cert 34 arch/s390/boot/ipl_report.c struct ipl_rb_certificate_entry *cert; cert 45 arch/s390/boot/ipl_report.c for_each_rb_entry(cert, certs) cert 46 arch/s390/boot/ipl_report.c ipl_cert_list_size += sizeof(unsigned int) + cert->len; cert 65 arch/s390/boot/ipl_report.c for_each_rb_entry(cert, certs) cert 66 arch/s390/boot/ipl_report.c if (intersects(safe_addr, size, cert->addr, cert->len)) { cert 67 arch/s390/boot/ipl_report.c safe_addr = cert->addr + cert->len; cert 87 arch/s390/boot/ipl_report.c struct ipl_rb_certificate_entry *cert; cert 91 arch/s390/boot/ipl_report.c for_each_rb_entry(cert, certs) { cert 92 arch/s390/boot/ipl_report.c *(unsigned int *) ptr = cert->len; cert 94 arch/s390/boot/ipl_report.c memcpy(ptr, (void *) cert->addr, cert->len); cert 95 arch/s390/boot/ipl_report.c ptr += cert->len; cert 109 arch/s390/include/asm/ipl.h unsigned char flags, unsigned short cert); cert 1715 arch/s390/kernel/ipl.c unsigned char flags, unsigned short cert) cert 1727 arch/s390/kernel/ipl.c comp->entry.certificate_index = cert; cert 1737 arch/s390/kernel/ipl.c struct ipl_report_certificate *cert; cert 1739 arch/s390/kernel/ipl.c cert = vzalloc(sizeof(*cert)); cert 1740 arch/s390/kernel/ipl.c if (!cert) cert 1742 arch/s390/kernel/ipl.c list_add_tail(&cert->list, &report->certificates); cert 1744 arch/s390/kernel/ipl.c cert->entry.addr = addr; cert 1745 arch/s390/kernel/ipl.c cert->entry.len = len; cert 1746 arch/s390/kernel/ipl.c cert->key = key; cert 1748 arch/s390/kernel/ipl.c report->size += sizeof(cert->entry); cert 1749 arch/s390/kernel/ipl.c report->size += cert->entry.len; cert 1776 arch/s390/kernel/ipl.c struct ipl_report_certificate *cert; cert 1812 arch/s390/kernel/ipl.c list_for_each_entry(cert, &report->certificates, list) { cert 1813 arch/s390/kernel/ipl.c memcpy(ptr, &cert->entry, sizeof(cert->entry)); cert 1814 arch/s390/kernel/ipl.c ptr += sizeof(cert->entry); cert 1819 arch/s390/kernel/ipl.c list_for_each_entry(cert, &report->certificates, list) { cert 1820 arch/s390/kernel/ipl.c memcpy(ptr, cert->key, cert->entry.len); cert 1821 arch/s390/kernel/ipl.c ptr += cert->entry.len; cert 1831 arch/s390/kernel/ipl.c struct ipl_report_certificate *cert, *ncert; cert 1836 arch/s390/kernel/ipl.c list_for_each_entry_safe(cert, ncert, &report->certificates, list) cert 1837 arch/s390/kernel/ipl.c vfree(cert); cert 59 crypto/asymmetric_keys/pkcs7_parser.c struct x509_certificate *cert; cert 64 crypto/asymmetric_keys/pkcs7_parser.c cert = pkcs7->certs; cert 65 crypto/asymmetric_keys/pkcs7_parser.c pkcs7->certs = cert->next; cert 66 crypto/asymmetric_keys/pkcs7_parser.c x509_free_certificate(cert); cert 69 crypto/asymmetric_keys/pkcs7_parser.c cert = pkcs7->crl; cert 70 crypto/asymmetric_keys/pkcs7_parser.c pkcs7->crl = cert->next; cert 71 crypto/asymmetric_keys/pkcs7_parser.c x509_free_certificate(cert); cert 157 crypto/asymmetric_keys/pkcs7_parser.c struct x509_certificate *cert = ctx->certs; cert 158 crypto/asymmetric_keys/pkcs7_parser.c ctx->certs = cert->next; cert 159 crypto/asymmetric_keys/pkcs7_parser.c x509_free_certificate(cert); cert 20 crypto/asymmetric_keys/x509_cert_parser.c struct x509_certificate *cert; /* Certificate being constructed */ cert 46 crypto/asymmetric_keys/x509_cert_parser.c void x509_free_certificate(struct x509_certificate *cert) cert 48 crypto/asymmetric_keys/x509_cert_parser.c if (cert) { cert 49 crypto/asymmetric_keys/x509_cert_parser.c public_key_free(cert->pub); cert 50 crypto/asymmetric_keys/x509_cert_parser.c public_key_signature_free(cert->sig); cert 51 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert->issuer); cert 52 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert->subject); cert 53 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert->id); cert 54 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert->skid); cert 