Lines Matching refs:sinfo

26 			struct pkcs7_signed_info *sinfo)  in pkcs7_digest()  argument
34 kenter(",%u,%u", sinfo->index, sinfo->sig.pkey_hash_algo); in pkcs7_digest()
36 if (sinfo->sig.pkey_hash_algo >= PKEY_HASH__LAST || in pkcs7_digest()
37 !hash_algo_name[sinfo->sig.pkey_hash_algo]) in pkcs7_digest()
43 tfm = crypto_alloc_shash(hash_algo_name[sinfo->sig.pkey_hash_algo], in pkcs7_digest()
49 sinfo->sig.digest_size = digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
74 if (sinfo->authattrs) { in pkcs7_digest()
77 if (!sinfo->msgdigest) { in pkcs7_digest()
78 pr_warn("Sig %u: No messageDigest\n", sinfo->index); in pkcs7_digest()
83 if (sinfo->msgdigest_len != sinfo->sig.digest_size) { in pkcs7_digest()
85 sinfo->index, sinfo->msgdigest_len); in pkcs7_digest()
90 if (memcmp(digest, sinfo->msgdigest, sinfo->msgdigest_len) != 0) { in pkcs7_digest()
92 sinfo->index); in pkcs7_digest()
102 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest()
111 ret = crypto_shash_finup(desc, sinfo->authattrs, in pkcs7_digest()
112 sinfo->authattrs_len, digest); in pkcs7_digest()
118 sinfo->sig.digest = digest; in pkcs7_digest()
136 struct pkcs7_signed_info *sinfo) in pkcs7_find_key() argument
141 kenter("%u", sinfo->index); in pkcs7_find_key()
149 if (!asymmetric_key_id_same(x509->id, sinfo->signing_cert_id)) in pkcs7_find_key()
152 sinfo->index, certix); in pkcs7_find_key()
154 if (x509->pub->pkey_algo != sinfo->sig.pkey_algo) { in pkcs7_find_key()
156 sinfo->index); in pkcs7_find_key()
160 sinfo->signer = x509; in pkcs7_find_key()
168 sinfo->index, in pkcs7_find_key()
169 sinfo->signing_cert_id->len, sinfo->signing_cert_id->data); in pkcs7_find_key()
177 struct pkcs7_signed_info *sinfo) in pkcs7_verify_sig_chain() argument
179 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain()
262 sinfo->index, x509->index, p->index); in pkcs7_verify_sig_chain()
269 sinfo->index); in pkcs7_verify_sig_chain()
300 struct pkcs7_signed_info *sinfo) in pkcs7_verify_one() argument
304 kenter(",%u", sinfo->index); in pkcs7_verify_one()
309 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_verify_one()
314 ret = pkcs7_find_key(pkcs7, sinfo); in pkcs7_verify_one()
318 if (!sinfo->signer) in pkcs7_verify_one()
322 sinfo->signer->index, sinfo->index); in pkcs7_verify_one()
328 if (test_bit(sinfo_has_signing_time, &sinfo->aa_set)) { in pkcs7_verify_one()
329 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one()
330 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one()
337 ret = public_key_verify_signature(sinfo->signer->pub, &sinfo->sig); in pkcs7_verify_one()
341 pr_devel("Verified signature %u\n", sinfo->index); in pkcs7_verify_one()
344 return pkcs7_verify_sig_chain(pkcs7, sinfo); in pkcs7_verify_one()
379 struct pkcs7_signed_info *sinfo; in pkcs7_verify() local
430 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_verify()
431 ret = pkcs7_verify_one(pkcs7, sinfo); in pkcs7_verify()
434 sinfo->unsupported_crypto = true; in pkcs7_verify()