/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local 31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo); in pkcs7_digest() 34 if (sig->digest) in pkcs7_digest() 37 if (!sinfo->sig->hash_algo) in pkcs7_digest() 43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); in pkcs7_digest() 48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() [all …]
|
D | restrict.c | 75 const struct public_key_signature *sig; in restrict_link_by_signature() local 87 sig = payload->data[asym_auth]; in restrict_link_by_signature() 88 if (!sig) in restrict_link_by_signature() 90 if (!sig->auth_ids[0] && !sig->auth_ids[1]) in restrict_link_by_signature() 93 if (ca_keyid && !asymmetric_key_id_partial(sig->auth_ids[1], ca_keyid)) in restrict_link_by_signature() 98 sig->auth_ids[0], sig->auth_ids[1], in restrict_link_by_signature() 106 ret = verify_signature(key, sig); in restrict_link_by_signature() 123 const struct public_key_signature *sig; in key_or_keyring_common() local 140 sig = payload->data[asym_auth]; in key_or_keyring_common() 141 if (!sig) in key_or_keyring_common() [all …]
|
D | x509_public_key.c | 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local 33 sig->data = cert->tbs; in x509_get_sig_params() 34 sig->data_size = cert->tbs_size; in x509_get_sig_params() 39 if (!sig->pkey_algo) in x509_get_sig_params() 43 if (!sig->hash_algo) { in x509_get_sig_params() 48 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 49 if (!sig->s) in x509_get_sig_params() 52 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 57 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in x509_get_sig_params() 67 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() [all …]
|
D | public_key.c | 316 static int cert_sig_digest_update(const struct public_key_signature *sig, in cert_sig_digest_update() argument 325 BUG_ON(!sig->data); in cert_sig_digest_update() 328 if (!sig->hash_algo || strcmp(sig->hash_algo, "sm3") != 0) in cert_sig_digest_update() 336 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in cert_sig_digest_update() 357 ret = crypto_shash_finup(desc, sig->data, sig->data_size, sig->digest); in cert_sig_digest_update() 367 const struct public_key_signature *sig, in cert_sig_digest_update() argument 378 const struct public_key_signature *sig) in public_key_verify_signature() argument 392 BUG_ON(!sig); in public_key_verify_signature() 393 BUG_ON(!sig->s); in public_key_verify_signature() 403 if (sig->pkey_algo) { in public_key_verify_signature() [all …]
|
D | pkcs7_trust.c | 26 struct public_key_signature *sig = sinfo->sig; in pkcs7_validate_trust_one() local 75 sig = last->sig; in pkcs7_validate_trust_one() 81 if (last && (last->sig->auth_ids[0] || last->sig->auth_ids[1])) { in pkcs7_validate_trust_one() 83 last->sig->auth_ids[0], in pkcs7_validate_trust_one() 84 last->sig->auth_ids[1], in pkcs7_validate_trust_one() 100 sinfo->sig->auth_ids[0], NULL, false); in pkcs7_validate_trust_one() 105 sig = sinfo->sig; in pkcs7_validate_trust_one() 115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
|
D | signature.c | 23 void public_key_signature_free(struct public_key_signature *sig) in public_key_signature_free() argument 27 if (sig) { in public_key_signature_free() 28 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++) in public_key_signature_free() 29 kfree(sig->auth_ids[i]); in public_key_signature_free() 30 kfree(sig->s); in public_key_signature_free() 31 kfree(sig->digest); in public_key_signature_free() 32 kfree(sig); in public_key_signature_free() 138 const struct public_key_signature *sig) in verify_signature() argument 154 ret = subtype->verify_signature(key, sig); in verify_signature()
|
