/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 22 static int pkcs7_digest(struct pkcs7_message *pkcs7, in pkcs7_digest() argument 62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, in pkcs7_digest() 125 int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf, u32 *len, in pkcs7_get_digest() argument 128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos; in pkcs7_get_digest() 137 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_get_digest() 159 static int pkcs7_find_key(struct pkcs7_message *pkcs7, in pkcs7_find_key() argument 167 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 194 static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7, in pkcs7_verify_sig_chain() argument 204 for (p = pkcs7 in pkcs7_verify_sig_chain() 320 pkcs7_verify_one(struct pkcs7_message *pkcs7, struct pkcs7_signed_info *sinfo) pkcs7_verify_one() argument 398 pkcs7_verify(struct pkcs7_message *pkcs7, enum key_being_used_for usage) pkcs7_verify() argument 481 pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, const void *data, size_t datalen) pkcs7_supply_detached_data() argument [all...] |
H A D | pkcs7_parser.c | 17 #include "pkcs7.asn1.h" 55 * @pkcs7: The PKCS#7 message to free 57 void pkcs7_free_message(struct pkcs7_message *pkcs7) in pkcs7_free_message() argument 62 if (pkcs7) { in pkcs7_free_message() 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 68 while (pkcs7->crl) { in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7 in pkcs7_free_message() 185 pkcs7_get_content_data(const struct pkcs7_message *pkcs7, const void **_data, size_t *_data_len, size_t *_headerlen) pkcs7_get_content_data() argument [all...] |
H A D | pkcs7_trust.c | 22 static int pkcs7_validate_trust_one(struct pkcs7_message *pkcs7, in pkcs7_validate_trust_one() argument 136 * @pkcs7: The PKCS#7 certificate to validate 158 int pkcs7_validate_trust(struct pkcs7_message *pkcs7, in pkcs7_validate_trust() argument 166 for (p = pkcs7->certs; p; p = p->next) in pkcs7_validate_trust() 169 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_validate_trust() 170 ret = pkcs7_validate_trust_one(pkcs7, sinfo, trust_keyring); in pkcs7_validate_trust()
|
H A D | Makefile | 51 pkcs7.asn1.o \ 56 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h 57 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 22 static int pkcs7_digest(struct pkcs7_message *pkcs7, in pkcs7_digest() argument 62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, in pkcs7_digest() 125 int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf, u32 *len, in pkcs7_get_digest() argument 128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos; in pkcs7_get_digest() 137 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_get_digest() 158 static int pkcs7_find_key(struct pkcs7_message *pkcs7, in pkcs7_find_key() argument 166 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 193 static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7, in pkcs7_verify_sig_chain() argument 203 for (p = pkcs7 in pkcs7_verify_sig_chain() 316 pkcs7_verify_one(struct pkcs7_message *pkcs7, struct pkcs7_signed_info *sinfo) pkcs7_verify_one() argument 394 pkcs7_verify(struct pkcs7_message *pkcs7, enum key_being_used_for usage) pkcs7_verify() argument 477 pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, const void *data, size_t datalen) pkcs7_supply_detached_data() argument [all...] |
