/linux/scripts/ |
H A D | extract-module-sig.pl | 59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info; 75 unless ($p >= $name_len + $kid_len + $sig_len); 77 $p -= $sig_len; 78 my $raw_sig = substr($buf, $p, $sig_len); 86 if ($sig_len > 0) { 87 print STDERR "Found $sig_len bytes of signature ["; 88 my $n = $sig_len > 16 ? 16 : $sig_len;
|
H A D | sign-file.c | 72 uint32_t sig_len; /* Length of signature data */ member 399 sig_info.sig_len = htonl(sig_size); in main()
|
/linux/security/integrity/ima/ |
H A D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 68 hdr = kzalloc(struct_size(hdr, raw_pkcs7, sig_len), GFP_KERNEL); in ima_read_modsig() 72 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig() 73 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 80 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig()
|
/linux/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper() 146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper() 163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() [all …]
|
H A D | selftest.c | 19 const u8 *sig, size_t sig_len) in fips_signature_selftest() argument 42 pkcs7 = pkcs7_parse_message(sig, sig_len); in fips_signature_selftest()
|
H A D | selftest.h | 10 const u8 *sig, size_t sig_len);
|
H A D | verify_pefile.h | 19 unsigned sig_len; member
|
/linux/kernel/module/ |
H A D | signing.c | 46 size_t sig_len, modlen = info->len; in mod_verify_sig() local 60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 61 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | verify_pkcs7_sig.c | 56 __be32 sig_len; /* Length of signature data */ member 63 __u32 sig_len; member 158 data_item->sig_len = st.st_size; in populate_data_item_str() 166 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str() 170 if (ret != data_item->sig_len) { in populate_data_item_str() 190 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local 240 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod() 241 modlen -= sig_len + sizeof(ms); in populate_data_item_mod() 251 if (sig_len > sizeof(data_item->sig)) { in populate_data_item_mod() 256 memcpy(data_item->sig, mod + modlen, sig_len); in populate_data_item_mod() [all …]
|
/linux/drivers/md/ |
H A D | dm-verity-verify-sig.c | 107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument 114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash() 122 sig_len, in verity_verify_root_hash() 132 sig_len, in verity_verify_root_hash()
|
H A D | dm-verity-verify-sig.h | 24 const void *sig_data, size_t sig_len); 38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_verify_pkcs7_sig.c | 27 __u32 sig_len; member 71 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG() 74 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
|
/linux/arch/s390/kernel/ |
H A D | machine_kexec_file.c | 33 unsigned long sig_len; in s390_verify_sig() local 51 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig() 52 if (sig_len >= kernel_len) in s390_verify_sig() 54 kernel_len -= sig_len; in s390_verify_sig() 70 kernel + kernel_len, sig_len, in s390_verify_sig() 76 kernel + kernel_len, sig_len, in s390_verify_sig()
|
/linux/fs/nfs/blocklayout/ |
H A D | dev.c | 138 b->simple.sigs[i].sig_len = be32_to_cpup(p++); in nfs4_block_decode_volume() 139 if (b->simple.sigs[i].sig_len > PNFS_BLOCK_UUID_LEN) { in nfs4_block_decode_volume() 141 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 145 p = xdr_inline_decode(xdr, b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 149 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 152 (XDR_QUADLEN(b->simple.sigs[i].sig_len) << 2); in nfs4_block_decode_volume()
|
H A D | blocklayout.h | 66 u32 sig_len; member
|
H A D | rpc_pipefs.c | 47 b->simple.sigs[i].sig_len); in nfs4_encode_simple()
|
/linux/include/linux/ |
H A D | module_signature.h | 40 __be32 sig_len; /* Length of signature data */ member
|
/linux/kernel/ |
H A D | module_signature.c | 24 if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) in mod_check_sig()
|
/linux/fs/nfsd/ |
H A D | blocklayoutxdr.c | 49 len = 4 + 4 + 8 + 4 + (XDR_QUADLEN(b->simple.sig_len) << 2); in nfsd4_block_encode_volume() 57 p = xdr_encode_opaque(p, b->simple.sig, b->simple.sig_len); in nfsd4_block_encode_volume()
|
H A D | blocklayoutxdr.h | 35 u32 sig_len; member
|
H A D | blocklayout.c | 159 b->simple.sig_len = PNFS_BLOCK_UUID_LEN; in nfsd4_block_get_device_info_simple() 160 return sb->s_export_op->get_uuid(sb, b->simple.sig, &b->simple.sig_len, in nfsd4_block_get_device_info_simple()
|
/linux/net/sctp/ |
H A D | sm_statefuns.c | 4365 unsigned int sig_len; in sctp_sf_authenticate() local 4392 sig_len = ntohs(chunk->chunk_hdr->length) - in sctp_sf_authenticate() 4395 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate() 4406 skb_pull(chunk->skb, sig_len); in sctp_sf_authenticate() 4408 save_digest = kmemdup(digest, sig_len, GFP_ATOMIC); in sctp_sf_authenticate() 4412 memset(digest, 0, sig_len); in sctp_sf_authenticate() 4419 if (memcmp(save_digest, digest, sig_len)) { in sctp_sf_authenticate()
|
/linux/kernel/trace/ |
H A D | bpf_trace.c | 1390 u32 data_len, sig_len; in bpf_verify_pkcs7_signature() local 1409 sig_len = __bpf_dynptr_size(sig_ptr); in bpf_verify_pkcs7_signature() 1410 sig = __bpf_dynptr_data(sig_ptr, sig_len); in bpf_verify_pkcs7_signature() 1412 return verify_pkcs7_signature(data, data_len, sig, sig_len, in bpf_verify_pkcs7_signature()
|