Home
last modified time | relevance | path

Searched refs:pkcs7 (Results 1 – 14 of 14) sorted by relevance

/linux-6.3-rc2/crypto/asymmetric_keys/
A Dpkcs7_verify.c62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, in pkcs7_digest()
137 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_get_digest()
326 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_verify_one()
331 ret = pkcs7_find_key(pkcs7, sinfo); in pkcs7_verify_one()
405 if (pkcs7->data_type != OID_data) { in pkcs7_verify()
409 if (pkcs7->have_authattrs) { in pkcs7_verify()
415 if (pkcs7->data_type != OID_data) { in pkcs7_verify()
419 if (!pkcs7->have_authattrs) { in pkcs7_verify()
480 if (pkcs7->data) { in pkcs7_supply_detached_data()
484 pkcs7->data = data; in pkcs7_supply_detached_data()
[all …]
A Dselftest.c16 const u8 *pkcs7; member
173 #define TEST(data, pkcs7) { data, sizeof(data) - 1, pkcs7, sizeof(pkcs7) - 1 } argument
203 struct pkcs7_message *pkcs7; in fips_signature_selftest() local
205 pkcs7 = pkcs7_parse_message(test->pkcs7, test->pkcs7_len); in fips_signature_selftest()
206 if (IS_ERR(pkcs7)) in fips_signature_selftest()
209 pkcs7_supply_detached_data(pkcs7, test->data, test->data_len); in fips_signature_selftest()
211 ret = pkcs7_verify(pkcs7, VERIFYING_MODULE_SIGNATURE); in fips_signature_selftest()
215 ret = pkcs7_validate_trust(pkcs7, keyring); in fips_signature_selftest()
219 pkcs7_free_message(pkcs7); in fips_signature_selftest()
A Dpkcs7_parser.c62 if (pkcs7) { in pkcs7_free_message()
63 while (pkcs7->certs) { in pkcs7_free_message()
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
68 while (pkcs7->crl) { in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
73 while (pkcs7->signed_infos) { in pkcs7_free_message()
78 kfree(pkcs7); in pkcs7_free_message()
189 if (!pkcs7->data) in pkcs7_get_content_data()
[all …]
A DMakefile52 pkcs7.asn1.o \
57 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h
58 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
A Dpkcs7_trust.c22 static int pkcs7_validate_trust_one(struct pkcs7_message *pkcs7, in pkcs7_validate_trust_one() argument
158 int pkcs7_validate_trust(struct pkcs7_message *pkcs7, in pkcs7_validate_trust() argument
166 for (p = pkcs7->certs; p; p = p->next) in pkcs7_validate_trust()
169 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_validate_trust()
170 ret = pkcs7_validate_trust_one(pkcs7, sinfo, trust_keyring); in pkcs7_validate_trust()
A Dverify_pefile.c126 const u8 *pkcs7; in pefile_strip_sig_wrapper() local
168 pkcs7 = pebuf + ctx->sig_offset; in pefile_strip_sig_wrapper()
169 if (pkcs7[0] != (ASN1_CONS_BIT | ASN1_SEQ)) in pefile_strip_sig_wrapper()
172 switch (pkcs7[1]) { in pefile_strip_sig_wrapper()
174 len = pkcs7[1] + 2; in pefile_strip_sig_wrapper()
179 len = pkcs7[2] + 3; in pefile_strip_sig_wrapper()
182 len = ((pkcs7[2] << 8) | pkcs7[3]) + 4; in pefile_strip_sig_wrapper()
/linux-6.3-rc2/certs/
A Dsystem_keyring.c225 struct pkcs7_message *pkcs7, in verify_pkcs7_message_sig() argument
236 if (data && pkcs7_supply_detached_data(pkcs7, data, len) < 0) { in verify_pkcs7_message_sig()
242 ret = pkcs7_verify(pkcs7, usage); in verify_pkcs7_message_sig()
266 ret = is_key_on_revocation_list(pkcs7); in verify_pkcs7_message_sig()
272 ret = pkcs7_validate_trust(pkcs7, trusted_keys); in verify_pkcs7_message_sig()
282 ret = pkcs7_get_content_data(pkcs7, &data, &len, &asn1hdrlen); in verify_pkcs7_message_sig()
318 struct pkcs7_message *pkcs7; in verify_pkcs7_signature() local
321 pkcs7 = pkcs7_parse_message(raw_pkcs7, pkcs7_len); in verify_pkcs7_signature()
322 if (IS_ERR(pkcs7)) in verify_pkcs7_signature()
323 return PTR_ERR(pkcs7); in verify_pkcs7_signature()
[all …]
A Dblacklist.c288 int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument
292 ret = pkcs7_validate_trust(pkcs7, blacklist_keyring); in is_key_on_revocation_list()
/linux-6.3-rc2/include/crypto/
A Dpkcs7.h23 extern void pkcs7_free_message(struct pkcs7_message *pkcs7);
25 extern int pkcs7_get_content_data(const struct pkcs7_message *pkcs7,
32 extern int pkcs7_validate_trust(struct pkcs7_message *pkcs7,
38 extern int pkcs7_verify(struct pkcs7_message *pkcs7,
41 extern int pkcs7_supply_detached_data(struct pkcs7_message *pkcs7,
44 extern int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf,
/linux-6.3-rc2/include/keys/
A Dsystem_keyring.h62 extern struct pkcs7_message *pkcs7;
84 extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7);
90 static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument
/linux-6.3-rc2/scripts/
A Dsign-file.c234 PKCS7 *pkcs7 = NULL; in main() local
329 pkcs7 = PKCS7_sign(x509, private_key, NULL, bm, in main()
332 ERR(!pkcs7, "PKCS7_sign"); in main()
347 ERR(i2d_PKCS7_bio(b, pkcs7) < 0, in main()
379 ERR(i2d_PKCS7_bio(bd, pkcs7) < 0, "%s", dest_name); in main()
/linux-6.3-rc2/include/linux/
A Dverification.h56 struct pkcs7_message *pkcs7,
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/
A Dverity.rst134 the pkcs7 signature of the roothash. The pkcs7 signature is used to validate
/linux-6.3-rc2/
A DMAINTAINERS3206 F: include/crypto/pkcs7.h

Completed in 36 milliseconds