D | x509_cert_parser.c | 50 public_key_signature_free(cert->sig); in x509_free_certificate() 77 cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL); in x509_cert_parse() 78 if (!cert->sig) in x509_cert_parse() 207 ctx->cert->sig->hash_algo = "md4"; in x509_note_pkey_algo() 211 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo() 215 ctx->cert->sig->hash_algo = "sha256"; in x509_note_pkey_algo() 219 ctx->cert->sig->hash_algo = "sha384"; in x509_note_pkey_algo() 223 ctx->cert->sig->hash_algo = "sha512"; in x509_note_pkey_algo() 227 ctx->cert->sig->hash_algo = "sha224"; in x509_note_pkey_algo() 231 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo() [all …]
|
D | pkcs7_parser.c | 48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info() 130 ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature), in pkcs7_parse_message() 132 if (!ctx->sinfo->sig) in pkcs7_parse_message() 231 ctx->sinfo->sig->hash_algo = "md4"; in pkcs7_sig_note_digest_algo() 234 ctx->sinfo->sig->hash_algo = "md5"; in pkcs7_sig_note_digest_algo() 237 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo() 240 ctx->sinfo->sig->hash_algo = "sha256"; in pkcs7_sig_note_digest_algo() 243 ctx->sinfo->sig->hash_algo = "sha384"; in pkcs7_sig_note_digest_algo() 246 ctx->sinfo->sig->hash_algo = "sha512"; in pkcs7_sig_note_digest_algo() 249 ctx->sinfo->sig->hash_algo = "sha224"; in pkcs7_sig_note_digest_algo() [all …]
|
D | asym_tpm.c | 732 const struct public_key_signature *sig) in tpm_key_verify_signature() argument 747 BUG_ON(!sig); in tpm_key_verify_signature() 748 BUG_ON(!sig->s); in tpm_key_verify_signature() 750 if (!sig->digest) in tpm_key_verify_signature() 753 ret = determine_akcipher(sig->encoding, sig->hash_algo, alg_name); in tpm_key_verify_signature() 774 sg_set_buf(&src_sg[0], sig->s, sig->s_size); in tpm_key_verify_signature() 775 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in tpm_key_verify_signature() 776 akcipher_request_set_crypt(req, src_sg, NULL, sig->s_size, in tpm_key_verify_signature() 777 sig->digest_size); in tpm_key_verify_signature()
|
D | pkcs7_parser.h | 49 struct public_key_signature *sig; member
|
D | x509_parser.h | 16 struct public_key_signature *sig; /* Signature parameters */ member
|
D | asymmetric_type.c | 567 struct public_key_signature sig = { in asymmetric_key_verify_signature() local 576 return verify_signature(params->key, &sig); in asymmetric_key_verify_signature()
|
/crypto/ |
D | sm2.c | 189 struct sm2_signature_ctx *sig = context; in sm2_get_signature_r() local 194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 195 if (!sig->sig_r) in sm2_get_signature_r() 204 struct sm2_signature_ctx *sig = context; in sm2_get_signature_s() local 209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s() 210 if (!sig->sig_s) in sm2_get_signature_s() 353 struct sm2_signature_ctx sig; in sm2_verify() local 368 sig.sig_r = NULL; in sm2_verify() 369 sig.sig_s = NULL; in sm2_verify() 370 ret = asn1_ber_decoder(&sm2signature_decoder, &sig, in sm2_verify() [all …]
|
D | ecdsa.c | 79 struct ecdsa_signature_ctx *sig = context; in ecdsa_get_signature_r() local 81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r() 82 sig->curve->g.ndigits); in ecdsa_get_signature_r() 88 struct ecdsa_signature_ctx *sig = context; in ecdsa_get_signature_s() local 90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s() 91 sig->curve->g.ndigits); in ecdsa_get_signature_s()
|
D | ecrdsa.c | 75 unsigned char sig[ECRDSA_MAX_SIG_SIZE]; in ecrdsa_verify() local 100 WARN_ON(req->src_len > sizeof(sig)) || in ecrdsa_verify() 105 sig, req->src_len); in ecrdsa_verify() 111 vli_from_be64(s, sig, ndigits); in ecrdsa_verify() 112 vli_from_be64(r, sig + ndigits * sizeof(u64), ndigits); in ecrdsa_verify()
|