Lines Matching refs:sig
27 struct public_key_signature *sig = cert->sig;
35 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL);
36 if (!sig->s)
39 sig->s_size = cert->raw_sig_size;
44 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0);
54 sig->digest_size = crypto_shash_digestsize(tfm);
57 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL);
58 if (!sig->digest)
68 ret = strcmp(sig->hash_algo, "sm3") != 0 ? -EINVAL :
71 cert->pub->keylen, sig->digest) ?:
73 crypto_shash_update(desc, sig->digest,
74 sig->digest_size) ?:
76 sig->digest);
79 sig->digest);
85 ret = is_hash_blacklisted(sig->digest, sig->digest_size,
89 sig->digest_size, sig->digest);
117 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) {
121 bool a = asymmetric_key_id_same(cert->skid, cert->sig->auth_ids[1]);
122 bool b = asymmetric_key_id_same(cert->id, cert->sig->auth_ids[0]);
129 cert->sig->auth_ids[0] && cert->sig->auth_ids[1])
138 ret = public_key_verify_signature(cert->pub, cert->sig);
183 public_key_signature_free(cert->sig);
184 cert->sig = NULL;
187 cert->sig->pkey_algo, cert->sig->hash_algo);
234 prep->payload.data[asym_auth] = cert->sig;
242 cert->sig = NULL;