cert               34 arch/s390/boot/ipl_report.c 	struct ipl_rb_certificate_entry *cert;
cert               45 arch/s390/boot/ipl_report.c 	for_each_rb_entry(cert, certs)
cert               46 arch/s390/boot/ipl_report.c 		ipl_cert_list_size += sizeof(unsigned int) + cert->len;
cert               65 arch/s390/boot/ipl_report.c 	for_each_rb_entry(cert, certs)
cert               66 arch/s390/boot/ipl_report.c 		if (intersects(safe_addr, size, cert->addr, cert->len)) {
cert               67 arch/s390/boot/ipl_report.c 			safe_addr = cert->addr + cert->len;
cert               87 arch/s390/boot/ipl_report.c 	struct ipl_rb_certificate_entry *cert;
cert               91 arch/s390/boot/ipl_report.c 	for_each_rb_entry(cert, certs) {
cert               92 arch/s390/boot/ipl_report.c 		*(unsigned int *) ptr = cert->len;
cert               94 arch/s390/boot/ipl_report.c 		memcpy(ptr, (void *) cert->addr, cert->len);
cert               95 arch/s390/boot/ipl_report.c 		ptr += cert->len;
cert              109 arch/s390/include/asm/ipl.h 			     unsigned char flags, unsigned short cert);
cert             1715 arch/s390/kernel/ipl.c 			     unsigned char flags, unsigned short cert)
cert             1727 arch/s390/kernel/ipl.c 	comp->entry.certificate_index = cert;
cert             1737 arch/s390/kernel/ipl.c 	struct ipl_report_certificate *cert;
cert             1739 arch/s390/kernel/ipl.c 	cert = vzalloc(sizeof(*cert));
cert             1740 arch/s390/kernel/ipl.c 	if (!cert)
cert             1742 arch/s390/kernel/ipl.c 	list_add_tail(&cert->list, &report->certificates);
cert             1744 arch/s390/kernel/ipl.c 	cert->entry.addr = addr;
cert             1745 arch/s390/kernel/ipl.c 	cert->entry.len = len;
cert             1746 arch/s390/kernel/ipl.c 	cert->key = key;
cert             1748 arch/s390/kernel/ipl.c 	report->size += sizeof(cert->entry);
cert             1749 arch/s390/kernel/ipl.c 	report->size += cert->entry.len;
cert             1776 arch/s390/kernel/ipl.c 	struct ipl_report_certificate *cert;
cert             1812 arch/s390/kernel/ipl.c 	list_for_each_entry(cert, &report->certificates, list) {
cert             1813 arch/s390/kernel/ipl.c 		memcpy(ptr, &cert->entry, sizeof(cert->entry));
cert             1814 arch/s390/kernel/ipl.c 		ptr += sizeof(cert->entry);
cert             1819 arch/s390/kernel/ipl.c 	list_for_each_entry(cert, &report->certificates, list) {
cert             1820 arch/s390/kernel/ipl.c 		memcpy(ptr, cert->key, cert->entry.len);
cert             1821 arch/s390/kernel/ipl.c 		ptr += cert->entry.len;
cert             1831 arch/s390/kernel/ipl.c 	struct ipl_report_certificate *cert, *ncert;
cert             1836 arch/s390/kernel/ipl.c 	list_for_each_entry_safe(cert, ncert, &report->certificates, list)
cert             1837 arch/s390/kernel/ipl.c 		vfree(cert);
cert               59 crypto/asymmetric_keys/pkcs7_parser.c 	struct x509_certificate *cert;
cert               64 crypto/asymmetric_keys/pkcs7_parser.c 			cert = pkcs7->certs;
cert               65 crypto/asymmetric_keys/pkcs7_parser.c 			pkcs7->certs = cert->next;
cert               66 crypto/asymmetric_keys/pkcs7_parser.c 			x509_free_certificate(cert);
cert               69 crypto/asymmetric_keys/pkcs7_parser.c 			cert = pkcs7->crl;
cert               70 crypto/asymmetric_keys/pkcs7_parser.c 			pkcs7->crl = cert->next;
cert               71 crypto/asymmetric_keys/pkcs7_parser.c 			x509_free_certificate(cert);
cert              157 crypto/asymmetric_keys/pkcs7_parser.c 		struct x509_certificate *cert = ctx->certs;
cert              158 crypto/asymmetric_keys/pkcs7_parser.c 		ctx->certs = cert->next;
cert              159 crypto/asymmetric_keys/pkcs7_parser.c 		x509_free_certificate(cert);
cert               20 crypto/asymmetric_keys/x509_cert_parser.c 	struct x509_certificate	*cert;		/* Certificate being constructed */
cert               46 crypto/asymmetric_keys/x509_cert_parser.c void x509_free_certificate(struct x509_certificate *cert)
cert               48 crypto/asymmetric_keys/x509_cert_parser.c 	if (cert) {
cert               49 crypto/asymmetric_keys/x509_cert_parser.c 		public_key_free(cert->pub);
cert               50 crypto/asymmetric_keys/x509_cert_parser.c 		public_key_signature_free(cert->sig);
cert               51 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert->issuer);
cert               52 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert->subject);
cert               53 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert->id);
