/linux-master/include/crypto/ |
H A D | pkcs7.h | 23 extern void pkcs7_free_message(struct pkcs7_message *pkcs7); 25 extern int pkcs7_get_content_data(const struct pkcs7_message *pkcs7, 32 extern int pkcs7_validate_trust(struct pkcs7_message *pkcs7, 38 extern int pkcs7_verify(struct pkcs7_message *pkcs7, 41 extern int pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, 44 extern int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf,
|
/linux-master/crypto/asymmetric_keys/ |
H A D | selftest.c | 7 #include <crypto/pkcs7.h> 17 const u8 *pkcs7; member in struct:certs_test 174 #define TEST(data, pkcs7) { data, sizeof(data) - 1, pkcs7, sizeof(pkcs7) - 1 } 204 struct pkcs7_message *pkcs7; local 206 pkcs7 = pkcs7_parse_message(test->pkcs7, test->pkcs7_len); 207 if (IS_ERR(pkcs7)) 210 pkcs7_supply_detached_data(pkcs7, tes [all...] |
H A D | pkcs7_verify.c | 22 static int pkcs7_digest(struct pkcs7_message *pkcs7, argument 62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, 125 int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf, u32 *len, argument 128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos; 137 ret = pkcs7_digest(pkcs7, sinfo); 158 static int pkcs7_find_key(struct pkcs7_message *pkcs7, argument 166 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { 193 static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7, argument 203 for (p = pkcs7 316 pkcs7_verify_one(struct pkcs7_message *pkcs7, struct pkcs7_signed_info *sinfo) argument 394 pkcs7_verify(struct pkcs7_message *pkcs7, enum key_being_used_for usage) argument 477 pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, const void *data, size_t datalen) argument [all...] |
H A D | verify_pefile.h | 8 #include <crypto/pkcs7.h>
|
H A D | Makefile | 53 pkcs7.asn1.o \ 58 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h 59 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
|
H A D | pkcs7_trust.c | 22 static int pkcs7_validate_trust_one(struct pkcs7_message *pkcs7, argument 136 * @pkcs7: The PKCS#7 certificate to validate 158 int pkcs7_validate_trust(struct pkcs7_message *pkcs7, argument 166 for (p = pkcs7->certs; p; p = p->next) 169 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { 170 ret = pkcs7_validate_trust_one(pkcs7, sinfo, trust_keyring);
|
H A D | pkcs7_parser.c | 17 #include "pkcs7.asn1.h" 55 * @pkcs7: The PKCS#7 message to free 57 void pkcs7_free_message(struct pkcs7_message *pkcs7) argument 62 if (pkcs7) { 63 while (pkcs7->certs) { 64 cert = pkcs7->certs; 65 pkcs7->certs = cert->next; 68 while (pkcs7->crl) { 69 cert = pkcs7->crl; 70 pkcs7 185 pkcs7_get_content_data(const struct pkcs7_message *pkcs7, const void **_data, size_t *_data_len, size_t *_headerlen) argument [all...] |
H A D | pkcs7_parser.h | 9 #include <crypto/pkcs7.h>
|
H A D | verify_pefile.c | 126 const u8 *pkcs7; local 172 pkcs7 = pebuf + ctx->sig_offset; 173 if (pkcs7[0] != (ASN1_CONS_BIT | ASN1_SEQ)) 176 switch (pkcs7[1]) { 178 len = pkcs7[1] + 2; 183 len = pkcs7[2] + 3; 186 len = ((pkcs7[2] << 8) | pkcs7[3]) + 4;
|
H A D | mscode_parser.c | 13 #include <crypto/pkcs7.h>
|
/linux-master/certs/ |
H A D | blacklist.h | 3 #include <crypto/pkcs7.h>
|
H A D | system_keyring.c | 18 #include <crypto/pkcs7.h> 304 * @pkcs7: The PKCS#7 message that is the signature. 312 struct pkcs7_message *pkcs7, 323 if (data && pkcs7_supply_detached_data(pkcs7, data, len) < 0) { 329 ret = pkcs7_verify(pkcs7, usage); 333 ret = is_key_on_revocation_list(pkcs7); 359 ret = pkcs7_validate_trust(pkcs7, trusted_keys); 369 ret = pkcs7_get_content_data(pkcs7, &data, &len, &asn1hdrlen); 405 struct pkcs7_message *pkcs7; local 408 pkcs7 311 verify_pkcs7_message_sig(const void *data, size_t len, struct pkcs7_message *pkcs7, struct key *trusted_keys, enum key_being_used_for usage, int (*view_content)(void *ctx, const void *data, size_t len, size_t asn1hdrlen), void *ctx) argument [all...] |
H A D | blacklist.c | 286 * @pkcs7: The PKCS#7 message to check 288 int is_key_on_revocation_list(struct pkcs7_message *pkcs7) argument 292 ret = pkcs7_validate_trust(pkcs7, blacklist_keyring);
|
/linux-master/include/keys/ |
H A D | system_keyring.h | 76 extern struct pkcs7_message *pkcs7; 98 extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7); 104 static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) argument
|
/linux-master/include/linux/ |
H A D | verification.h | 57 struct pkcs7_message *pkcs7,
|
/linux-master/scripts/ |
H A D | sign-file.c | 59 #include <openssl/pkcs7.h> 234 PKCS7 *pkcs7 = NULL; local 329 pkcs7 = PKCS7_sign(x509, private_key, NULL, bm, 332 ERR(!pkcs7, "PKCS7_sign"); 347 ERR(i2d_PKCS7_bio(b, pkcs7) != 1, 379 ERR(i2d_PKCS7_bio(bd, pkcs7) != 1, "%s", dest_name);
|
/linux-master/security/integrity/ima/ |
H A D | ima_modsig.c | 14 #include <crypto/pkcs7.h>
|