55 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert); cert 65 crypto/asymmetric_keys/x509_cert_parser.c struct x509_certificate *cert; cert 71 crypto/asymmetric_keys/x509_cert_parser.c cert = kzalloc(sizeof(struct x509_certificate), GFP_KERNEL); cert 72 crypto/asymmetric_keys/x509_cert_parser.c if (!cert) cert 74 crypto/asymmetric_keys/x509_cert_parser.c cert->pub = kzalloc(sizeof(struct public_key), GFP_KERNEL); cert 75 crypto/asymmetric_keys/x509_cert_parser.c if (!cert->pub) cert 77 crypto/asymmetric_keys/x509_cert_parser.c cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL); cert 78 crypto/asymmetric_keys/x509_cert_parser.c if (!cert->sig) cert 84 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert = cert; cert 105 crypto/asymmetric_keys/x509_cert_parser.c cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); cert 106 crypto/asymmetric_keys/x509_cert_parser.c if (!cert->pub->key) cert 109 crypto/asymmetric_keys/x509_cert_parser.c cert->pub->keylen = ctx->key_size; cert 111 crypto/asymmetric_keys/x509_cert_parser.c cert->pub->params = kmemdup(ctx->params, ctx->params_size, GFP_KERNEL); cert 112 crypto/asymmetric_keys/x509_cert_parser.c if (!cert->pub->params) cert 115 crypto/asymmetric_keys/x509_cert_parser.c cert->pub->paramlen = ctx->params_size; cert 116 crypto/asymmetric_keys/x509_cert_parser.c cert->pub->algo = ctx->key_algo; cert 119 crypto/asymmetric_keys/x509_cert_parser.c ret = x509_get_sig_params(cert); cert 124 crypto/asymmetric_keys/x509_cert_parser.c kid = asymmetric_key_generate_id(cert->raw_serial, cert 125 crypto/asymmetric_keys/x509_cert_parser.c cert->raw_serial_size, cert 126 crypto/asymmetric_keys/x509_cert_parser.c cert->raw_issuer, cert 127 crypto/asymmetric_keys/x509_cert_parser.c cert->raw_issuer_size); cert 132 crypto/asymmetric_keys/x509_cert_parser.c cert->id = kid; cert 135 crypto/asymmetric_keys/x509_cert_parser.c ret = x509_check_for_self_signed(cert); cert 140 crypto/asymmetric_keys/x509_cert_parser.c return cert; cert 145 crypto/asymmetric_keys/x509_cert_parser.c x509_free_certificate(cert); cert 184 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->tbs = value - hdrlen; cert 185 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->tbs_size = vlen + hdrlen; cert 207 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "md4"; cert 211 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "sha1"; cert 215 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "sha256"; cert 219 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "sha384"; cert 223 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "sha512"; cert 227 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "sha224"; cert 231 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "streebog256"; cert 235 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->hash_algo = "streebog512"; cert 240 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->pkey_algo = "rsa"; cert 241 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->encoding = "pkcs1"; cert 245 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->pkey_algo = "ecrdsa"; cert 246 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->encoding = "raw"; cert 268 crypto/asymmetric_keys/x509_cert_parser.c if (strcmp(ctx->cert->sig->pkey_algo, "rsa") == 0 || cert 269 crypto/asymmetric_keys/x509_cert_parser.c strcmp(ctx->cert->sig->pkey_algo, "ecrdsa") == 0) { cert 278 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_sig = value; cert 279 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_sig_size = vlen; cert 291 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_serial = value; cert 292 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_serial_size = vlen; cert 408 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_issuer = value; cert 409 