cert               54 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert->skid);
cert               55 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert);
cert               65 crypto/asymmetric_keys/x509_cert_parser.c 	struct x509_certificate *cert;
cert               71 crypto/asymmetric_keys/x509_cert_parser.c 	cert = kzalloc(sizeof(struct x509_certificate), GFP_KERNEL);
cert               72 crypto/asymmetric_keys/x509_cert_parser.c 	if (!cert)
cert               74 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub = kzalloc(sizeof(struct public_key), GFP_KERNEL);
cert               75 crypto/asymmetric_keys/x509_cert_parser.c 	if (!cert->pub)
cert               77 crypto/asymmetric_keys/x509_cert_parser.c 	cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL);
cert               78 crypto/asymmetric_keys/x509_cert_parser.c 	if (!cert->sig)
cert               84 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert = cert;
cert              105 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL);
cert              106 crypto/asymmetric_keys/x509_cert_parser.c 	if (!cert->pub->key)
cert              109 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub->keylen = ctx->key_size;
cert              111 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub->params = kmemdup(ctx->params, ctx->params_size, GFP_KERNEL);
cert              112 crypto/asymmetric_keys/x509_cert_parser.c 	if (!cert->pub->params)
cert              115 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub->paramlen = ctx->params_size;
cert              116 crypto/asymmetric_keys/x509_cert_parser.c 	cert->pub->algo = ctx->key_algo;
cert              119 crypto/asymmetric_keys/x509_cert_parser.c 	ret = x509_get_sig_params(cert);
cert              124 crypto/asymmetric_keys/x509_cert_parser.c 	kid = asymmetric_key_generate_id(cert->raw_serial,
cert              125 crypto/asymmetric_keys/x509_cert_parser.c 					 cert->raw_serial_size,
cert              126 crypto/asymmetric_keys/x509_cert_parser.c 					 cert->raw_issuer,
cert              127 crypto/asymmetric_keys/x509_cert_parser.c 					 cert->raw_issuer_size);
cert              132 crypto/asymmetric_keys/x509_cert_parser.c 	cert->id = kid;
cert              135 crypto/asymmetric_keys/x509_cert_parser.c 	ret = x509_check_for_self_signed(cert);
cert              140 crypto/asymmetric_keys/x509_cert_parser.c 	return cert;
cert              145 crypto/asymmetric_keys/x509_cert_parser.c 	x509_free_certificate(cert);
cert              184 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->tbs = value - hdrlen;
cert              185 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->tbs_size = vlen + hdrlen;
cert              207 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "md4";
cert              211 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "sha1";
cert              215 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "sha256";
cert              219 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "sha384";
cert              223 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "sha512";
cert              227 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "sha224";
cert              231 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "streebog256";
cert              235 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->sig->hash_algo = "streebog512";
cert              240 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->pkey_algo = "rsa";
cert              241 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->encoding = "pkcs1";
cert              245 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->pkey_algo = "ecrdsa";
cert              246 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->encoding = "raw";
cert              268 crypto/asymmetric_keys/x509_cert_parser.c 	if (strcmp(ctx->cert->sig->pkey_algo, "rsa") == 0 ||
cert              269 crypto/asymmetric_keys/x509_cert_parser.c 	    strcmp(ctx->cert->sig->pkey_algo, "ecrdsa") == 0) {
cert              278 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_sig = value;
cert              279 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_sig_size = vlen;
cert              291 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_serial = value;
cert              292 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_serial_size = vlen;
