| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_verify.c | 184 sinfo->signer = x509; in pkcs7_find_key() 204 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain() 224 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain() 250 x509->signer = x509; in pkcs7_verify_sig_chain() 304 x509->signer = p; in pkcs7_verify_sig_chain() 345 if (!sinfo->signer) in pkcs7_verify_one() 349 sinfo->signer->index, sinfo->index); in pkcs7_verify_one() 356 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one() 357 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one() 364 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
|
| H A D | pkcs7_trust.c | 38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 68 if (x509->signer == x509) { in pkcs7_validate_trust_one() 127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one()
|
| H A D | pkcs7_parser.h | 19 struct x509_certificate *signer; /* Signing certificate (in msg->certs) */ member
|
| H A D | x509_parser.h | 14 struct x509_certificate *signer; /* Certificate that signed this one */ member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/tools/ta_resign_tool-release/linux/ |
| H A D | resign_ta.py | 84 signer = pkcs1_15.new(key) 88 sig_len = len(signer.sign(h)) 99 sig = signer.sign(h) 114 signer = pkcs1_15.new(key) 118 signer = pss.new(key) 144 sig = signer.sign(h) 192 signer = pss.new(key) 193 sig = signer.sign(h)
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/tools/ta_resign_tool-release/linux/ |
| H A D | resign_ta.py | 75 signer = PKCS1_v1_5.new(key) 79 sig_len = len(signer.sign(h)) 90 sig = signer.sign(h) 104 signer = PKCS1_v1_5.new(key) 108 sig_len = len(signer.sign(h)) 123 sig = signer.sign(h)
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/ |
| H A D | signing-keys.bb | 26 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 27 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 32 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 33 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'), 38 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND')) 39 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/scripts/ |
| H A D | sign.py | 55 signer = PKCS1_v1_5.new(key) 59 sig_len = len(signer.sign(h)) 70 sig = signer.sign(h)
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | get_maintainer.pl | 1576 foreach my $signer (@signature_lines) { 1577 $signer = deduplicate_email($signer); 1759 foreach my $signer (@commit_signers) { 1760 $signer = deduplicate_email($signer); 2135 my $signer = $signers[0]; 2137 $signer = deduplicate_email($signer); 2140 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2149 push(@{$commit_signer_hash{$signer}}, 2224 foreach my $signer (@signers) { 2225 $signer = deduplicate_email($signer); [all …]
|
| /OK3568_Linux_fs/u-boot/scripts/ |
| H A D | get_maintainer.pl | 1380 foreach my $signer (@signature_lines) { 1381 $signer = deduplicate_email($signer); 1913 my $signer = $signers[0]; 1915 $signer = deduplicate_email($signer); 1918 foreach my $ref(@{$commit_signer_hash{$signer}}) { 1927 push(@{$commit_signer_hash{$signer}}, 2002 foreach my $signer (@signers) { 2003 $signer = deduplicate_email($signer); 2165 foreach my $signer (@signers) { 2166 $signer = deduplicate_email($signer); [all …]
|
| /OK3568_Linux_fs/u-boot/doc/uImage.FIT/ |
| H A D | verified-boot.txt | 25 Images are signed using a private key known only to the signer, but can 46 | signer | * | U-Boot | 62 The public key from the signer allows us to verify and therefore trust 73 The above method works for a signer providing images to a run-time U-Boot. 76 1. Master private key is used by the signer to sign a first-stage image.
|
| H A D | signature.txt | 84 allow the signer to operate. These should be added to the .its file. 103 - signer-name: Name of the signer (e.g. "mkimage") 105 - signer-version: Version string of the signer (e.g. "2013.01") 107 - comment: Additional information about the signer or image 116 For config bindings, these properties are added by the signer: 118 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
|
| /OK3568_Linux_fs/yocto/poky/meta/classes/ |
| H A D | sign_ipk.bbclass | 45 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 49 signer.detach_sign(ipk_to_sign,
|
| H A D | sign_rpm.bbclass | 56 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 59 signer.sign_rpms(rpms,
|
| H A D | sstate.bbclass | 378 signer = get_signer(d, 'local') 379 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")): 882 signer = get_signer(d, 'local') 886 signer.detach_sign(sstate_pkg, d.getVar('SSTATE_SIG_KEY', False), None,
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/rpm/ |
| H A D | __init__.py | 15 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 17 signer = None 25 if signer: 28 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'), 130 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND')) 132 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/ipk/ |
| H A D | __init__.py | 18 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 20 signer = None 53 if signer: 57 signer.detach_sign(f,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/scripts/ |
| H A D | sign_encrypt.py | 238 signer = pss.new(key) 239 sig = signer.sign(h)
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/scripts/ |
| H A D | sign_encrypt.py | 238 signer = pss.new(key) 239 sig = signer.sign(h)
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/deb/ |
| H A D | __init__.py | 84 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 86 signer = None 87 if signer: 89 signer.detach_sign(f,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | cms.h | 264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 278 X509 **signer, X509_ALGOR **pdig,
|
| H A D | ocsp.h | 435 X509 *signer, 483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
| H A D | ts.h | 532 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 265 + X509 *signer = NULL; 266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) { 267 + return WvX509(X509_dup(signer));
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/gnutls/gnutls/ |
| H A D | CVE-2022-2509.patch | 41 + if (prev && prev != signer)
|