Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 19 of 19) sorted by relevance

/linux/crypto/asymmetric_keys/
A Dx509_public_key.c34 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
66 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, in x509_get_sig_params()
99 if (cert->raw_subject_size != cert->raw_issuer_size || in x509_check_for_self_signed()
100 memcmp(cert->raw_subject, cert->raw_issuer, in x509_check_for_self_signed()
104 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { in x509_check_for_self_signed()
109 bool b = asymmetric_key_id_same(cert->id, cert->sig->auth_ids[0]); in x509_check_for_self_signed()
116 cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) in x509_check_for_self_signed()
125 ret = public_key_verify_signature(cert->pub, cert->sig); in x509_check_for_self_signed()
158 if (IS_ERR(cert)) in x509_key_preparse()
173 cert->sig->pkey_algo, cert->sig->hash_algo); in x509_key_preparse()
[all …]
A Dx509_cert_parser.c46 if (cert) { in x509_free_certificate()
49 kfree(cert->issuer); in x509_free_certificate()
51 kfree(cert->id); in x509_free_certificate()
52 kfree(cert->skid); in x509_free_certificate()
53 kfree(cert); in x509_free_certificate()
69 if (!cert) in x509_cert_parse()
72 if (!cert->pub) in x509_cert_parse()
75 if (!cert->sig) in x509_cert_parse()
81 ctx->cert = cert; in x509_cert_parse()
126 cert->id = kid; in x509_cert_parse()
[all …]
A Dx509_parser.h47 extern void x509_free_certificate(struct x509_certificate *cert);
58 extern int x509_get_sig_params(struct x509_certificate *cert);
59 extern int x509_check_for_self_signed(struct x509_certificate *cert);
A Dpkcs7_parser.c59 struct x509_certificate *cert; in pkcs7_free_message() local
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
66 x509_free_certificate(cert); in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
71 x509_free_certificate(cert); in pkcs7_free_message()
157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
158 ctx->certs = cert->next; in pkcs7_parse_message()
159 x509_free_certificate(cert); in pkcs7_parse_message()
/linux/arch/s390/boot/
A Dipl_report.c31 struct ipl_rb_certificate_entry *cert; in get_cert_comp_list_size() local
42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size()
50 struct ipl_rb_certificate_entry *cert; in ipl_report_certs_intersects() local
55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects()
56 if (intersects(addr, size, cert->addr, cert->len)) { in ipl_report_certs_intersects()
57 *intersection_start = cert->addr; in ipl_report_certs_intersects()
75 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local
79 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata()
80 *(unsigned int *) ptr = cert->len; in copy_certificates_bootdata()
82 memcpy(ptr, (void *) cert->addr, cert->len); in copy_certificates_bootdata()
[all …]
/linux/certs/
A Dextract-cert.c67 X509 *cert = NULL; in load_cert_pkcs11() local
87 cert = OSSL_STORE_INFO_get1_CERT(info); in load_cert_pkcs11()
88 ERR(!cert, "OSSL_STORE_INFO_get1_CERT"); in load_cert_pkcs11()
91 if (cert) in load_cert_pkcs11()
99 X509 *cert; in load_cert_pkcs11() member
103 parms.cert = NULL; in load_cert_pkcs11()
117 cert = parms.cert; in load_cert_pkcs11()
122 return cert; in load_cert_pkcs11()
153 X509 *cert = load_cert_pkcs11(cert_src); in main() local
155 ERR(!cert, "load_cert_pkcs11 failed"); in main()
[all …]
A DMakefile26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@
27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs))
31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE
70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI)
73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert F…
80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE
85 hostprogs := extract-cert
87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) -I$(srctree)…
88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto)
A D.gitignore3 /extract-cert
A DKconfig128 tools/certs/print-cert-tbs-hash.sh .
/linux/drivers/staging/greybus/Documentation/firmware/
A Dauthenticate.c19 struct cap_ioc_get_ims_certificate cert = { variable
66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main()
73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
/linux/scripts/
A Dinsert-sys-cert.c281 char *cert; in main() local
310 cert = read_file(cert_file, &cert_size); in main()
311 if (!cert) in main()
390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main()
398 memcpy(cert_sym.content, cert, cert_size); in main()
A D.gitignore4 /insert-sys-cert
A DMakefile11 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
/linux/arch/s390/kernel/
A Dipl.c2375 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate()
2376 if (!cert) in ipl_report_add_certificate()
2380 cert->entry.addr = addr; in ipl_report_add_certificate()
2381 cert->entry.len = len; in ipl_report_add_certificate()
2382 cert->key = key; in ipl_report_add_certificate()
2385 report->size += cert->entry.len; in ipl_report_add_certificate()
2449 memcpy(ptr, &cert->entry, sizeof(cert->entry)); in ipl_report_finish()
2450 ptr += sizeof(cert->entry); in ipl_report_finish()
2456 memcpy(ptr, cert->key, cert->entry.len); in ipl_report_finish()
2457 ptr += cert->entry.len; in ipl_report_finish()
[all …]
/linux/Documentation/crypto/
A Dasymmetric-keys.rst380 keyctl padd asymmetric "" $root_id < root1.cert
381 keyctl padd asymmetric "" $root_id < root2.cert
389 keyctl padd asymmetric "" $chain_id < intermediateA.cert
390 keyctl padd asymmetric "" $chain_id < intermediateB.cert
391 keyctl padd asymmetric "" $chain_id < end-entity.cert
402 keyctl padd asymmetric "" $chain2_id < root1.cert
404 # Restrict the keyring that already has root1.cert linked. The cert
410 keyctl padd asymmetric "" $chain2_id < intermediateA.cert
411 keyctl padd asymmetric "" $chain2_id < intermediateB.cert
412 keyctl padd asymmetric "" $chain2_id < end-entity.cert
/linux/arch/s390/include/asm/
A Dipl.h139 unsigned char flags, unsigned short cert);
/linux/Documentation/netlink/specs/
A Dhandshake.yaml36 name: cert
/linux/security/ipe/
A DKconfig92 enabled and it has a valid builtin signature whose signing cert
/linux/security/integrity/ima/
A DKconfig255 key is validly signed by a CA cert in the system built-in,

Completed in 38 milliseconds