H A D | selftest.c | 7 #include <crypto/pkcs7.h> 17 const u8 *pkcs7; member 174 #define TEST(data, pkcs7) { data, sizeof(data) - 1, pkcs7, sizeof(pkcs7) - 1 } 204 struct pkcs7_message *pkcs7; in fips_signature_selftest() local 206 pkcs7 = pkcs7_parse_message(test->pkcs7, test->pkcs7_len); in fips_signature_selftest() 207 if (IS_ERR(pkcs7)) in fips_signature_selftest() 210 pkcs7_supply_detached_data(pkcs7, tes in fips_signature_selftest() [all...] |
H A D | pkcs7_parser.c | 17 #include "pkcs7.asn1.h" 55 * @pkcs7: The PKCS#7 message to free 57 void pkcs7_free_message(struct pkcs7_message *pkcs7) in pkcs7_free_message() argument 62 if (pkcs7) { in pkcs7_free_message() 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 68 while (pkcs7->crl) { in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7 in pkcs7_free_message() 185 pkcs7_get_content_data(const struct pkcs7_message *pkcs7, const void **_data, size_t *_data_len, size_t *_headerlen) pkcs7_get_content_data() argument [all...] |
H A D | Makefile | 53 pkcs7.asn1.o \ 58 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h 59 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
|
H A D | pkcs7_trust.c | 22 static int pkcs7_validate_trust_one(struct pkcs7_message *pkcs7, in pkcs7_validate_trust_one() argument 136 * @pkcs7: The PKCS#7 certificate to validate 158 int pkcs7_validate_trust(struct pkcs7_message *pkcs7, in pkcs7_validate_trust() argument 166 for (p = pkcs7->certs; p; p = p->next) in pkcs7_validate_trust() 169 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_validate_trust() 170 ret = pkcs7_validate_trust_one(pkcs7, sinfo, trust_keyring); in pkcs7_validate_trust()
|
/third_party/mbedtls/library/ |
H A D | pkcs7.c | 9 #include "mbedtls/pkcs7.h" 35 void mbedtls_pkcs7_init(mbedtls_pkcs7 *pkcs7) in mbedtls_pkcs7_init() argument 37 memset(pkcs7, 0, sizeof(*pkcs7)); in mbedtls_pkcs7_init() 86 mbedtls_pkcs7_buf *pkcs7) in pkcs7_get_content_info_type() 105 pkcs7->tag = MBEDTLS_ASN1_OID; in pkcs7_get_content_info_type() 106 pkcs7->len = len; in pkcs7_get_content_info_type() 107 pkcs7->p = *p; in pkcs7_get_content_info_type() 553 int mbedtls_pkcs7_parse_der(mbedtls_pkcs7 *pkcs7, const unsigned char *buf, in mbedtls_pkcs7_parse_der() argument 561 if (pkcs7 in mbedtls_pkcs7_parse_der() 84 pkcs7_get_content_info_type(unsigned char **p, unsigned char *end, unsigned char **seq_end, mbedtls_pkcs7_buf *pkcs7) pkcs7_get_content_info_type() argument 642 mbedtls_pkcs7_data_or_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen, const int is_data_hash) mbedtls_pkcs7_data_or_hash_verify() argument 722 mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen) mbedtls_pkcs7_signed_data_verify() argument 733 mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *hash, size_t hashlen) mbedtls_pkcs7_signed_hash_verify() argument 747 mbedtls_pkcs7_free(mbedtls_pkcs7 *pkcs7) mbedtls_pkcs7_free() argument [all...] |
/kernel/linux/common_modules/code_sign/ |
H A D | verify_cert_chain.c | 11 #include <crypto/pkcs7.h> 28 static int pkcs7_find_key(struct pkcs7_message *pkcs7, in pkcs7_find_key() argument 37 cert = pkcs7->certs; in pkcs7_find_key() 127 struct pkcs7_message *pkcs7; in code_sign_verify_certchain() local 130 pkcs7 = pkcs7_parse_message(raw_pkcs7, pkcs7_len); in code_sign_verify_certchain() 131 if (IS_ERR(pkcs7)) { in code_sign_verify_certchain() 132 code_sign_log_error("parse pkcs7 message failed"); in code_sign_verify_certchain() 133 *ret = PTR_ERR(pkcs7); in code_sign_verify_certchain() 137 if (!pkcs7->signed_infos) { in code_sign_verify_certchain() 138 code_sign_log_error("signed info not found in pkcs7"); in code_sign_verify_certchain() [all...] |
/kernel/linux/linux-5.10/certs/ |
