Lines Matching defs:data
20 * Digest the relevant parts of the PKCS#7 data
41 * big the hash operational data will be.
62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len,
187 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data);
231 sig->auth_ids[0]->len, sig->auth_ids[0]->data);
234 sig->auth_ids[1]->len, sig->auth_ids[1]->data);
254 pr_debug("- want %*phN\n", auth->len, auth->data);
257 p->index, p->id->len, p->id->data);
263 pr_debug("- want %*phN\n", auth->len, auth->data);
268 p->index, p->skid->len, p->skid->data);
327 /* First of all, digest the data in the PKCS#7 message and the
373 * Verify a PKCS#7 message is internally consistent - that is, the data digest
410 pr_warn("Invalid module sig (not pkcs7-data)\n");
420 pr_warn("Invalid firmware sig (not pkcs7-data)\n");
437 pr_warn("Invalid unspecified sig (not pkcs7-data)\n");
469 * pkcs7_supply_detached_data - Supply the data needed to verify a PKCS#7 message
471 * @data: The data to be verified
472 * @datalen: The amount of data
474 * Supply the detached data needed to verify a PKCS#7 message. Note that no
475 * attempt to retain/pin the data is made. That is left to the caller. The
476 * data will not be modified by pkcs7_verify() and will not be freed when the
479 * Returns -EINVAL if data is already supplied in the message, 0 otherwise.
482 const void *data, size_t datalen)
484 if (pkcs7->data) {
488 pkcs7->data = data;