| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | x509_public_key.c | 23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 33 sig->data = cert->tbs; in x509_get_sig_params() 34 sig->data_size = cert->tbs_size; in x509_get_sig_params() 36 if (!cert->pub->pkey_algo) in x509_get_sig_params() 37 cert->unsupported_key = true; in x509_get_sig_params() 40 cert->unsupported_sig = true; in x509_get_sig_params() 44 cert->unsupported_sig = true; in x509_get_sig_params() 48 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 52 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() [all …]
|
| H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 48 if (cert) { in x509_free_certificate() 49 public_key_free(cert->pub); in x509_free_certificate() 50 public_key_signature_free(cert->sig); in x509_free_certificate() 51 kfree(cert->issuer); in x509_free_certificate() 52 kfree(cert->subject); in x509_free_certificate() 53 kfree(cert->id); in x509_free_certificate() 54 kfree(cert->skid); in x509_free_certificate() 55 kfree(cert); in x509_free_certificate() [all …]
|
| H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message()
|
| H A D | x509_parser.h | 47 extern void x509_free_certificate(struct x509_certificate *cert); 56 extern int x509_get_sig_params(struct x509_certificate *cert); 57 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
| /OK3568_Linux_fs/kernel/arch/s390/boot/ |
| H A D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 65 for_each_rb_entry(cert, certs) in find_bootdata_space() 66 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 67 safe_addr = cert->addr + cert->len; in find_bootdata_space() 87 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 91 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 92 *(unsigned int *) ptr = cert->len; in copy_certificates_bootdata() 94 memcpy(ptr, (void *) cert->addr, cert->len); in copy_certificates_bootdata() [all …]
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | Makefile | 16 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 17 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 18 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 24 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 25 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| H A D | extract-cert.c | 131 X509 *cert; in main() 135 parms.cert = NULL; in main() 148 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 149 write_cert(parms.cert); in main()
|
| H A D | .gitignore | 9 extract-cert 11 insert-sys-cert
|
| H A D | insert-sys-cert.c | 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 233 bool WvOCSPResp::signedbycert(const WvX509 &cert) const 235 - EVP_PKEY *skey = X509_get_pubkey(cert.cert); 239 + sk_X509_push(sk, cert.cert); 245 @@ -131,33 +132,15 @@ bool WvOCSPResp::signedbycert(const WvX509 &cert) const 368 - ASN1_BIT_STRING *pk = cert->cert_info->key->public_key; 370 + ASN1_BIT_STRING *pk = X509_get0_pubkey_bitstr(cert); 380 X509_add_ext(cert, ext, -1); 395 + uint32_t ex_flags = X509_get_extension_flags(cert); 396 + uint32_t ex_kusage = X509_get_key_usage(cert); 397 if (cert == unsignedcert.cert) [all …]
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Makefile | 26 cmd_extract_certs = scripts/extract-cert $(2) $@ 29 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED… 113 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE 124 cmd_extract_certs = scripts/extract-cert $(2) $@ 127 $(obj)/x509_revocation_list: scripts/extract-cert $(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(SYSTEM_REVOC…
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/ |
| H A D | regression_8100.c | 228 const char *cert) in verify_cert() argument 242 if (!ADBG_EXPECT_TRUE(c, get_cert(c, cert, &crt))) in verify_cert() 260 const char *mid, const char *cert) in verify_cert() argument 265 UNUSED(cert); in verify_cert() 279 char cert[2048]; in test_8103() local 294 op.params[1].tmpref.buffer = cert; in test_8103() 295 op.params[1].tmpref.size = sizeof(cert); in test_8103()
|
| H A D | CMakeLists.txt | 34 EMBED_8100FILE(ca_crt ${OPTEE_TEST_ROOT_DIR}/cert/ca.crt) 35 EMBED_8100FILE(mid_crt ${OPTEE_TEST_ROOT_DIR}/cert/mid.crt) 36 EMBED_8100FILE(my_crt ${OPTEE_TEST_ROOT_DIR}/cert/my.crt) 37 EMBED_8100FILE(my_csr ${OPTEE_TEST_ROOT_DIR}/cert/my.csr)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/uw-imap/uw-imap/ |
