Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 19 of 19) sorted by relevance

/u-boot/lib/crypto/
A Dx509_public_key.c63 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
152 if (cert->raw_subject_size != cert->raw_issuer_size || in x509_check_for_self_signed()
153 memcmp(cert->raw_subject, cert->raw_issuer, in x509_check_for_self_signed()
157 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { in x509_check_for_self_signed()
169 cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) in x509_check_for_self_signed()
174 if (strcmp(cert->pub->pkey_algo, cert->sig->pkey_algo) != 0) in x509_check_for_self_signed()
177 ret = public_key_verify_signature(cert->pub, cert->sig); in x509_check_for_self_signed()
212 if (IS_ERR(cert)) in x509_key_preparse()
233 cert->sig->pkey_algo, cert->sig->hash_algo); in x509_key_preparse()
278 cert->pub = NULL; in x509_key_preparse()
[all …]
A Dx509_cert_parser.c59 if (cert) { in x509_free_certificate()
62 kfree(cert->issuer); in x509_free_certificate()
64 kfree(cert->id); in x509_free_certificate()
65 kfree(cert->skid); in x509_free_certificate()
66 kfree(cert); in x509_free_certificate()
83 if (!cert) in x509_cert_parse()
86 if (!cert->pub) in x509_cert_parse()
89 if (!cert->sig) in x509_cert_parse()
95 ctx->cert = cert; in x509_cert_parse()
143 cert->id = kid; in x509_cert_parse()
[all …]
A Dpkcs7_parser.c71 struct x509_certificate *cert; in pkcs7_free_message() local
76 cert = pkcs7->certs; in pkcs7_free_message()
77 pkcs7->certs = cert->next; in pkcs7_free_message()
78 x509_free_certificate(cert); in pkcs7_free_message()
81 cert = pkcs7->crl; in pkcs7_free_message()
82 pkcs7->crl = cert->next; in pkcs7_free_message()
83 x509_free_certificate(cert); in pkcs7_free_message()
169 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
170 ctx->certs = cert->next; in pkcs7_parse_message()
171 x509_free_certificate(cert); in pkcs7_parse_message()
/u-boot/test/lib/
A Dasn1.c119 struct x509_certificate *cert; in lib_asn1_x509() local
121 cert = x509_cert_parse(cert_data, cert_data_len); in lib_asn1_x509()
123 ut_assertf(cert != NULL, "decoding failed\n"); in lib_asn1_x509()
124 ut_assertf(!strcmp(cert->subject, "Linaro: Tester"), in lib_asn1_x509()
126 ut_assertf(!strcmp(cert->issuer, "Linaro: Tester"), in lib_asn1_x509()
128 ut_assertf(cert->pub, "public key doesn't exist\n"); in lib_asn1_x509()
129 ut_assertf(cert->pub->keylen == 0x10e, "key length doesn't match\n"); in lib_asn1_x509()
130 ut_assertf(!strcmp(cert->pub->pkey_algo, "rsa"), "algo isn't rsa\n"); in lib_asn1_x509()
131 ut_assertf(cert->valid_from == 0x5da92ddb, in lib_asn1_x509()
133 ut_assertf(cert->valid_to == 0x5f8a615b, "valid_to doesn't match\n"); in lib_asn1_x509()
[all …]
/u-boot/tools/binman/test/
A D279_x509_cert.dts10 x509-cert {
11 cert-ca = "IOT2050 Firmware Signature";
12 cert-revision-int = <0>;
A D204_fip_other.dts17 fip-type = "rot-cert";
/u-boot/lib/efi_loader/
A Defi_signature.c293 if (!cert || !db || !db->sig_data_list) in efi_lookup_certificate()
301 reg[0].data = cert->tbs; in efi_lookup_certificate()
302 reg[0].size = cert->tbs_size; in efi_lookup_certificate()
365 struct x509_certificate *cert; in efi_verify_certificate() local
382 if (IS_ERR_OR_NULL(cert)) { in efi_verify_certificate()
392 *root = cert; in efi_verify_certificate()
394 x509_free_certificate(cert); in efi_verify_certificate()
397 x509_free_certificate(cert); in efi_verify_certificate()
422 struct x509_certificate *cert, in efi_signature_check_revocation() argument
446 reg[0].data = cert->tbs; in efi_signature_check_revocation()
[all …]
/u-boot/include/crypto/
A Dx509_parser.h50 extern void x509_free_certificate(struct x509_certificate *cert);
59 extern int x509_get_sig_params(struct x509_certificate *cert);
60 extern int x509_check_for_self_signed(struct x509_certificate *cert);
/u-boot/lib/rsa/
A Drsa-sign.c47 X509 *cert; in rsa_pem_get_pub_key() local
64 cert = NULL; in rsa_pem_get_pub_key()
65 if (!PEM_read_X509(f, &cert, NULL, NULL)) { in rsa_pem_get_pub_key()
72 key = X509_get_pubkey(cert); in rsa_pem_get_pub_key()
81 X509_free(cert); in rsa_pem_get_pub_key()
86 X509_free(cert); in rsa_pem_get_pub_key()
/u-boot/tools/
A Dmkeficapsule.c199 gnutls_datum_t cert; in create_auth_data() local
209 ret = read_bin_file(ctx->cert_file, &cert.data, &file_size); in create_auth_data()
214 cert.size = file_size; in create_auth_data()
255 ret = gnutls_x509_crt_import(x509, &cert, GNUTLS_X509_FMT_PEM); in create_auth_data()
A Dimage-host.c1133 X509 *cert; in read_pub_key() local
1149 cert = NULL; in read_pub_key()
1150 if (!PEM_read_X509(f, &cert, NULL, NULL)) { in read_pub_key()
1157 key = X509_get_pubkey(cert); in read_pub_key()
1176 X509_free(cert); in read_pub_key()
A Defivar.py276 def pkcs7_sign(cert, key, buf): argument
277 with open(cert, 'r') as f:
308 sig = pkcs7_sign(args.cert, args.key, buf)
A Dk3_gen_x509_cert.sh9 TEMP_X509=x509-temp.cert
/u-boot/arch/riscv/dts/
A Dmicrochip-mpfs.dtsi555 devicecert: cert {
556 compatible = "microchip,mpfs-device-cert";
/u-boot/doc/develop/uefi/
A Duefi.rst138 cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc \
148 cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc \
158 cert-to-efi-sig-list -g 11111111-2222-3333-4444-123456789abc \
168 sbsign --key db.key --cert db.crt helloworld.efi
476 $ cert-to-efi-sig-list CRT.crt CRT.esl
/u-boot/doc/board/ti/
A Dk3.rst190 SYSFW_HS_INNER_CERT_PATH=<path/to/ti-sysfw/ti-fs-firmware-{SOC}-hs-cert.bin
/u-boot/tools/binman/
A Dentries.rst2295 Entry: x509-cert: An entry which contains an X509 certificate
2303 - cert.<unique_name> - output file generated by openssl (which is
A Dftest.py6560 cert = data[:-4]
/u-boot/doc/develop/package/
A Dentries.rst2295 Entry: x509-cert: An entry which contains an X509 certificate
2303 - cert.<unique_name> - output file generated by openssl (which is

Completed in 65 milliseconds