Lines Matching refs:sinfo

23 			struct pkcs7_signed_info *sinfo)
25 struct public_key_signature *sig = sinfo->sig;
31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo);
37 if (!sinfo->sig->hash_algo)
43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0);
72 if (sinfo->authattrs) {
75 if (!sinfo->msgdigest) {
76 pr_warn("Sig %u: No messageDigest\n", sinfo->index);
81 if (sinfo->msgdigest_len != sig->digest_size) {
83 sinfo->index, sinfo->msgdigest_len);
88 if (memcmp(sig->digest, sinfo->msgdigest,
89 sinfo->msgdigest_len) != 0) {
91 sinfo->index);
110 ret = crypto_shash_finup(desc, sinfo->authattrs,
111 sinfo->authattrs_len, sig->digest);
128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos;
134 if (sinfo == NULL || sinfo->next != NULL)
137 ret = pkcs7_digest(pkcs7, sinfo);
141 *buf = sinfo->sig->digest;
142 *len = sinfo->sig->digest_size;
145 sinfo->sig->hash_algo);
159 struct pkcs7_signed_info *sinfo)
164 kenter("%u", sinfo->index);
172 if (!asymmetric_key_id_same(x509->id, sinfo->sig->auth_ids[0]))
175 sinfo->index, certix);
177 sinfo->signer = x509;
185 sinfo->index,
186 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data);
194 struct pkcs7_signed_info *sinfo)
197 struct x509_certificate *x509 = sinfo->signer, *p;
216 sinfo->blacklisted = true;
217 for (p = sinfo->signer; p != x509; p = p->signer)
281 sinfo->index, x509->index, p->index);
288 sinfo->index);
306 * sinfo->unsupported_crypto as the signed info block may still be
317 struct pkcs7_signed_info *sinfo)
321 kenter(",%u", sinfo->index);
326 ret = pkcs7_digest(pkcs7, sinfo);
331 ret = pkcs7_find_key(pkcs7, sinfo);
335 if (!sinfo->signer)
339 sinfo->signer->index, sinfo->index);
345 if (test_bit(sinfo_has_signing_time, &sinfo->aa_set)) {
346 if (sinfo->signing_time < sinfo->signer->valid_from ||
347 sinfo->signing_time > sinfo->signer->valid_to) {
354 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig);
358 pr_devel("Verified signature %u\n", sinfo->index);
361 return pkcs7_verify_sig_chain(pkcs7, sinfo);
397 struct pkcs7_signed_info *sinfo;
441 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) {
442 ret = pkcs7_verify_one(pkcs7, sinfo);
443 if (sinfo->blacklisted) {
450 sinfo->unsupported_crypto = true;