/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 27 struct x509_certificate *x509, *last = NULL, *p; in pkcs7_validate_trust_one() local 38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 39 if (x509->seen) { in pkcs7_validate_trust_one() 40 if (x509->verified) in pkcs7_validate_trust_one() 45 x509->seen = true; in pkcs7_validate_trust_one() 51 x509->id, x509->skid, false); in pkcs7_validate_trust_one() 59 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 68 if (x509->signer == x509) { in pkcs7_validate_trust_one() 74 last = x509; in pkcs7_validate_trust_one() 87 x509 = last; in pkcs7_validate_trust_one() [all …]
|
D | pkcs7_verify.c | 162 struct x509_certificate *x509; in pkcs7_find_key() local 167 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 173 if (!asymmetric_key_id_same(x509->id, sinfo->sig->auth_ids[0])) in pkcs7_find_key() 178 sinfo->signer = x509; in pkcs7_find_key() 198 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain() local 209 x509->subject, in pkcs7_verify_sig_chain() 210 x509->raw_serial_size, x509->raw_serial); in pkcs7_verify_sig_chain() 211 x509->seen = true; in pkcs7_verify_sig_chain() 213 if (x509->blacklisted) { in pkcs7_verify_sig_chain() 218 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain() [all …]
|
D | Makefile | 21 x509.asn1.o \ 27 $(obj)/x509.asn1.h \ 30 $(obj)/x509.asn1.o: $(obj)/x509.asn1.c $(obj)/x509.asn1.h
|
D | pkcs7_parser.c | 389 struct x509_certificate *x509; in pkcs7_extract_cert() local 408 x509 = x509_cert_parse(value, vlen); in pkcs7_extract_cert() 409 if (IS_ERR(x509)) in pkcs7_extract_cert() 410 return PTR_ERR(x509); in pkcs7_extract_cert() 412 x509->index = ++ctx->x509_index; in pkcs7_extract_cert() 413 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert() 414 pr_debug("- fingerprint %*phN\n", x509->id->len, x509->id->data); in pkcs7_extract_cert() 416 *ctx->ppcerts = x509; in pkcs7_extract_cert() 417 ctx->ppcerts = &x509->next; in pkcs7_extract_cert()
|
/kernel/linux/linux-5.10/scripts/ |
D | extract-cert.c | 83 static void write_cert(X509 *x509) in write_cert() argument 91 X509_NAME_oneline(X509_get_subject_name(x509), buf, sizeof(buf)); in write_cert() 92 ERR(!i2d_X509_bio(wb, x509), "%s", cert_dst); in write_cert() 146 X509 *x509; in main() local 152 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); in main() 153 if (wb && !x509) { in main() 161 ERR(!x509, "%s", cert_src); in main() 162 write_cert(x509); in main()
|
D | sign-file.c | 180 X509 *x509; in read_x509() local 205 x509 = d2i_X509_bio(b, NULL); in read_x509() 208 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); in read_x509() 211 ERR(!x509, "%s", x509_name); in read_x509() 213 return x509; in read_x509() 236 X509 *x509; in main() local 305 x509 = read_x509(x509_name); in main() 320 ERR(!CMS_add1_signer(cms, x509, private_key, digest_algo, in main() 329 pkcs7 = PKCS7_sign(x509, private_key, NULL, bm, in main()
|
/kernel/linux/linux-5.10/certs/ |
D | Makefile | 33 clean-files := x509_certificate_list .x509.list x509_revocation_list 58 X509TEXT=$(shell openssl x509 -in "certs/signing_key.pem" -text 2>/dev/null) 75 $(obj)/signing_key.pem: $(obj)/x509.genkey 85 -batch -x509 -config $(obj)/x509.genkey \ 94 $(obj)/x509.genkey: 123 $(obj)/system_certificates.o: $(obj)/signing_key.x509 125 targets += signing_key.x509 126 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
|
D | Kconfig | 67 form of DER-encoded *.x509 files in the top-level build directory,
|
/kernel/linux/linux-5.10/Documentation/admin-guide/ |
D | module-signing.rst | 144 certs/x509.genkey 148 It is strongly recommended that you provide your own x509.genkey file. 150 Most notably, in the x509.genkey file, the req_distinguished_name section 165 x509.genkey key generation configuration file in the root node of the Linux 169 openssl req -new -nodes -utf8 -sha256 -days 36500 -batch -x509 \ 170 -config x509.genkey -outform PEM -out kernel_key.pem \ 204 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509 226 kernel-signkey.x509 module.ko
|
/kernel/linux/linux-5.10/ |
D | .gitignore | 138 signing_key.x509 139 x509.genkey
|
D | Makefile | 1118 …(CONFIG_MODULE_SIG_HASH) $(MODULE_SIG_KEY_SRCPREFIX)$(CONFIG_MODULE_SIG_KEY) certs/signing_key.x509 1521 signing_key.pem signing_key.priv signing_key.x509 \ 1522 x509.genkey extra_certificates signing_key.x509.keyid \ 1523 signing_key.x509.signer vmlinux-gdb.py \
|
/kernel/linux/linux-5.10/include/linux/ |
D | kernel_read_file.h | 16 id(X509_CERTIFICATE, x509-certificate) \
|
/kernel/linux/linux-5.10/net/wireless/ |
D | Makefile | 37 $(wildcard $(CONFIG_CFG80211_EXTRA_REGDB_KEYDIR:"%"=%)/*.x509)
|
/kernel/liteos_a/lib/libmbedtls/ |
D | BUILD.gn | 107 "$LITEOSTHIRDPARTY/mbedtls/library/x509.c",
|
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/drivers/ |
D | 0020_linux_drivers_gpu.patch | 12509 + 0x500, 0x509, 0x513, 0x51c, 0x525, 0x52f, 0x538, 0x542, 0x54c, 0x555, 13069 + 0x4e0, 0x4e8, 0x4f1, 0x4f9, 0x501, 0x509, 0x512, 0x51a, 0x522, 0x52b, 13281 + 0x4dc, 0x4e5, 0x4ee, 0x4f7, 0x500, 0x509, 0x512, 0x51b, 0x525, 0x52e, 13776 + 0x467, 0x478, 0x48a, 0x49c, 0x4ae, 0x4c0, 0x4d2, 0x4e4, 0x4f7, 0x509, 14321 + 0x4a8, 0x4b8, 0x4c8, 0x4d8, 0x4e8, 0x4f9, 0x509, 0x51a, 0x52b, 0x53b, 14506 + 0x438, 0x459, 0x47b, 0x49e, 0x4c1, 0x4e5, 0x509, 0x52e, 0x553, 0x579,
|