Lines Matching refs:cert
20 struct x509_certificate *cert; /* Certificate being constructed */ member
46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument
48 if (cert) { in x509_free_certificate()
49 public_key_free(cert->pub); in x509_free_certificate()
50 public_key_signature_free(cert->sig); in x509_free_certificate()
51 kfree(cert->issuer); in x509_free_certificate()
52 kfree(cert->subject); in x509_free_certificate()
53 kfree(cert->id); in x509_free_certificate()
54 kfree(cert->skid); in x509_free_certificate()
55 kfree(cert); in x509_free_certificate()
65 struct x509_certificate *cert; in x509_cert_parse() local
71 cert = kzalloc(sizeof(struct x509_certificate), GFP_KERNEL); in x509_cert_parse()
72 if (!cert) in x509_cert_parse()
74 cert->pub = kzalloc(sizeof(struct public_key), GFP_KERNEL); in x509_cert_parse()
75 if (!cert->pub) in x509_cert_parse()
77 cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL); in x509_cert_parse()
78 if (!cert->sig) in x509_cert_parse()
84 ctx->cert = cert; in x509_cert_parse()
105 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse()
106 if (!cert->pub->key) in x509_cert_parse()
109 cert->pub->keylen = ctx->key_size; in x509_cert_parse()
111 cert->pub->params = kmemdup(ctx->params, ctx->params_size, GFP_KERNEL); in x509_cert_parse()
112 if (!cert->pub->params) in x509_cert_parse()
115 cert->pub->paramlen = ctx->params_size; in x509_cert_parse()
116 cert->pub->algo = ctx->key_algo; in x509_cert_parse()
119 ret = x509_get_sig_params(cert); in x509_cert_parse()
124 kid = asymmetric_key_generate_id(cert->raw_serial, in x509_cert_parse()
125 cert->raw_serial_size, in x509_cert_parse()
126 cert->raw_issuer, in x509_cert_parse()
127 cert->raw_issuer_size); in x509_cert_parse()
132 cert->id = kid; in x509_cert_parse()
135 ret = x509_check_for_self_signed(cert); in x509_cert_parse()
140 return cert; in x509_cert_parse()
145 x509_free_certificate(cert); in x509_cert_parse()
184 ctx->cert->tbs = value - hdrlen; in x509_note_tbs_certificate()
185 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate()
207 ctx->cert->sig->hash_algo = "md4"; in x509_note_pkey_algo()
211 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo()
215 ctx->cert->sig->hash_algo = "sha256"; in x509_note_pkey_algo()
219 ctx->cert->sig->hash_algo = "sha384"; in x509_note_pkey_algo()
223 ctx->cert->sig->hash_algo = "sha512"; in x509_note_pkey_algo()
227 ctx->cert->sig->hash_algo = "sha224"; in x509_note_pkey_algo()
231 ctx->cert->sig->hash_algo = "streebog256"; in x509_note_pkey_algo()
235 ctx->cert->sig->hash_algo = "streebog512"; in x509_note_pkey_algo()
239 ctx->cert->sig->hash_algo = "sm3"; in x509_note_pkey_algo()
244 ctx->cert->sig->pkey_algo = "rsa"; in x509_note_pkey_algo()
245 ctx->cert->sig->encoding = "pkcs1"; in x509_note_pkey_algo()
249 ctx->cert->sig->pkey_algo = "ecrdsa"; in x509_note_pkey_algo()
250 ctx->cert->sig->encoding = "raw"; in x509_note_pkey_algo()
254 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_pkey_algo()
255 ctx->cert->sig->encoding = "raw"; in x509_note_pkey_algo()
277 if (strcmp(ctx->cert->sig->pkey_algo, "rsa") == 0 || in x509_note_signature()
278 strcmp(ctx->cert->sig->pkey_algo, "ecrdsa") == 0 || in x509_note_signature()
279 strcmp(ctx->cert->sig->pkey_algo, "sm2") == 0) { in x509_note_signature()
288 ctx->cert->raw_sig = value; in x509_note_signature()
289 ctx->cert->raw_sig_size = vlen; in x509_note_signature()
301 ctx->cert->raw_serial = value; in x509_note_serial()
302 ctx->cert->raw_serial_size = vlen; in x509_note_serial()
418 ctx->cert->raw_issuer = value; in x509_note_issuer()
419 ctx->cert->raw_issuer_size = vlen; in x509_note_issuer()
420 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->issuer, vlen); in x509_note_issuer()
428 ctx->cert->raw_subject = value; in x509_note_subject()
429 ctx->cert->raw_subject_size = vlen; in x509_note_subject()
430 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject()
447 if (!ctx->cert->raw_subject || ctx->key) in x509_note_params()
466 ctx->cert->pub->pkey_algo = "rsa"; in x509_extract_key_data()
470 ctx->cert->pub->pkey_algo = "ecrdsa"; in x509_extract_key_data()
473 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
505 if (ctx->cert->skid || vlen < 3) in x509_process_extension()
512 ctx->cert->raw_skid_size = vlen; in x509_process_extension()
513 ctx->cert->raw_skid = v; in x509_process_extension()
517 ctx->cert->skid = kid; in x509_process_extension()
632 return x509_decode_time(&ctx->cert->valid_from, hdrlen, tag, value, vlen); in x509_note_not_before()
640 return x509_decode_time(&ctx->cert->valid_to, hdrlen, tag, value, vlen); in x509_note_not_after()
655 if (ctx->cert->sig->auth_ids[1]) in x509_akid_note_kid()
662 ctx->cert->sig->auth_ids[1] = kid; in x509_akid_note_kid()
694 if (!ctx->akid_raw_issuer || ctx->cert->sig->auth_ids[0]) in x509_akid_note_serial()
705 ctx->cert->sig->auth_ids[0] = kid; in x509_akid_note_serial()