/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 33 sig->data = cert->tbs; in x509_get_sig_params() 34 sig->data_size = cert->tbs_size; in x509_get_sig_params() 36 if (!cert->pub->pkey_algo) in x509_get_sig_params() 37 cert->unsupported_key = true; in x509_get_sig_params() 40 cert->unsupported_sig = true; in x509_get_sig_params() 44 cert->unsupported_sig = true; in x509_get_sig_params() 48 sig->s = kmemdup(cert->raw_sig, cert in x509_get_sig_params() 104 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 163 struct x509_certificate *cert; x509_key_preparse() local [all...] |
H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 22 const void *cert_start; /* Start of cert content */ 46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 48 if (cert) { in x509_free_certificate() 49 public_key_free(cert->pub); in x509_free_certificate() 50 public_key_signature_free(cert->sig); in x509_free_certificate() 51 kfree(cert->issuer); in x509_free_certificate() 52 kfree(cert->subject); in x509_free_certificate() 53 kfree(cert->id); in x509_free_certificate() 54 kfree(cert in x509_free_certificate() 65 struct x509_certificate *cert; x509_cert_parse() local [all...] |
H A D | x509_parser.h | 47 extern void x509_free_certificate(struct x509_certificate *cert); 56 extern int x509_get_sig_params(struct x509_certificate *cert); 57 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message() [all...] |
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 25 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 27 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 35 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 39 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 47 cert->unsupported_sig = true; in x509_get_sig_params() 67 if (strcmp(cert->pub->pkey_algo, "sm2") == 0) { in x509_get_sig_params() 70 sm2_compute_z_digest(desc, cert->pub->key, in x509_get_sig_params() 71 cert->pub->keylen, sig->digest) ?: in x509_get_sig_params() 75 crypto_shash_finup(desc, cert in x509_get_sig_params() 106 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 165 struct x509_certificate *cert; x509_key_preparse() local [all...] |
H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 26 enum OID key_algo; /* Algorithm used by the cert's key */ 28 enum OID sig_algo; /* Algorithm used to sign the cert */ 44 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 46 if (cert) { in x509_free_certificate() 47 public_key_free(cert->pub); in x509_free_certificate() 48 public_key_signature_free(cert->sig); in x509_free_certificate() 49 kfree(cert->issuer); in x509_free_certificate() 50 kfree(cert->subject); in x509_free_certificate() 51 kfree(cert in x509_free_certificate() 63 struct x509_certificate *cert; x509_cert_parse() local [all...] |
H A D | x509_parser.h | 46 extern void x509_free_certificate(struct x509_certificate *cert); 55 extern int x509_get_sig_params(struct x509_certificate *cert); 56 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message() [all...] |
/kernel/linux/common_modules/code_sign/ |
H A D | verify_cert_chain.c | 31 struct x509_certificate *cert; in pkcs7_find_key() local 37 cert = pkcs7->certs; in pkcs7_find_key() 38 while (cert) { in pkcs7_find_key() 39 if (asymmetric_key_id_same(cert->id, sinfo->sig->auth_ids[0])) { in pkcs7_find_key() 40 if (strcmp(cert->pub->pkey_algo, sinfo->sig->pkey_algo) != 0 in pkcs7_find_key() 41 && (strncmp(cert->pub->pkey_algo, "ecdsa-", 6) != 0 in pkcs7_find_key() 42 || strcmp(cert->sig->pkey_algo, "ecdsa") != 0)) { in pkcs7_find_key() 44 cert = cert->next; in pkcs7_find_key() 50 sinfo->index, cert in pkcs7_find_key() 189 struct x509_certificate* cert = pkcs7->certs; code_sign_verify_certchain() local [all...] |
H A D | code_sign_ioctl.c | 41 code_sign_log_info("cert found"); in matched_cert_search() 46 code_sign_log_error("cert not found"); in matched_cert_search() 90 int cert_chain_insert(struct rb_root *root, struct cert_source *cert) in cert_chain_insert() argument 98 if (!(cert->path_type == RELEASE_DEVELOPER_CODE in cert_chain_insert() 99 || cert->path_type == DEBUG_DEVELOPER_CODE)) { in cert_chain_insert() 100 code_sign_log_error("no permission to insert code %d", cert->path_type); in cert_chain_insert() 110 int result = strcmp(cert->subject, this->subject); in cert_chain_insert() 118 result = strcmp(cert->issuer, this->issuer); in cert_chain_insert() 125 code_sign_log_info("cert already exist in trust sources"); in cert_chain_insert() 132 cert in cert_chain_insert() 143 cert_chain_remove(struct rb_root *root, struct cert_source *cert) cert_chain_remove() argument [all...] |
/kernel/linux/linux-6.6/arch/s390/boot/ |