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_issuer_size = vlen; cert 410 crypto/asymmetric_keys/x509_cert_parser.c return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->issuer, vlen); cert 418 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_subject = value; cert 419 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_subject_size = vlen; cert 420 crypto/asymmetric_keys/x509_cert_parser.c return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); cert 437 crypto/asymmetric_keys/x509_cert_parser.c if (!ctx->cert->raw_subject || ctx->key) cert 455 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->pub->pkey_algo = "rsa"; cert 458 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->pub->pkey_algo = "ecrdsa"; cert 488 crypto/asymmetric_keys/x509_cert_parser.c if (ctx->cert->skid || vlen < 3) cert 495 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_skid_size = vlen; cert 496 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->raw_skid = v; cert 500 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->skid = kid; cert 615 crypto/asymmetric_keys/x509_cert_parser.c return x509_decode_time(&ctx->cert->valid_from, hdrlen, tag, value, vlen); cert 623 crypto/asymmetric_keys/x509_cert_parser.c return x509_decode_time(&ctx->cert->valid_to, hdrlen, tag, value, vlen); cert 638 crypto/asymmetric_keys/x509_cert_parser.c if (ctx->cert->sig->auth_ids[1]) cert 645 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->auth_ids[1] = kid; cert 677 crypto/asymmetric_keys/x509_cert_parser.c if (!ctx->akid_raw_issuer || ctx->cert->sig->auth_ids[0]) cert 688 crypto/asymmetric_keys/x509_cert_parser.c ctx->cert->sig->auth_ids[0] = kid; cert 47 crypto/asymmetric_keys/x509_parser.h extern void x509_free_certificate(struct x509_certificate *cert); cert 56 crypto/asymmetric_keys/x509_parser.h extern int x509_get_sig_params(struct x509_certificate *cert); cert 57 crypto/asymmetric_keys/x509_parser.h extern int x509_check_for_self_signed(struct x509_certificate *cert); cert 23 crypto/asymmetric_keys/x509_public_key.c int x509_get_sig_params(struct x509_certificate *cert) cert 25 crypto/asymmetric_keys/x509_public_key.c struct public_key_signature *sig = cert->sig; cert 33 crypto/asymmetric_keys/x509_public_key.c if (!cert->pub->pkey_algo) cert 34 crypto/asymmetric_keys/x509_public_key.c cert->unsupported_key = true; cert 37 crypto/asymmetric_keys/x509_public_key.c cert->unsupported_sig = true; cert 41 crypto/asymmetric_keys/x509_public_key.c cert->unsupported_sig = true; cert 45 crypto/asymmetric_keys/x509_public_key.c sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); cert 49 crypto/asymmetric_keys/x509_public_key.c sig->s_size = cert->raw_sig_size; cert 57 crypto/asymmetric_keys/x509_public_key.c cert->unsupported_sig = true; cert 77 crypto/asymmetric_keys/x509_public_key.c ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); cert 85 crypto/asymmetric_keys/x509_public_key.c cert->blacklisted = true; cert 101 crypto/asymmetric_keys/x509_public_key.c int x509_check_for_self_signed(struct x509_certificate *cert) cert 107 crypto/asymmetric_keys/x509_public_key.c if (cert->raw_subject_size != cert->raw_issuer_size || cert 108 crypto/asymmetric_keys/x509_public_key.c memcmp(cert->raw_subject, cert->raw_issuer, cert 109 crypto/asymmetric_keys/x509_public_key.c cert->raw_issuer_size) != 0) cert 112 crypto/asymmetric_keys/x509_public_key.c if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { cert 116 crypto/asymmetric_keys/x509_public_key.c bool a = asymmetric_key_id_same(cert->skid, cert->sig->auth_ids[1]); cert 117 crypto/asymmetric_keys/x509_public_key.c bool b = asymmetric_key_id_same(cert->id, cert->sig->auth_ids[0]); cert 124 crypto/asymmetric_keys/x509_public_key.c cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) cert 129 