Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 18 of 18) sorted by relevance

/Linux-v6.1/crypto/asymmetric_keys/
Dx509_public_key.c23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument
25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params()
33 sig->data = cert->tbs; in x509_get_sig_params()
34 sig->data_size = cert->tbs_size; in x509_get_sig_params()
36 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
40 sig->s_size = cert->raw_sig_size; in x509_get_sig_params()
48 cert->unsupported_sig = true; in x509_get_sig_params()
68 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params()
77 cert->blacklisted = true; in x509_get_sig_params()
93 int x509_check_for_self_signed(struct x509_certificate *cert) in x509_check_for_self_signed() argument
[all …]
Dx509_cert_parser.c20 struct x509_certificate *cert; /* Certificate being constructed */ member
44 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument
46 if (cert) { in x509_free_certificate()
47 public_key_free(cert->pub); in x509_free_certificate()
48 public_key_signature_free(cert->sig); in x509_free_certificate()
49 kfree(cert->issuer); in x509_free_certificate()
50 kfree(cert->subject); in x509_free_certificate()
51 kfree(cert->id); in x509_free_certificate()
52 kfree(cert->skid); in x509_free_certificate()
53 kfree(cert); in x509_free_certificate()
[all …]
Dx509_parser.h55 extern void x509_free_certificate(struct x509_certificate *cert);
64 extern int x509_get_sig_params(struct x509_certificate *cert);
65 extern int x509_check_for_self_signed(struct x509_certificate *cert);
Dpkcs7_parser.c59 struct x509_certificate *cert; in pkcs7_free_message() local
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
66 x509_free_certificate(cert); in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
71 x509_free_certificate(cert); in pkcs7_free_message()
157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
158 ctx->certs = cert->next; in pkcs7_parse_message()
159 x509_free_certificate(cert); in pkcs7_parse_message()
/Linux-v6.1/arch/s390/boot/
Dipl_report.c34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local
45 for_each_rb_entry(cert, certs) in find_bootdata_space()
46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space()
65 for_each_rb_entry(cert, certs) in find_bootdata_space()
66 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space()
67 safe_addr = cert->addr + cert->len; in find_bootdata_space()
87 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local
91 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata()
92 *(unsigned int *) ptr = cert->len; in copy_certificates_bootdata()
94 memcpy(ptr, (void *) cert->addr, cert->len); in copy_certificates_bootdata()
[all …]
/Linux-v6.1/certs/
DMakefile26 cmd_extract_certs = $(obj)/extract-cert $(extract-cert-in) $@
27 extract-cert-in = $(or $(filter-out $(obj)/extract-cert, $(real-prereqs)),"")
31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE
70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI)
73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert F…
80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE
85 hostprogs := extract-cert
87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null)
88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto)
Dextract-cert.c125 X509 *cert; in main() member
129 parms.cert = NULL; in main()
142 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
143 write_cert(parms.cert); in main()
D.gitignore3 /extract-cert
DKconfig112 tools/certs/print-cert-tbs-hash.sh .
/Linux-v6.1/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c19 struct cap_ioc_get_ims_certificate cert = { variable
66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main()
73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
/Linux-v6.1/arch/s390/kernel/
Dipl.c2093 unsigned char flags, unsigned short cert) in ipl_report_add_component() argument
2105 comp->entry.certificate_index = cert; in ipl_report_add_component()
2115 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local
2117 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate()
2118 if (!cert) in ipl_report_add_certificate()
2120 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate()
2122 cert->entry.addr = addr; in ipl_report_add_certificate()
2123 cert->entry.len = len; in ipl_report_add_certificate()
2124 cert->key = key; in ipl_report_add_certificate()
2126 report->size += sizeof(cert->entry); in ipl_report_add_certificate()
[all …]
/Linux-v6.1/scripts/
Dinsert-sys-cert.c281 char *cert; in main() local
310 cert = read_file(cert_file, &cert_size); in main()
311 if (!cert) in main()
390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main()
398 memcpy(cert_sym.content, cert, cert_size); in main()
D.gitignore5 /insert-sys-cert
Dremove-stale-files47 rm -f scripts/extract-cert
DMakefile12 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
/Linux-v6.1/Documentation/crypto/
Dasymmetric-keys.rst380 keyctl padd asymmetric "" $root_id < root1.cert
381 keyctl padd asymmetric "" $root_id < root2.cert
389 keyctl padd asymmetric "" $chain_id < intermediateA.cert
390 keyctl padd asymmetric "" $chain_id < intermediateB.cert
391 keyctl padd asymmetric "" $chain_id < end-entity.cert
402 keyctl padd asymmetric "" $chain2_id < root1.cert
404 # Restrict the keyring that already has root1.cert linked. The cert
410 keyctl padd asymmetric "" $chain2_id < intermediateA.cert
411 keyctl padd asymmetric "" $chain2_id < intermediateB.cert
412 keyctl padd asymmetric "" $chain2_id < end-entity.cert
/Linux-v6.1/arch/s390/include/asm/
Dipl.h128 unsigned char flags, unsigned short cert);
/Linux-v6.1/security/integrity/ima/
DKconfig264 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
272 key is validly signed by a CA cert in the system built-in or