Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 15 of 15) sorted by relevance

/crypto/asymmetric_keys/
Dpkcs7_verify.c25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local
31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo); in pkcs7_digest()
34 if (sig->digest) in pkcs7_digest()
37 if (!sinfo->sig->hash_algo) in pkcs7_digest()
43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); in pkcs7_digest()
48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
[all …]
Drestrict.c75 const struct public_key_signature *sig; in restrict_link_by_signature() local
87 sig = payload->data[asym_auth]; in restrict_link_by_signature()
88 if (!sig) in restrict_link_by_signature()
90 if (!sig->auth_ids[0] && !sig->auth_ids[1]) in restrict_link_by_signature()
93 if (ca_keyid && !asymmetric_key_id_partial(sig->auth_ids[1], ca_keyid)) in restrict_link_by_signature()
98 sig->auth_ids[0], sig->auth_ids[1], in restrict_link_by_signature()
106 ret = verify_signature(key, sig); in restrict_link_by_signature()
123 const struct public_key_signature *sig; in key_or_keyring_common() local
140 sig = payload->data[asym_auth]; in key_or_keyring_common()
141 if (!sig) in key_or_keyring_common()
[all …]
Dx509_public_key.c25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local
33 sig->data = cert->tbs; in x509_get_sig_params()
34 sig->data_size = cert->tbs_size; in x509_get_sig_params()
39 if (!sig->pkey_algo) in x509_get_sig_params()
43 if (!sig->hash_algo) { in x509_get_sig_params()
48 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
49 if (!sig->s) in x509_get_sig_params()
52 sig->s_size = cert->raw_sig_size; in x509_get_sig_params()
57 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in x509_get_sig_params()
67 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params()
[all …]
Dpublic_key.c316 static int cert_sig_digest_update(const struct public_key_signature *sig, in cert_sig_digest_update() argument
325 BUG_ON(!sig->data); in cert_sig_digest_update()
328 if (!sig->hash_algo || strcmp(sig->hash_algo, "sm3") != 0) in cert_sig_digest_update()
336 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in cert_sig_digest_update()
357 ret = crypto_shash_finup(desc, sig->data, sig->data_size, sig->digest); in cert_sig_digest_update()
367 const struct public_key_signature *sig, in cert_sig_digest_update() argument
378 const struct public_key_signature *sig) in public_key_verify_signature() argument
392 BUG_ON(!sig); in public_key_verify_signature()
393 BUG_ON(!sig->s); in public_key_verify_signature()
403 if (sig->pkey_algo) { in public_key_verify_signature()
[all …]
Dpkcs7_trust.c26 struct public_key_signature *sig = sinfo->sig; in pkcs7_validate_trust_one() local
75 sig = last->sig; in pkcs7_validate_trust_one()
81 if (last && (last->sig->auth_ids[0] || last->sig->auth_ids[1])) { in pkcs7_validate_trust_one()
83 last->sig->auth_ids[0], in pkcs7_validate_trust_one()
84 last->sig->auth_ids[1], in pkcs7_validate_trust_one()
100 sinfo->sig->auth_ids[0], NULL, false); in pkcs7_validate_trust_one()
105 sig = sinfo->sig; in pkcs7_validate_trust_one()
115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
Dsignature.c23 void public_key_signature_free(struct public_key_signature *sig) in public_key_signature_free() argument
27 if (sig) { in public_key_signature_free()
28 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++) in public_key_signature_free()
29 kfree(sig->auth_ids[i]); in public_key_signature_free()
30 kfree(sig->s); in public_key_signature_free()
31 kfree(sig->digest); in public_key_signature_free()
32 kfree(sig); in public_key_signature_free()
138 const struct public_key_signature *sig) in verify_signature() argument