| H A D | 0001-Support-OpenSSL-1.1.patch | 46 (err = ssl_validate_cert (cert = SSL_get_peer_certificate (stream->con), 49 sprintf (tmp,"*%.128s: %.255s",err,cert ? cert->name : "???"); 61 static char *ssl_validate_cert (X509 *cert,char *host) 64 @@ -342,6 +353,7 @@ static char *ssl_validate_cert (X509 *cert,char *host)
|
| /OK3568_Linux_fs/kernel/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
| H A D | 0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 9 openssl ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key 'whatever' -out client.crt -ext… 39 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PASSWORD_CA) -out server… 40 + @[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PA… 48 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PASSWORD_CA) -out client… 49 + @[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PA…
|
| H A D | 0001-raddb-certs-Makefile-fix-the-occasional-verification.patch | 59 - $(OPENSSL) ca -gencrl -keyfile ca.key -cert ca.pem -config ./ca.cnf -out ca-crl.pem -key $(PASSWO… 61 + @[ -f ca-crl.pem ] || $(OPENSSL) ca -gencrl -keyfile ca.key -cert ca.pem -config ./ca.cnf -out ca… 75 …@[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PAS… 97 …@[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PAS… 119 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in inner-server.csr -key $(PASSWORD_CA) -out … 120 + @[ -f inner-server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in inner-server.cs…
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/ |
| H A D | sub.mk | 29 $(eval $(call crypt_embed_file,ca_crt,../../cert/ca.crt)) 30 $(eval $(call crypt_embed_file,mid_crt,../../cert/mid.crt)) 31 $(eval $(call crypt_embed_file,mid_key,../../cert/mid.key))
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/serf/serf/ |
| H A D | 0001-buckets-ssl_buckets.c-do-not-use-ERR_GET_FUNC.patch | 19 @@ -1325,8 +1325,7 @@ static int ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) 23 - printf("OpenSSL cert error: %d %d %d\n", ERR_GET_LIB(err), 25 + printf("OpenSSL cert error: %d %d\n", ERR_GET_LIB(err),
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | ipl.c | 2088 unsigned char flags, unsigned short cert) in ipl_report_add_component() argument 2100 comp->entry.certificate_index = cert; in ipl_report_add_component() 2110 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2112 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2113 if (!cert) in ipl_report_add_certificate() 2115 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2117 cert->entry.addr = addr; in ipl_report_add_certificate() 2118 cert->entry.len = len; in ipl_report_add_certificate() 2119 cert->key = key; in ipl_report_add_certificate() 2121 report->size += sizeof(cert->entry); in ipl_report_add_certificate() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | cms.h | 185 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 188 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 202 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 253 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 254 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 274 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 358 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 366 X509 *cert);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ |
| H A D | Android.mk | 105 $(eval $(call my-embed-file,regression_8100_ca_crt,cert/ca.crt)) 106 $(eval $(call my-embed-file,regression_8100_mid_crt,cert/mid.crt)) 107 $(eval $(call my-embed-file,regression_8100_my_crt,cert/my.crt)) 108 $(eval $(call my-embed-file,regression_8100_my_csr,cert/my.csr))
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0087-backend-vnc-enable-TLS-support.patch | 26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n" 35 + { WESTON_OPTION_STRING, "vnc-tls-cert", 0, &config.server_cert }, 76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 122 +\fB\-\-vnc\-tls\-cert\fR=\fIfile\fR
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0088-backend-vnc-enable-TLS-support.patch | 26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n" 35 + { WESTON_OPTION_STRING, "vnc-tls-cert", 0, &config.server_cert }, 76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 122 +\fB\-\-vnc\-tls\-cert\fR=\fIfile\fR
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27781.patch | 4 Subject: [PATCH] nss: return error if seemingly stuck in a cert loop 33 cert2 = CERT_FindCertIssuer(cert, now, certUsageSSLCA);
|