crypto/asymmetric_keys/x509_public_key.c if (strcmp(cert->pub->pkey_algo, cert->sig->pkey_algo) != 0) cert 132 crypto/asymmetric_keys/x509_public_key.c ret = public_key_verify_signature(cert->pub, cert->sig); cert 135 crypto/asymmetric_keys/x509_public_key.c cert->unsupported_sig = true; cert 142 crypto/asymmetric_keys/x509_public_key.c cert->self_signed = true; cert 159 crypto/asymmetric_keys/x509_public_key.c struct x509_certificate *cert; cert 165 crypto/asymmetric_keys/x509_public_key.c cert = x509_cert_parse(prep->data, prep->datalen); cert 166 crypto/asymmetric_keys/x509_public_key.c if (IS_ERR(cert)) cert 167 crypto/asymmetric_keys/x509_public_key.c return PTR_ERR(cert); cert 169 crypto/asymmetric_keys/x509_public_key.c pr_devel("Cert Issuer: %s\n", cert->issuer); cert 170 crypto/asymmetric_keys/x509_public_key.c pr_devel("Cert Subject: %s\n", cert->subject); cert 172 crypto/asymmetric_keys/x509_public_key.c if (cert->unsupported_key) { cert 177 crypto/asymmetric_keys/x509_public_key.c pr_devel("Cert Key Algo: %s\n", cert->pub->pkey_algo); cert 178 crypto/asymmetric_keys/x509_public_key.c pr_devel("Cert Valid period: %lld-%lld\n", cert->valid_from, cert->valid_to); cert 180 crypto/asymmetric_keys/x509_public_key.c cert->pub->id_type = "X509"; cert 182 crypto/asymmetric_keys/x509_public_key.c if (cert->unsupported_sig) { cert 183 crypto/asymmetric_keys/x509_public_key.c public_key_signature_free(cert->sig); cert 184 crypto/asymmetric_keys/x509_public_key.c cert->sig = NULL; cert 187 crypto/asymmetric_keys/x509_public_key.c cert->sig->pkey_algo, cert->sig->hash_algo); cert 192 crypto/asymmetric_keys/x509_public_key.c if (cert->blacklisted) cert 196 crypto/asymmetric_keys/x509_public_key.c sulen = strlen(cert->subject); cert 197 crypto/asymmetric_keys/x509_public_key.c if (cert->raw_skid) { cert 198 crypto/asymmetric_keys/x509_public_key.c srlen = cert->raw_skid_size; cert 199 crypto/asymmetric_keys/x509_public_key.c q = cert->raw_skid; cert 201 crypto/asymmetric_keys/x509_public_key.c srlen = cert->raw_serial_size; cert 202 crypto/asymmetric_keys/x509_public_key.c q = cert->raw_serial; cert 209 crypto/asymmetric_keys/x509_public_key.c p = memcpy(desc, cert->subject, sulen); cert 219 crypto/asymmetric_keys/x509_public_key.c kids->id[0] = cert->id; cert 220 crypto/asymmetric_keys/x509_public_key.c kids->id[1] = cert->skid; cert 226 crypto/asymmetric_keys/x509_public_key.c prep->payload.data[asym_crypto] = cert->pub; cert 227 crypto/asymmetric_keys/x509_public_key.c prep->payload.data[asym_auth] = cert->sig; cert 232 crypto/asymmetric_keys/x509_public_key.c cert->pub = NULL; cert 233 crypto/asymmetric_keys/x509_public_key.c cert->id = NULL; cert 234 crypto/asymmetric_keys/x509_public_key.c cert->skid = NULL; cert 235 crypto/asymmetric_keys/x509_public_key.c cert->sig = NULL; cert 242 crypto/asymmetric_keys/x509_public_key.c x509_free_certificate(cert); cert 19 drivers/staging/greybus/Documentation/firmware/authenticate.c struct cap_ioc_get_ims_certificate cert = { cert 66 drivers/staging/greybus/Documentation/firmware/authenticate.c ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); cert 73 drivers/staging/greybus/Documentation/firmware/authenticate.c printf("IMS Certificate size: %d\n", cert.cert_size); cert 118 scripts/extract-cert.c X509 *cert; cert 122 scripts/extract-cert.c parms.cert = NULL; cert 135 scripts/extract-cert.c ERR(!parms.cert, "Get X.509 from PKCS#11"); cert 136 scripts/extract-cert.c write_cert(parms.cert); cert 281 scripts/insert-sys-cert.c char *cert; cert 310 scripts/insert-sys-cert.c cert = read_file(cert_file, &cert_size); cert 311 scripts/insert-sys-cert.c if (!cert) cert 390 scripts/insert-sys-cert.c strncmp(cert_sym.content, cert, cert_size) == 0) { cert 398 scripts/insert-sys-cert.c memcpy(cert_sym.content, cert, cert_size);