/Linux-v6.1/scripts/ |
D | extract-module-sig.pl | 59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info; 75 unless ($p >= $name_len + $kid_len + $sig_len); 77 $p -= $sig_len; 78 my $raw_sig = substr($buf, $p, $sig_len); 86 if ($sig_len > 0) { 87 print STDERR "Found $sig_len bytes of signature ["; 88 my $n = $sig_len > 16 ? 16 : $sig_len;
|
D | sign-file.c | 69 uint32_t sig_len; /* Length of signature data */ member 395 sig_info.sig_len = htonl(sig_size); in main()
|
/Linux-v6.1/security/integrity/ima/ |
D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig() 72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig() 80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
|
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | verify_pkcs7_sig.c | 49 __be32 sig_len; /* Length of signature data */ member 56 __u32 sig_len; member 148 data_item->sig_len = st.st_size; in populate_data_item_str() 156 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str() 160 if (ret != data_item->sig_len) { in populate_data_item_str() 180 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local 230 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod() 231 modlen -= sig_len + sizeof(ms); in populate_data_item_mod() 241 if (sig_len > sizeof(data_item->sig)) { in populate_data_item_mod() 246 memcpy(data_item->sig, mod + modlen, sig_len); in populate_data_item_mod() [all …]
|
/Linux-v6.1/kernel/module/ |
D | signing.c | 46 size_t sig_len, modlen = info->len; in mod_verify_sig() local 60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 61 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/Linux-v6.1/crypto/asymmetric_keys/ |
D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 141 if (round_up(wrapper.length, 8) != ctx->sig_len) { in pefile_strip_sig_wrapper() 159 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 161 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 162 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 191 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() 193 ctx->sig_len = len; in pefile_strip_sig_wrapper() [all …]
|
D | verify_pefile.h | 19 unsigned sig_len; member
|
/Linux-v6.1/arch/s390/kernel/ |
D | machine_kexec_file.c | 33 unsigned long sig_len; in s390_verify_sig() local 51 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig() 52 if (sig_len >= kernel_len) in s390_verify_sig() 54 kernel_len -= sig_len; in s390_verify_sig() 70 kernel + kernel_len, sig_len, in s390_verify_sig() 76 kernel + kernel_len, sig_len, in s390_verify_sig()
|
/Linux-v6.1/tools/testing/selftests/bpf/progs/ |
D | test_verify_pkcs7_sig.c | 32 __u32 sig_len; member 72 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG() 75 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
|
/Linux-v6.1/drivers/md/ |
D | dm-verity-verify-sig.c | 107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument 114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash() 122 sig_len, in verity_verify_root_hash()
|
D | dm-verity-verify-sig.h | 24 const void *sig_data, size_t sig_len); 38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
|
/Linux-v6.1/fs/nfs/blocklayout/ |
D | dev.c | 80 b->simple.sigs[i].sig_len = be32_to_cpup(p++); in nfs4_block_decode_volume() 81 if (b->simple.sigs[i].sig_len > PNFS_BLOCK_UUID_LEN) { in nfs4_block_decode_volume() 83 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 87 p = xdr_inline_decode(xdr, b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 91 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 94 (XDR_QUADLEN(b->simple.sigs[i].sig_len) << 2); in nfs4_block_decode_volume()
|
D | blocklayout.h | 66 u32 sig_len; member
|
D | rpc_pipefs.c | 47 b->simple.sigs[i].sig_len); in nfs4_encode_simple()
|
/Linux-v6.1/include/linux/ |
D | module_signature.h | 40 __be32 sig_len; /* Length of signature data */ member
|
/Linux-v6.1/kernel/ |
D | module_signature.c | 24 if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) in mod_check_sig()
|
/Linux-v6.1/fs/nfsd/ |
D | blocklayoutxdr.c | 48 len = 4 + 4 + 8 + 4 + (XDR_QUADLEN(b->simple.sig_len) << 2); in nfsd4_block_encode_volume() 56 p = xdr_encode_opaque(p, b->simple.sig, b->simple.sig_len); in nfsd4_block_encode_volume()
|
D | blocklayoutxdr.h | 35 u32 sig_len; member
|
D | blocklayout.c | 158 b->simple.sig_len = PNFS_BLOCK_UUID_LEN; in nfsd4_block_get_device_info_simple() 159 return sb->s_export_op->get_uuid(sb, b->simple.sig, &b->simple.sig_len, in nfsd4_block_get_device_info_simple()
|
/Linux-v6.1/net/sctp/ |
D | sm_statefuns.c | 4356 unsigned int sig_len; in sctp_sf_authenticate() local 4383 sig_len = ntohs(chunk->chunk_hdr->length) - in sctp_sf_authenticate() 4386 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate() 4397 skb_pull(chunk->skb, sig_len); in sctp_sf_authenticate() 4399 save_digest = kmemdup(digest, sig_len, GFP_ATOMIC); in sctp_sf_authenticate() 4403 memset(digest, 0, sig_len); in sctp_sf_authenticate() 4410 if (memcmp(save_digest, digest, sig_len)) { in sctp_sf_authenticate()
|