cert              408 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_issuer = value;
cert              409 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_issuer_size = vlen;
cert              410 crypto/asymmetric_keys/x509_cert_parser.c 	return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->issuer, vlen);
cert              418 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_subject = value;
cert              419 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->raw_subject_size = vlen;
cert              420 crypto/asymmetric_keys/x509_cert_parser.c 	return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen);
cert              437 crypto/asymmetric_keys/x509_cert_parser.c 	if (!ctx->cert->raw_subject || ctx->key)
cert              455 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->pub->pkey_algo = "rsa";
cert              458 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->pub->pkey_algo = "ecrdsa";
cert              488 crypto/asymmetric_keys/x509_cert_parser.c 		if (ctx->cert->skid || vlen < 3)
cert              495 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->raw_skid_size = vlen;
cert              496 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->raw_skid = v;
cert              500 crypto/asymmetric_keys/x509_cert_parser.c 		ctx->cert->skid = kid;
cert              615 crypto/asymmetric_keys/x509_cert_parser.c 	return x509_decode_time(&ctx->cert->valid_from, hdrlen, tag, value, vlen);
cert              623 crypto/asymmetric_keys/x509_cert_parser.c 	return x509_decode_time(&ctx->cert->valid_to, hdrlen, tag, value, vlen);
cert              638 crypto/asymmetric_keys/x509_cert_parser.c 	if (ctx->cert->sig->auth_ids[1])
cert              645 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->auth_ids[1] = kid;
cert              677 crypto/asymmetric_keys/x509_cert_parser.c 	if (!ctx->akid_raw_issuer || ctx->cert->sig->auth_ids[0])
cert              688 crypto/asymmetric_keys/x509_cert_parser.c 	ctx->cert->sig->auth_ids[0] = kid;
cert               47 crypto/asymmetric_keys/x509_parser.h extern void x509_free_certificate(struct x509_certificate *cert);
cert               56 crypto/asymmetric_keys/x509_parser.h extern int x509_get_sig_params(struct x509_certificate *cert);
cert               57 crypto/asymmetric_keys/x509_parser.h extern int x509_check_for_self_signed(struct x509_certificate *cert);
cert               23 crypto/asymmetric_keys/x509_public_key.c int x509_get_sig_params(struct x509_certificate *cert)
cert               25 crypto/asymmetric_keys/x509_public_key.c 	struct public_key_signature *sig = cert->sig;
cert               33 crypto/asymmetric_keys/x509_public_key.c 	if (!cert->pub->pkey_algo)
cert               34 crypto/asymmetric_keys/x509_public_key.c 		cert->unsupported_key = true;
cert               37 crypto/asymmetric_keys/x509_public_key.c 		cert->unsupported_sig = true;
cert               41 crypto/asymmetric_keys/x509_public_key.c 		cert->unsupported_sig = true;
cert               45 crypto/asymmetric_keys/x509_public_key.c 	sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL);
cert               49 crypto/asymmetric_keys/x509_public_key.c 	sig->s_size = cert->raw_sig_size;
cert               57 crypto/asymmetric_keys/x509_public_key.c 			cert->unsupported_sig = true;
cert               77 crypto/asymmetric_keys/x509_public_key.c 	ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest);
cert               85 crypto/asymmetric_keys/x509_public_key.c 		cert->blacklisted = true;
cert              101 crypto/asymmetric_keys/x509_public_key.c int x509_check_for_self_signed(struct x509_certificate *cert)
cert              107 crypto/asymmetric_keys/x509_public_key.c 	if (cert->raw_subject_size != cert->raw_issuer_size ||
cert              108 crypto/asymmetric_keys/x509_public_key.c 	    memcmp(cert->raw_subject, cert->raw_issuer,
cert              109 crypto/asymmetric_keys/x509_public_key.c 		   cert->raw_issuer_size) != 0)
cert              112 crypto/asymmetric_keys/x509_public_key.c 	if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) {
cert              116 crypto/asymmetric_keys/x509_public_key.c 		bool a = asymmetric_key_id_same(cert->skid, cert->sig->auth_ids[1]);
cert              117 crypto/asymmetric_keys/x509_public_key.c 		bool b = asymmetric_key_id_same(cert->id, cert->sig->auth_ids[0]);
cert              124 crypto/asymmetric_keys/x509_public_key.c 		    cert->sig->auth_ids[0] && cert->sig->auth_ids[1])