154 ret = subtype->verify_signature(key, sig); in verify_signature()
Dx509_cert_parser.c50 public_key_signature_free(cert->sig); in x509_free_certificate()
77 cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL); in x509_cert_parse()
78 if (!cert->sig) in x509_cert_parse()
207 ctx->cert->sig->hash_algo = "md4"; in x509_note_pkey_algo()
211 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo()
215 ctx->cert->sig->hash_algo = "sha256"; in x509_note_pkey_algo()
219 ctx->cert->sig->hash_algo = "sha384"; in x509_note_pkey_algo()
223 ctx->cert->sig->hash_algo = "sha512"; in x509_note_pkey_algo()
227 ctx->cert->sig->hash_algo = "sha224"; in x509_note_pkey_algo()
231 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo()
[all …]
Dpkcs7_parser.c48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info()
130 ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature), in pkcs7_parse_message()
132 if (!ctx->sinfo->sig) in pkcs7_parse_message()
231 ctx->sinfo->sig->hash_algo = "md4"; in pkcs7_sig_note_digest_algo()
234 ctx->sinfo->sig->hash_algo = "md5"; in pkcs7_sig_note_digest_algo()
237 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo()
240 ctx->sinfo->sig->hash_algo = "sha256"; in pkcs7_sig_note_digest_algo()
243 ctx->sinfo->sig->hash_algo = "sha384"; in pkcs7_sig_note_digest_algo()
246 ctx->sinfo->sig->hash_algo = "sha512"; in pkcs7_sig_note_digest_algo()
249 ctx->sinfo->sig->hash_algo = "sha224"; in pkcs7_sig_note_digest_algo()
[all …]
Dasym_tpm.c732 const struct public_key_signature *sig) in tpm_key_verify_signature() argument
747 BUG_ON(!sig); in tpm_key_verify_signature()
748 BUG_ON(!sig->s); in tpm_key_verify_signature()
750 if (!sig->digest) in tpm_key_verify_signature()
753 ret = determine_akcipher(sig->encoding, sig->hash_algo, alg_name); in tpm_key_verify_signature()
774 sg_set_buf(&src_sg[0], sig->s, sig->s_size); in tpm_key_verify_signature()
775 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in tpm_key_verify_signature()
776 akcipher_request_set_crypt(req, src_sg, NULL, sig->s_size, in tpm_key_verify_signature()
777 sig->digest_size); in tpm_key_verify_signature()
Dpkcs7_parser.h49 struct public_key_signature *sig; member
Dx509_parser.h16 struct public_key_signature *sig; /* Signature parameters */ member
Dasymmetric_type.c567 struct public_key_signature sig = { in asymmetric_key_verify_signature() local
576 return verify_signature(params->key, &sig); in asymmetric_key_verify_signature()
/crypto/
Dsm2.c189 struct sm2_signature_ctx *sig = context; in sm2_get_signature_r() local
194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r()
195 if (!sig->sig_r) in sm2_get_signature_r()
204 struct sm2_signature_ctx *sig = context; in sm2_get_signature_s() local
209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
210 if (!sig->sig_s) in sm2_get_signature_s()
353 struct sm2_signature_ctx sig; in sm2_verify() local
368 sig.sig_r = NULL; in sm2_verify()
369 sig.sig_s = NULL; in sm2_verify()
370 ret = asn1_ber_decoder(&sm2signature_decoder, &sig, in sm2_verify()
[all …]
Decdsa.c79 struct ecdsa_signature_ctx *sig = context; in ecdsa_get_signature_r() local
81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r()
82 sig->curve->g.ndigits); in ecdsa_get_signature_r()
88 struct ecdsa_signature_ctx *sig = context; in ecdsa_get_signature_s() local
90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
91 sig->curve->g.ndigits); in ecdsa_get_signature_s()
Decrdsa.c75 unsigned char sig[ECRDSA_MAX_SIG_SIZE]; in ecrdsa_verify() local
100 WARN_ON(req->src_len > sizeof(sig)) || in ecrdsa_verify()
105 sig, req->src_len); in ecrdsa_verify()
111 vli_from_be64(s, sig, ndigits); in ecrdsa_verify()
112 vli_from_be64(r, sig + ndigits * sizeof(u64), ndigits); in ecrdsa_verify()