H A D | ipl_report.c | 31 struct ipl_rb_certificate_entry *cert; in get_cert_comp_list_size() local 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 43 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in get_cert_comp_list_size() 50 struct ipl_rb_certificate_entry *cert; in ipl_report_certs_intersects() local 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 56 if (intersects(addr, size, cert->addr, cert->len)) { in ipl_report_certs_intersects() 57 *intersection_start = cert->addr; in ipl_report_certs_intersects() 75 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 79 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
/kernel/linux/linux-5.10/arch/s390/boot/ |
H A D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 73 for_each_rb_entry(cert, certs) in find_bootdata_space() 74 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 75 safe_addr = cert->addr + cert->len; in find_bootdata_space() 95 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 99 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
/kernel/linux/linux-6.6/certs/ |
H A D | Makefile | 26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@ 27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs)) 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert FORCE 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 85 hostprogs := extract-cert 87 HOSTCFLAGS_extract-cert [all...] |
H A D | extract-cert.c | 39 "Usage: extract-cert <source> <dest>\n"); in format() 94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert() 128 X509 *cert; in main() member 132 parms.cert = NULL; in main() 145 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 146 write_cert(parms.cert); in main()
|
/kernel/linux/linux-5.10/scripts/ |
H A D | Makefile | 15 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 16 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 17 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 23 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 24 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
H A D | extract-cert.c | 39 "Usage: scripts/extract-cert <source> <dest>\n"); in format() 94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert() 125 X509 *cert; in main() member 129 parms.cert = NULL; in main() 142 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 143 write_cert(parms.cert); in main()
|
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/kernel/linux/linux-5.10/certs/ |
H A D | Makefile | 26 cmd_extract_certs = scripts/extract-cert $(2) $@ 29 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED_KEYS_FILENAME) FORCE 126 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE 137 cmd_extract_certs = scripts/extract-cert $(2) $@ 140 $(obj)/x509_revocation_list: scripts/extract-cert $(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(SYSTEM_REVOCATION_KEYS_FILENAME) FORCE
|
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
/kernel/linux/linux-6.6/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | ipl.c | 2090 unsigned char flags, unsigned short cert) in ipl_report_add_component() 2102 comp->entry.certificate_index = cert; in ipl_report_add_component() 2112 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2114 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2115 if (!cert) in ipl_report_add_certificate() 2117 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2119 cert->entry.addr = addr; in ipl_report_add_certificate() 2120 cert->entry.len = len; in ipl_report_add_certificate() 2121 cert in ipl_report_add_certificate() 2089 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument 2151 struct ipl_report_certificate *cert; ipl_report_finish() local 2207 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local [all...] |
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | ipl.c | 2392 unsigned char flags, unsigned short cert) in ipl_report_add_component() 2404 comp->entry.certificate_index = cert; in ipl_report_add_component() 2414 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2416 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2417 if (!cert) in ipl_report_add_certificate() 2419 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2421 cert->entry.addr = addr; in ipl_report_add_certificate() 2422 cert->entry.len = len; in ipl_report_add_certificate() 2423 cert in ipl_report_add_certificate() 2391 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument 2453 struct ipl_report_certificate *cert; ipl_report_finish() local 2509 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local [all...] |
/kernel/linux/linux-6.6/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
H A D | Makefile | 11 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
|
/kernel/linux/linux-6.6/tools/net/ynl/generated/ |
H A D | handshake-user.h | 27 __u32 cert:1; member 31 __u32 cert; member
|