in pkcs7_validate_trust_one() 100 sinfo->sig->auth_ids[0], NULL, NULL, false); in pkcs7_validate_trust_one() 105 sig = sinfo->sig; in pkcs7_validate_trust_one() 115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
|
| A D | signature.c | 23 void public_key_signature_free(struct public_key_signature *sig) in public_key_signature_free() argument 27 if (sig) { in public_key_signature_free() 28 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++) in public_key_signature_free() 29 kfree(sig->auth_ids[i]); in public_key_signature_free() 30 kfree(sig->s); in public_key_signature_free() 31 kfree(sig->digest); in public_key_signature_free() 32 kfree(sig); in public_key_signature_free() 75 const struct public_key_signature *sig) in verify_signature() argument 91 ret = subtype->verify_signature(key, sig); in verify_signature()
|
| A D | x509_cert_parser.c | 48 public_key_signature_free(cert->sig); in x509_free_certificate() 75 if (!cert->sig) in x509_cert_parse() 190 ctx->cert->sig->hash_algo = "sha1"; in x509_note_sig_algo() 210 ctx->cert->sig->hash_algo = "sha1"; in x509_note_sig_algo() 263 ctx->cert->sig->pkey_algo = "rsa"; in x509_note_sig_algo() 264 ctx->cert->sig->encoding = "pkcs1"; in x509_note_sig_algo() 269 ctx->cert->sig->encoding = "raw"; in x509_note_sig_algo() 274 ctx->cert->sig->encoding = "x962"; in x509_note_sig_algo() 757 if (ctx->cert->sig->auth_ids[1]) in x509_akid_note_kid() 764 ctx->cert->sig->auth_ids[1] = kid; in x509_akid_note_kid() [all …]
|
| A D | pkcs7_parser.c | 48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info() 132 if (!ctx->sinfo->sig) in pkcs7_parse_message() 231 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo() 246 ctx->sinfo->sig->hash_algo = "sm3"; in pkcs7_sig_note_digest_algo() 281 ctx->sinfo->sig->pkey_algo = "rsa"; in pkcs7_sig_note_pkey_algo() 293 ctx->sinfo->sig->encoding = "x962"; in pkcs7_sig_note_pkey_algo() 298 ctx->sinfo->sig->encoding = "raw"; in pkcs7_sig_note_pkey_algo() 659 if (!ctx->sinfo->sig->s) in pkcs7_sig_note_signature() 662 ctx->sinfo->sig->s_size = vlen; in pkcs7_sig_note_signature() 698 sinfo->sig->auth_ids[0] = kid; in pkcs7_note_signed_info() [all …]
|
| A D | selftest.c | 19 const u8 *sig, size_t sig_len) in fips_signature_selftest() argument 42 pkcs7 = pkcs7_parse_message(sig, sig_len); in fips_signature_selftest()
|
| A D | selftest.h | 10 const u8 *sig, size_t sig_len);
|
| A D | pkcs7_parser.h | 49 struct public_key_signature *sig; member
|
| A D | x509_parser.h | 17 struct public_key_signature *sig; /* Signature parameters */ member
|
| A D | asymmetric_type.c | 588 struct public_key_signature sig = { in asymmetric_key_verify_signature() local 597 return verify_signature(params->key, &sig); in asymmetric_key_verify_signature()
|
| /crypto/ |
| A D | sig.c | 20 struct crypto_sig *sig = __crypto_sig_tfm(tfm); in crypto_sig_exit_tfm() local 21 struct sig_alg *alg = crypto_sig_alg(sig); in crypto_sig_exit_tfm() 23 alg->exit(sig); in crypto_sig_exit_tfm() 28 struct crypto_sig *sig = __crypto_sig_tfm(tfm); in crypto_sig_init_tfm() local 29 struct sig_alg *alg = crypto_sig_alg(sig); in crypto_sig_init_tfm() 32 sig->base.exit = crypto_sig_exit_tfm; in crypto_sig_init_tfm() 35 return alg->init(sig); in crypto_sig_init_tfm() 42 struct sig_instance *sig = sig_instance(inst); in crypto_sig_free_instance() local 44 sig->free(sig); in crypto_sig_free_instance()
|
| A D | ecdsa-p1363.c | 27 struct ecdsa_raw_sig sig; in ecdsa_p1363_verify() local 32 ecc_digits_from_bytes(src, keylen, sig.r, ndigits); in ecdsa_p1363_verify() 33 ecc_digits_from_bytes(src + keylen, keylen, sig.s, ndigits); in ecdsa_p1363_verify() 35 return crypto_sig_verify(ctx->child, &sig, sizeof(sig), digest, dlen); in ecdsa_p1363_verify()
|
| A D | ecdsa-x962.c | 24 struct ecdsa_raw_sig sig; member 63 return ecdsa_get_signature_rs(sig_ctx->sig.r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r() 72 return ecdsa_get_signature_rs(sig_ctx->sig.s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s() 91 return crypto_sig_verify(ctx->child, &sig_ctx.sig, sizeof(sig_ctx.sig), in ecdsa_x962_verify()
|
| A D | ecdsa.c | 72 const struct ecdsa_raw_sig *sig = src; in ecdsa_verify() local 78 if (slen != sizeof(*sig)) in ecdsa_verify() 86 return _ecdsa_verify(ctx, hash, sig->r, sig->s); in ecdsa_verify()
|
| A D | testmgr.c | 160 struct sig_test_suite sig; member 4083 if (!sig) in test_sig_one() 4095 memcmp(sig, vecs->c, vecs->c_size) || in test_sig_one() 4098 hexdump(sig, sig_size); in test_sig_one() 4134 if (desc->suite.sig.vecs) in alg_test_sig() 4136 desc->suite.sig.count); in alg_test_sig() 4947 .sig = __VECS(ecdsa_nist_p192_tv_template) 4954 .sig = __VECS(ecdsa_nist_p256_tv_template) 4974 .sig = __VECS(ecrdsa_tv_template) 5327 .sig = __VECS(pkcs1_rsa_none_tv_template) [all …]
|
| A D | Makefile | 35 obj-$(CONFIG_CRYPTO_SIG2) += sig.o
|