Lines Matching refs:sinfo

23 			struct pkcs7_signed_info *sinfo)  in pkcs7_digest()  argument
25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest()
31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo); in pkcs7_digest()
37 if (!sinfo->sig->hash_algo) in pkcs7_digest()
43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); in pkcs7_digest()
72 if (sinfo->authattrs) { in pkcs7_digest()
75 if (!sinfo->msgdigest) { in pkcs7_digest()
76 pr_warn("Sig %u: No messageDigest\n", sinfo->index); in pkcs7_digest()
81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest()
83 sinfo->index, sinfo->msgdigest_len); in pkcs7_digest()
88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest()
89 sinfo->msgdigest_len) != 0) { in pkcs7_digest()
91 sinfo->index); in pkcs7_digest()
110 ret = crypto_shash_finup(desc, sinfo->authattrs, in pkcs7_digest()
111 sinfo->authattrs_len, sig->digest); in pkcs7_digest()
128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos; in pkcs7_get_digest() local
134 if (sinfo == NULL || sinfo->next != NULL) in pkcs7_get_digest()
137 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_get_digest()
141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
142 *len = sinfo->sig->digest_size; in pkcs7_get_digest()
145 if (!strcmp(hash_algo_name[i], sinfo->sig->hash_algo)) { in pkcs7_get_digest()
160 struct pkcs7_signed_info *sinfo) in pkcs7_find_key() argument
165 kenter("%u", sinfo->index); in pkcs7_find_key()
173 if (!asymmetric_key_id_same(x509->id, sinfo->sig->auth_ids[0])) in pkcs7_find_key()
176 sinfo->index, certix); in pkcs7_find_key()
178 if (strcmp(x509->pub->pkey_algo, sinfo->sig->pkey_algo) != 0) { in pkcs7_find_key()
180 sinfo->index); in pkcs7_find_key()
184 sinfo->signer = x509; in pkcs7_find_key()
192 sinfo->index, in pkcs7_find_key()
193 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data); in pkcs7_find_key()
201 struct pkcs7_signed_info *sinfo) in pkcs7_verify_sig_chain() argument
204 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain()
223 sinfo->blacklisted = true; in pkcs7_verify_sig_chain()
224 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain()
291 sinfo->index, x509->index, p->index); in pkcs7_verify_sig_chain()
298 sinfo->index); in pkcs7_verify_sig_chain()
327 struct pkcs7_signed_info *sinfo) in pkcs7_verify_one() argument
331 kenter(",%u", sinfo->index); in pkcs7_verify_one()
336 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_verify_one()
341 ret = pkcs7_find_key(pkcs7, sinfo); in pkcs7_verify_one()
345 if (!sinfo->signer) in pkcs7_verify_one()
349 sinfo->signer->index, sinfo->index); in pkcs7_verify_one()
355 if (test_bit(sinfo_has_signing_time, &sinfo->aa_set)) { in pkcs7_verify_one()
356 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one()
357 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one()
364 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
368 pr_devel("Verified signature %u\n", sinfo->index); in pkcs7_verify_one()
371 return pkcs7_verify_sig_chain(pkcs7, sinfo); in pkcs7_verify_one()
407 struct pkcs7_signed_info *sinfo; in pkcs7_verify() local
451 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_verify()
452 ret = pkcs7_verify_one(pkcs7, sinfo); in pkcs7_verify()
453 if (sinfo->blacklisted) { in pkcs7_verify()
460 sinfo->unsupported_crypto = true; in pkcs7_verify()