cert              129 crypto/asymmetric_keys/x509_public_key.c 	if (strcmp(cert->pub->pkey_algo, cert->sig->pkey_algo) != 0)
cert              132 crypto/asymmetric_keys/x509_public_key.c 	ret = public_key_verify_signature(cert->pub, cert->sig);
cert              135 crypto/asymmetric_keys/x509_public_key.c 			cert->unsupported_sig = true;
cert              142 crypto/asymmetric_keys/x509_public_key.c 	cert->self_signed = true;
cert              159 crypto/asymmetric_keys/x509_public_key.c 	struct x509_certificate *cert;
cert              165 crypto/asymmetric_keys/x509_public_key.c 	cert = x509_cert_parse(prep->data, prep->datalen);
cert              166 crypto/asymmetric_keys/x509_public_key.c 	if (IS_ERR(cert))
cert              167 crypto/asymmetric_keys/x509_public_key.c 		return PTR_ERR(cert);
cert              169 crypto/asymmetric_keys/x509_public_key.c 	pr_devel("Cert Issuer: %s\n", cert->issuer);
cert              170 crypto/asymmetric_keys/x509_public_key.c 	pr_devel("Cert Subject: %s\n", cert->subject);
cert              172 crypto/asymmetric_keys/x509_public_key.c 	if (cert->unsupported_key) {
cert              177 crypto/asymmetric_keys/x509_public_key.c 	pr_devel("Cert Key Algo: %s\n", cert->pub->pkey_algo);
cert              178 crypto/asymmetric_keys/x509_public_key.c 	pr_devel("Cert Valid period: %lld-%lld\n", cert->valid_from, cert->valid_to);
cert              180 crypto/asymmetric_keys/x509_public_key.c 	cert->pub->id_type = "X509";
cert              182 crypto/asymmetric_keys/x509_public_key.c 	if (cert->unsupported_sig) {
cert              183 crypto/asymmetric_keys/x509_public_key.c 		public_key_signature_free(cert->sig);
cert              184 crypto/asymmetric_keys/x509_public_key.c 		cert->sig = NULL;
cert              187 crypto/asymmetric_keys/x509_public_key.c 			 cert->sig->pkey_algo, cert->sig->hash_algo);
cert              192 crypto/asymmetric_keys/x509_public_key.c 	if (cert->blacklisted)
cert              196 crypto/asymmetric_keys/x509_public_key.c 	sulen = strlen(cert->subject);
cert              197 crypto/asymmetric_keys/x509_public_key.c 	if (cert->raw_skid) {
cert              198 crypto/asymmetric_keys/x509_public_key.c 		srlen = cert->raw_skid_size;
cert              199 crypto/asymmetric_keys/x509_public_key.c 		q = cert->raw_skid;
cert              201 crypto/asymmetric_keys/x509_public_key.c 		srlen = cert->raw_serial_size;
cert              202 crypto/asymmetric_keys/x509_public_key.c 		q = cert->raw_serial;
cert              209 crypto/asymmetric_keys/x509_public_key.c 	p = memcpy(desc, cert->subject, sulen);
cert              219 crypto/asymmetric_keys/x509_public_key.c 	kids->id[0] = cert->id;
cert              220 crypto/asymmetric_keys/x509_public_key.c 	kids->id[1] = cert->skid;
cert              226 crypto/asymmetric_keys/x509_public_key.c 	prep->payload.data[asym_crypto] = cert->pub;
cert              227 crypto/asymmetric_keys/x509_public_key.c 	prep->payload.data[asym_auth] = cert->sig;
cert              232 crypto/asymmetric_keys/x509_public_key.c 	cert->pub = NULL;
cert              233 crypto/asymmetric_keys/x509_public_key.c 	cert->id = NULL;
cert              234 crypto/asymmetric_keys/x509_public_key.c 	cert->skid = NULL;
cert              235 crypto/asymmetric_keys/x509_public_key.c 	cert->sig = NULL;
cert              242 crypto/asymmetric_keys/x509_public_key.c 	x509_free_certificate(cert);
cert               19 drivers/staging/greybus/Documentation/firmware/authenticate.c struct cap_ioc_get_ims_certificate cert = {
cert               66 drivers/staging/greybus/Documentation/firmware/authenticate.c 	ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert);
cert               73 drivers/staging/greybus/Documentation/firmware/authenticate.c 	printf("IMS Certificate size: %d\n", cert.cert_size);
cert              118 scripts/extract-cert.c 			X509 *cert;
cert              122 scripts/extract-cert.c 		parms.cert = NULL;
cert              135 scripts/extract-cert.c 		ERR(!parms.cert, "Get X.509 from PKCS#11");
cert              136 scripts/extract-cert.c 		write_cert(parms.cert);
cert              281 scripts/insert-sys-cert.c 	char *cert;
cert              310 scripts/insert-sys-cert.c 	cert = read_file(cert_file, &cert_size);
cert              311 scripts/insert-sys-cert.c 	if (!cert)
cert              390 scripts/insert-sys-cert.c 	    strncmp(cert_sym.content, cert, cert_size) == 0) {
cert              398 scripts/insert-sys-cert.c 	memcpy(cert_sym.content, cert, cert_size);