/linux/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 24 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 26 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 34 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 38 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 46 cert->unsupported_sig = true; in x509_get_sig_params() 66 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, in x509_get_sig_params() 77 cert->blacklisted = true; in x509_get_sig_params() 93 int x509_check_for_self_signed(struct x509_certificate *cert) in x509_check_for_self_signed() argument 99 if (cert->raw_subject_size != cert->raw_issuer_size || in x509_check_for_self_signed() 100 memcmp(cert->raw_subject, cert->raw_issuer, in x509_check_for_self_signed() [all …]
|
H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 44 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 46 if (cert) { in x509_free_certificate() 47 public_key_free(cert->pub); in x509_free_certificate() 48 public_key_signature_free(cert->sig); in x509_free_certificate() 49 kfree(cert->issuer); in x509_free_certificate() 50 kfree(cert->subject); in x509_free_certificate() 51 kfree(cert->id); in x509_free_certificate() 52 kfree(cert->skid); in x509_free_certificate() 53 kfree(cert); in x509_free_certificate() [all …]
|
H A D | x509_parser.h | 47 extern void x509_free_certificate(struct x509_certificate *cert); 58 extern int x509_get_sig_params(struct x509_certificate *cert); 59 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message()
|
/linux/arch/s390/boot/ |
H A D | ipl_report.c | 31 struct ipl_rb_certificate_entry *cert; in get_cert_comp_list_size() local 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 43 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in get_cert_comp_list_size() 50 struct ipl_rb_certificate_entry *cert; in ipl_report_certs_intersects() local 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 56 if (intersects(addr, size, cert->addr, cert->len)) { in ipl_report_certs_intersects() 57 *intersection_start = cert->addr; in ipl_report_certs_intersects() 75 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 79 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 80 *(unsigned int *) ptr = cert->len; in copy_certificates_bootdata() [all …]
|
/linux/certs/ |
H A D | extract-cert.c | 67 X509 *cert = NULL; in load_cert_pkcs11() local 87 cert = OSSL_STORE_INFO_get1_CERT(info); in load_cert_pkcs11() 88 ERR(!cert, "OSSL_STORE_INFO_get1_CERT"); in load_cert_pkcs11() 91 if (cert) in load_cert_pkcs11() 99 X509 *cert; in load_cert_pkcs11() member 103 parms.cert = NULL; in load_cert_pkcs11() 116 ERR(!parms.cert, "Get X.509 from PKCS#11"); in load_cert_pkcs11() 117 cert = parms.cert; in load_cert_pkcs11() 122 return cert; in load_cert_pkcs11() 153 X509 *cert = load_cert_pkcs11(cert_src); in main() local [all …]
|
H A D | Makefile | 26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@ 27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs)) 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert F… 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 85 hostprogs := extract-cert 87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) -I$(srctree)… 88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto)
|
H A D | .gitignore | 3 /extract-cert
|
H A D | Kconfig | 128 tools/certs/print-cert-tbs-hash.sh .
|
/linux/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
/linux/arch/s390/kernel/ |
H A D | ipl.c | 2369 unsigned char flags, unsigned short cert) in ipl_report_add_component() argument 2381 comp->entry.certificate_index = cert; in ipl_report_add_component() 2391 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2393 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2394 if (!cert) in ipl_report_add_certificate() 2396 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2398 cert->entry.addr = addr; in ipl_report_add_certificate() 2399 cert->entry.len = len; in ipl_report_add_certificate() 2400 cert->key = key; in ipl_report_add_certificate() 2402 report->size += sizeof(cert->entry); in ipl_report_add_certificate() [all …]
|
/linux/scripts/ |
H A D | insert-sys-cert.c | 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
H A D | .gitignore | 4 /insert-sys-cert
|
H A D | Makefile | 11 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
|
/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 380 keyctl padd asymmetric "" $root_id < root1.cert 381 keyctl padd asymmetric "" $root_id < root2.cert 389 keyctl padd asymmetric "" $chain_id < intermediateA.cert 390 keyctl padd asymmetric "" $chain_id < intermediateB.cert 391 keyctl padd asymmetric "" $chain_id < end-entity.cert 402 keyctl padd asymmetric "" $chain2_id < root1.cert 404 # Restrict the keyring that already has root1.cert linked. The cert 410 keyctl padd asymmetric "" $chain2_id < intermediateA.cert 411 keyctl padd asymmetric "" $chain2_id < intermediateB.cert 412 keyctl padd asymmetric "" $chain2_id < end-entity.cert
|
/linux/arch/s390/include/asm/ |
H A D | ipl.h | 139 unsigned char flags, unsigned short cert);
|
/linux/security/ipe/ |
H A D | Kconfig | 92 enabled and it has a valid builtin signature whose signing cert
|
/linux/security/integrity/ima/ |
H A D | Kconfig | 255 key is validly signed by a CA cert in the system built-in,
|