H A D | system_keyring.c | 17 #include <crypto/pkcs7.h> 153 * @pkcs7: The PKCS#7 message that is the signature. 161 struct pkcs7_message *pkcs7, in verify_pkcs7_message_sig() 172 if (data && pkcs7_supply_detached_data(pkcs7, data, len) < 0) { in verify_pkcs7_message_sig() 178 ret = pkcs7_verify(pkcs7, usage); in verify_pkcs7_message_sig() 202 ret = is_key_on_revocation_list(pkcs7); in verify_pkcs7_message_sig() 208 ret = pkcs7_validate_trust(pkcs7, trusted_keys); in verify_pkcs7_message_sig() 218 ret = pkcs7_get_content_data(pkcs7, &data, &len, &asn1hdrlen); in verify_pkcs7_message_sig() 254 struct pkcs7_message *pkcs7; in verify_pkcs7_signature() local 257 pkcs7 in verify_pkcs7_signature() 160 verify_pkcs7_message_sig(const void *data, size_t len, struct pkcs7_message *pkcs7, struct key *trusted_keys, enum key_being_used_for usage, int (*view_content)(void *ctx, const void *data, size_t len, size_t asn1hdrlen), void *ctx) verify_pkcs7_message_sig() argument [all...] |
/kernel/linux/linux-6.6/certs/ |
H A D | system_keyring.c | 18 #include <crypto/pkcs7.h> 304 * @pkcs7: The PKCS#7 message that is the signature. 312 struct pkcs7_message *pkcs7, in verify_pkcs7_message_sig() 323 if (data && pkcs7_supply_detached_data(pkcs7, data, len) < 0) { in verify_pkcs7_message_sig() 329 ret = pkcs7_verify(pkcs7, usage); in verify_pkcs7_message_sig() 333 ret = is_key_on_revocation_list(pkcs7); in verify_pkcs7_message_sig() 359 ret = pkcs7_validate_trust(pkcs7, trusted_keys); in verify_pkcs7_message_sig() 369 ret = pkcs7_get_content_data(pkcs7, &data, &len, &asn1hdrlen); in verify_pkcs7_message_sig() 405 struct pkcs7_message *pkcs7; in verify_pkcs7_signature() local 408 pkcs7 in verify_pkcs7_signature() 311 verify_pkcs7_message_sig(const void *data, size_t len, struct pkcs7_message *pkcs7, struct key *trusted_keys, enum key_being_used_for usage, int (*view_content)(void *ctx, const void *data, size_t len, size_t asn1hdrlen), void *ctx) verify_pkcs7_message_sig() argument [all...] |
/kernel/linux/linux-5.10/include/crypto/ |
H A D | pkcs7.h | 23 extern void pkcs7_free_message(struct pkcs7_message *pkcs7); 25 extern int pkcs7_get_content_data(const struct pkcs7_message *pkcs7, 32 extern int pkcs7_validate_trust(struct pkcs7_message *pkcs7, 38 extern int pkcs7_verify(struct pkcs7_message *pkcs7, 41 extern int pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, 44 extern int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf,
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | pkcs7.h | 23 extern void pkcs7_free_message(struct pkcs7_message *pkcs7); 25 extern int pkcs7_get_content_data(const struct pkcs7_message *pkcs7, 32 extern int pkcs7_validate_trust(struct pkcs7_message *pkcs7, 38 extern int pkcs7_verify(struct pkcs7_message *pkcs7, 41 extern int pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, 44 extern int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
H A D | est.c | 13 #include <openssl/pkcs7.h> 31 static int pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7, in pkcs7_to_cert() argument 38 const unsigned char *p = pkcs7; in pkcs7_to_cert() 48 CBS_init(&pkcs7_cbs, pkcs7, len); in pkcs7_to_cert() 125 unsigned char *pkcs7; in est_load_cacerts() local 161 pkcs7 = base64_decode(resp, resp_len, &pkcs7_len); in est_load_cacerts() 162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts() 165 os_free(pkcs7); in est_load_cacerts() 166 pkcs7 = NULL; in est_load_cacerts() 168 if (pkcs7 in est_load_cacerts() 680 unsigned char *pkcs7; est_simple_enroll() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
