/Linux-v5.4/crypto/asymmetric_keys/ |
D | x509_public_key.c | 23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 33 if (!cert->pub->pkey_algo) in x509_get_sig_params() 34 cert->unsupported_key = true; in x509_get_sig_params() 37 cert->unsupported_sig = true; in x509_get_sig_params() 41 cert->unsupported_sig = true; in x509_get_sig_params() 45 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 49 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 57 cert->unsupported_sig = true; in x509_get_sig_params() 77 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() [all …]
|
D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 48 if (cert) { in x509_free_certificate() 49 public_key_free(cert->pub); in x509_free_certificate() 50 public_key_signature_free(cert->sig); in x509_free_certificate() 51 kfree(cert->issuer); in x509_free_certificate() 52 kfree(cert->subject); in x509_free_certificate() 53 kfree(cert->id); in x509_free_certificate() 54 kfree(cert->skid); in x509_free_certificate() 55 kfree(cert); in x509_free_certificate() [all …]
|
D | x509_parser.h | 47 extern void x509_free_certificate(struct x509_certificate *cert); 56 extern int x509_get_sig_params(struct x509_certificate *cert); 57 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message()
|
D | tpm.asn1 | 3 -- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri
|
/Linux-v5.4/arch/s390/boot/ |
D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 65 for_each_rb_entry(cert, certs) in find_bootdata_space() 66 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 67 safe_addr = cert->addr + cert->len; in find_bootdata_space() 87 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 91 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 92 *(unsigned int *) ptr = cert->len; in copy_certificates_bootdata() 94 memcpy(ptr, (void *) cert->addr, cert->len); in copy_certificates_bootdata() [all …]
|
/Linux-v5.4/scripts/ |
D | Makefile | 21 hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 22 hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 27 HOSTLDLIBS_extract-cert = -lcrypto
|
D | extract-cert.c | 118 X509 *cert; in main() member 122 parms.cert = NULL; in main() 135 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 136 write_cert(parms.cert); in main()
|
D | .gitignore | 12 extract-cert 14 insert-sys-cert
|
D | insert-sys-cert.c | 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/Linux-v5.4/drivers/staging/greybus/Documentation/firmware/ |
D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
/Linux-v5.4/certs/ |
D | Makefile | 25 cmd_extract_certs = scripts/extract-cert $(2) $@ 28 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED… 104 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
|
/Linux-v5.4/arch/s390/kernel/ |
D | ipl.c | 1715 unsigned char flags, unsigned short cert) in ipl_report_add_component() argument 1727 comp->entry.certificate_index = cert; in ipl_report_add_component() 1737 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 1739 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 1740 if (!cert) in ipl_report_add_certificate() 1742 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 1744 cert->entry.addr = addr; in ipl_report_add_certificate() 1745 cert->entry.len = len; in ipl_report_add_certificate() 1746 cert->key = key; in ipl_report_add_certificate() 1748 report->size += sizeof(cert->entry); in ipl_report_add_certificate() [all …]
|
/Linux-v5.4/Documentation/crypto/ |
D | asymmetric-keys.txt | 385 keyctl padd asymmetric "" $root_id < root1.cert 386 keyctl padd asymmetric "" $root_id < root2.cert 394 keyctl padd asymmetric "" $chain_id < intermediateA.cert 395 keyctl padd asymmetric "" $chain_id < intermediateB.cert 396 keyctl padd asymmetric "" $chain_id < end-entity.cert 407 keyctl padd asymmetric "" $chain2_id < root1.cert 409 # Restrict the keyring that already has root1.cert linked. The cert 415 keyctl padd asymmetric "" $chain2_id < intermediateA.cert 416 keyctl padd asymmetric "" $chain2_id < intermediateB.cert 417 keyctl padd asymmetric "" $chain2_id < end-entity.cert
|
/Linux-v5.4/arch/s390/include/asm/ |
D | ipl.h | 109 unsigned char flags, unsigned short cert);
|
/Linux-v5.4/security/integrity/ima/ |
D | Kconfig | 262 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)" 270 key is validly signed by a CA cert in the system built-in or
|
/Linux-v5.4/ |
D | MAINTAINERS | 3830 F: scripts/extract-cert.c
|