Searched refs:x509 (Results 1 – 11 of 11) sorted by relevance
/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 138 struct x509_certificate *x509; in pkcs7_find_key() local 143 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 149 if (!asymmetric_key_id_same(x509->id, sinfo->signing_cert_id)) in pkcs7_find_key() 154 if (x509->pub->pkey_algo != sinfo->sig.pkey_algo) { in pkcs7_find_key() 160 sinfo->signer = x509; in pkcs7_find_key() 179 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain() local 190 x509->subject, in pkcs7_verify_sig_chain() 191 x509->raw_serial_size, x509->raw_serial); in pkcs7_verify_sig_chain() 192 x509->seen = true; in pkcs7_verify_sig_chain() 193 ret = x509_get_sig_params(x509); in pkcs7_verify_sig_chain() [all …]
|
D | pkcs7_trust.c | 31 struct x509_certificate *x509, *last = NULL, *p; in pkcs7_validate_trust_one() local 43 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 44 if (x509->seen) { in pkcs7_validate_trust_one() 45 if (x509->verified) { in pkcs7_validate_trust_one() 46 trusted = x509->trusted; in pkcs7_validate_trust_one() 52 x509->seen = true; in pkcs7_validate_trust_one() 58 x509->id, x509->skid, in pkcs7_validate_trust_one() 67 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 76 if (x509->next == x509) { in pkcs7_validate_trust_one() 82 last = x509; in pkcs7_validate_trust_one() [all …]
|
D | Makefile | 17 x509-asn1.o \ 24 $(obj)/x509-asn1.h \ 27 $(obj)/x509-asn1.o: $(obj)/x509-asn1.c $(obj)/x509-asn1.h 31 clean-files += x509-asn1.c x509-asn1.h
|
D | pkcs7_parser.c | 369 struct x509_certificate *x509; in pkcs7_extract_cert() local 388 x509 = x509_cert_parse(value, vlen); in pkcs7_extract_cert() 389 if (IS_ERR(x509)) in pkcs7_extract_cert() 390 return PTR_ERR(x509); in pkcs7_extract_cert() 392 x509->index = ++ctx->x509_index; in pkcs7_extract_cert() 393 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert() 394 pr_debug("- fingerprint %*phN\n", x509->id->len, x509->id->data); in pkcs7_extract_cert() 396 *ctx->ppcerts = x509; in pkcs7_extract_cert() 397 ctx->ppcerts = &x509->next; in pkcs7_extract_cert()
|
/linux-4.4.14/certs/ |
D | Makefile | 25 clean-files := x509_certificate_list .x509.list 43 $(obj)/signing_key.pem: $(obj)/x509.genkey 53 -batch -x509 -config $(obj)/x509.genkey \ 60 $(obj)/x509.genkey: 89 $(obj)/system_certificates.o: $(obj)/signing_key.x509 91 targets += signing_key.x509 92 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
|
D | Kconfig | 39 form of DER-encoded *.x509 files in the top-level build directory,
|
/linux-4.4.14/scripts/ |
D | extract-cert.c | 76 static void write_cert(X509 *x509) in write_cert() argument 84 X509_NAME_oneline(X509_get_subject_name(x509), buf, sizeof(buf)); in write_cert() 85 ERR(!i2d_X509_bio(wb, x509), "%s", cert_dst); in write_cert() 139 X509 *x509; in main() local 145 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); in main() 146 if (wb && !x509) { in main() 154 ERR(!x509, "%s", cert_src); in main() 155 write_cert(x509); in main()
|
D | sign-file.c | 147 X509 *x509; in main() local 230 x509 = d2i_X509_bio(b, NULL); /* Binary encoded X.509 */ in main() 231 if (!x509) { in main() 233 x509 = PEM_read_bio_X509(b, NULL, NULL, NULL); /* PEM encoded X.509 */ in main() 234 if (x509) in main() 238 ERR(!x509, "%s", x509_name); in main() 263 ERR(!CMS_add1_signer(cms, x509, private_key, digest_algo, in main() 271 pkcs7 = PKCS7_sign(x509, private_key, NULL, bm, in main()
|
/linux-4.4.14/ |
D | .gitignore | 107 signing_key.x509 108 x509.genkey
|
D | Makefile | 875 …(CONFIG_MODULE_SIG_HASH) $(MODULE_SIG_KEY_SRCPREFIX)$(CONFIG_MODULE_SIG_KEY) certs/signing_key.x509 1179 signing_key.pem signing_key.priv signing_key.x509 \ 1180 x509.genkey extra_certificates signing_key.x509.keyid \ 1181 signing_key.x509.signer vmlinux-gdb.py
|
/linux-4.4.14/Documentation/ |
D | module-signing.txt | 138 certs/x509.genkey 142 It is strongly recommended that you provide your own x509.genkey file. 144 Most notably, in the x509.genkey file, the req_distinguished_name section 159 x509.genkey key generation configuration file in the root node of the Linux 163 openssl req -new -nodes -utf8 -sha256 -days 36500 -batch -x509 \ 164 -config x509.genkey -outform PEM -out kernel_key.pem \ 198 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509 220 kernel-signkey.x509 module.ko
|