Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 16 of 16) sorted by relevance

/Linux-v4.19/crypto/asymmetric_keys/
Dx509_public_key.c27 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument
29 struct public_key_signature *sig = cert->sig; in x509_get_sig_params()
37 if (!cert->pub->pkey_algo) in x509_get_sig_params()
38 cert->unsupported_key = true; in x509_get_sig_params()
41 cert->unsupported_sig = true; in x509_get_sig_params()
45 cert->unsupported_sig = true; in x509_get_sig_params()
49 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
53 sig->s_size = cert->raw_sig_size; in x509_get_sig_params()
61 cert->unsupported_sig = true; in x509_get_sig_params()
82 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params()
[all …]
Dx509_cert_parser.c24 struct x509_certificate *cert; /* Certificate being constructed */ member
47 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument
49 if (cert) { in x509_free_certificate()
50 public_key_free(cert->pub); in x509_free_certificate()
51 public_key_signature_free(cert->sig); in x509_free_certificate()
52 kfree(cert->issuer); in x509_free_certificate()
53 kfree(cert->subject); in x509_free_certificate()
54 kfree(cert->id); in x509_free_certificate()
55 kfree(cert->skid); in x509_free_certificate()
56 kfree(cert); in x509_free_certificate()
[all …]
Dx509_parser.h51 extern void x509_free_certificate(struct x509_certificate *cert);
60 extern int x509_get_sig_params(struct x509_certificate *cert);
61 extern int x509_check_for_self_signed(struct x509_certificate *cert);
Dpkcs7_parser.c63 struct x509_certificate *cert; in pkcs7_free_message() local
68 cert = pkcs7->certs; in pkcs7_free_message()
69 pkcs7->certs = cert->next; in pkcs7_free_message()
70 x509_free_certificate(cert); in pkcs7_free_message()
73 cert = pkcs7->crl; in pkcs7_free_message()
74 pkcs7->crl = cert->next; in pkcs7_free_message()
75 x509_free_certificate(cert); in pkcs7_free_message()
161 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
162 ctx->certs = cert->next; in pkcs7_parse_message()
163 x509_free_certificate(cert); in pkcs7_parse_message()
/Linux-v4.19/scripts/
Dextract-cert.c118 X509 *cert; in main() member
122 parms.cert = NULL; in main()
135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
136 write_cert(parms.cert); in main()
DMakefile21 hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert
22 hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
27 HOSTLDLIBS_extract-cert = -lcrypto
D.gitignore14 extract-cert
16 insert-sys-cert
Dinsert-sys-cert.c281 char *cert; in main() local
310 cert = read_file(cert_file, &cert_size); in main()
311 if (!cert) in main()
390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main()
398 memcpy(cert_sym.content, cert, cert_size); in main()
/Linux-v4.19/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c65 struct cap_ioc_get_ims_certificate cert = { variable
112 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main()
119 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
/Linux-v4.19/certs/
DMakefile25 cmd_extract_certs = scripts/extract-cert $(2) $@ || ( rm $@; exit 1)
28 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED…
104 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
/Linux-v4.19/Documentation/crypto/
Dasymmetric-keys.txt369 keyctl padd asymmetric "" $root_id < root1.cert
370 keyctl padd asymmetric "" $root_id < root2.cert
378 keyctl padd asymmetric "" $chain_id < intermediateA.cert
379 keyctl padd asymmetric "" $chain_id < intermediateB.cert
380 keyctl padd asymmetric "" $chain_id < end-entity.cert
391 keyctl padd asymmetric "" $chain2_id < root1.cert
393 # Restrict the keyring that already has root1.cert linked. The cert
399 keyctl padd asymmetric "" $chain2_id < intermediateA.cert
400 keyctl padd asymmetric "" $chain2_id < intermediateB.cert
401 keyctl padd asymmetric "" $chain2_id < end-entity.cert
/Linux-v4.19/Documentation/isdn/
D00-INDEX5 HiSax.cert
DHiSax.cert67 drivers/isdn/hisax/cert.c
DREADME.HiSax432 For certification look at HiSax.cert file.
/Linux-v4.19/security/integrity/ima/
DKconfig239 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
247 key is validly signed by a CA cert in the system built-in or
/Linux-v4.19/
DMAINTAINERS3465 F: scripts/extract-cert.c