H A D | est.c | 13 #include <openssl/pkcs7.h> 31 static int pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7, in pkcs7_to_cert() argument 38 const unsigned char *p = pkcs7; in pkcs7_to_cert() 48 CBS_init(&pkcs7_cbs, pkcs7, len); in pkcs7_to_cert() 125 unsigned char *pkcs7; in est_load_cacerts() local 161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); in est_load_cacerts() 162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts() 165 os_free(pkcs7); in est_load_cacerts() 166 pkcs7 = NULL; in est_load_cacerts() 168 if (pkcs7 in est_load_cacerts() 681 unsigned char *pkcs7; est_simple_enroll() local [all...] |
/third_party/mbedtls/programs/fuzz/ |
H A D | fuzz_pkcs7.c | 2 #include "mbedtls/pkcs7.h" 7 mbedtls_pkcs7 pkcs7; in LLVMFuzzerTestOneInput() local 9 mbedtls_pkcs7_init(&pkcs7); in LLVMFuzzerTestOneInput() 11 mbedtls_pkcs7_parse_der(&pkcs7, Data, Size); in LLVMFuzzerTestOneInput() 13 mbedtls_pkcs7_free(&pkcs7); in LLVMFuzzerTestOneInput()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | pkcs7.h | 2 * \file pkcs7.h 147 * \param pkcs7 mbedtls_pkcs7 structure. 149 void mbedtls_pkcs7_init(mbedtls_pkcs7 *pkcs7); 154 * \param pkcs7 The mbedtls_pkcs7 structure to be filled by the parser. 167 int mbedtls_pkcs7_parse_der(mbedtls_pkcs7 *pkcs7, const unsigned char *buf, 185 * \param pkcs7 mbedtls_pkcs7 structure containing signature. 195 int mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7, 214 * \param pkcs7 PKCS #7 structure containing signature. 224 int mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7, 230 * It doesn't free \p pkcs7 itsel [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 13 #include <openssl/pkcs7.h> 96 PKCS7 *pkcs7 = (PKCS7 *)ASN1_item_new_ex(ASN1_ITEM_rptr(PKCS7), libctx, 99 if (pkcs7 != NULL) { 100 pkcs7->ctx.libctx = libctx; 101 pkcs7->ctx.propq = NULL; 103 pkcs7->ctx.propq = OPENSSL_strdup(propq); 104 if (pkcs7->ctx.propq == NULL) { 105 PKCS7_free(pkcs7); 106 pkcs7 = NULL; 111 return pkcs7; [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 13 #include <openssl/pkcs7.h> 96 PKCS7 *pkcs7 = (PKCS7 *)ASN1_item_new_ex(ASN1_ITEM_rptr(PKCS7), libctx, 99 if (pkcs7 != NULL) { 100 pkcs7->ctx.libctx = libctx; 101 pkcs7->ctx.propq = NULL; 103 pkcs7->ctx.propq = OPENSSL_strdup(propq); 104 if (pkcs7->ctx.propq == NULL) { 105 PKCS7_free(pkcs7); 106 pkcs7 = NULL; 111 return pkcs7; [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkcs7.rs | 83 let pkcs7 = in from_smime() 91 Ok((pkcs7, out)) in from_smime() 287 use crate::pkcs7::{Pkcs7, Pkcs7Flags}; 306 let pkcs7 = in encrypt_decrypt_test() 309 let encrypted = pkcs7 in encrypt_decrypt_test() 339 let pkcs7 = in sign_verify_test_detached() 342 let signed = pkcs7 in sign_verify_test_detached() 383 let pkcs7 = in sign_verify_test_normal() 386 let signed = pkcs7 in sign_verify_test_normal() 420 let pkcs7 in signers() [all...] |
/kernel/linux/linux-5.10/include/keys/ |
H A D | system_keyring.h | 34 extern struct pkcs7_message *pkcs7; 55 extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7); 61 static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | pkcs7.rs | 168 pkcs7: *mut PKCS7, in PKCS7_verify() 177 pkcs7: *mut PKCS7, in PKCS7_get0_signers() 191 pkcs7: *mut PKCS7, in PKCS7_decrypt() 198 pub fn PKCS7_free(pkcs7: *mut PKCS7); in PKCS7_free() 202 pkcs7: *mut PKCS7, in SMIME_write_PKCS7()
|
/kernel/linux/linux-6.6/include/keys/ |
H A D | system_keyring.h | 76 extern struct pkcs7_message *pkcs7; 98 extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7); 104 static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument
|