Searched refs:x509 (Results 1 – 11 of 11) sorted by relevance
| /linux/crypto/asymmetric_keys/ |
| H A D | pkcs7_trust.c | 27 struct x509_certificate *x509, *last = NULL, *p; in pkcs7_validate_trust_one() local 38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 39 if (x509->seen) { in pkcs7_validate_trust_one() 40 if (x509->verified) in pkcs7_validate_trust_one() 45 x509->seen = true; in pkcs7_validate_trust_one() 51 x509->id, x509->skid, NULL, false); in pkcs7_validate_trust_one() 59 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 68 if (x509->signer == x509) { in pkcs7_validate_trust_one() 74 last = x509; in pkcs7_validate_trust_one() 87 x509 = last; in pkcs7_validate_trust_one() [all …]
|
| H A D | Makefile | 20 x509.asn1.o \ 31 $(obj)/x509.asn1.h \ 34 $(obj)/x509.asn1.o: $(obj)/x509.asn1.c $(obj)/x509.asn1.h
|
| H A D | pkcs7_parser.c | 438 struct x509_certificate *x509; in pkcs7_extract_cert() local 457 x509 = x509_cert_parse(value, vlen); in pkcs7_extract_cert() 458 if (IS_ERR(x509)) in pkcs7_extract_cert() 459 return PTR_ERR(x509); in pkcs7_extract_cert() 461 x509->index = ++ctx->x509_index; in pkcs7_extract_cert() 462 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert() 463 pr_debug("- fingerprint %*phN\n", x509->id->len, x509->id->data); in pkcs7_extract_cert() 465 *ctx->ppcerts = x509; in pkcs7_extract_cert() 466 ctx->ppcerts = &x509->next; in pkcs7_extract_cert()
|
| /linux/certs/ |
| H A D | extract-cert.c | 51 static void write_cert(X509 *x509) in write_cert() argument 59 X509_NAME_oneline(X509_get_subject_name(x509), buf, sizeof(buf)); in write_cert() 60 ERR(!i2d_X509_bio(wb, x509), "%s", cert_dst); in write_cert() 161 X509 *x509; in main() local 167 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); in main() 168 if (wb && !x509) { in main() 176 ERR(!x509, "%s", cert_src); in main() 177 write_cert(x509); in main()
|
| /linux/scripts/ |
| H A D | sign-file.c | 49 "Usage: scripts/sign-file [-dp] <hash algo> <key> <x509> <module> [<dest>]\n"); 51 " scripts/sign-file -s <raw sig> <hash algo> <x509> <module> [<dest>]\n"); 150 X509 *x509; in read_private_key_pkcs11() 175 x509 = d2i_X509_bio(b, NULL); in read_private_key() 178 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); in read_private_key() 181 ERR(!x509, "%s", x509_name); in read_x509() 183 return x509; in read_x509() 201 X509 *x509; in read_x509() 254 x509 = read_x509(x509_name); in main() 290 ERR(!CMS_add1_signer(cms, x509, private_ke in main() 184 X509 *x509; read_x509() local 240 X509 *x509; main() local [all...] |
| H A D | Makefile.modinst | 108 …ee)/scripts/sign-file $(CONFIG_MODULE_SIG_HASH) "$(sig-key)" $(objtree)/certs/signing_key.x509 $@ \
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | verify_sig_setup.sh | 39 echo "${x509_genkey_content}" > ${tmp_dir}/x509.genkey 42 -batch -x509 -config ${tmp_dir}/x509.genkey \ 46 openssl x509 -in ${tmp_dir}/signing_key.pem -out \
|
| /linux/tools/certs/ |
| H A D | print-cert-tbs-hash.sh | 88 openssl x509 -in - -outform DER | \
|
| /linux/include/linux/ |
| H A D | kernel_read_file.h | 16 id(X509_CERTIFICATE, x509-certificate) \
|
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-prog.rst | 21 { **-L** | **--use-loader** } | [ { **-S** | **--sign** } **-k** <private_key.pem> **-i** <certificate.x509> ] } 259 -i <certificate.x509>
|
| /linux/ |
| H A D | Makefile | 1704 certs/x509.genkey \
|