Home
last modified time | relevance | path

Searched refs:signer (Results 1 – 25 of 30) sorted by relevance

12

/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A Dpkcs7_verify.c184 sinfo->signer = x509; in pkcs7_find_key()
204 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain()
224 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain()
250 x509->signer = x509; in pkcs7_verify_sig_chain()
304 x509->signer = p; in pkcs7_verify_sig_chain()
345 if (!sinfo->signer) in pkcs7_verify_one()
349 sinfo->signer->index, sinfo->index); in pkcs7_verify_one()
356 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one()
357 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one()
364 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
H A Dpkcs7_trust.c38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one()
68 if (x509->signer == x509) { in pkcs7_validate_trust_one()
127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one()
H A Dpkcs7_parser.h19 struct x509_certificate *signer; /* Signing certificate (in msg->certs) */ member
H A Dx509_parser.h14 struct x509_certificate *signer; /* Certificate that signed this one */ member
/OK3568_Linux_fs/external/security/rk_tee_user/v2/tools/ta_resign_tool-release/linux/
H A Dresign_ta.py84 signer = pkcs1_15.new(key)
88 sig_len = len(signer.sign(h))
99 sig = signer.sign(h)
114 signer = pkcs1_15.new(key)
118 signer = pss.new(key)
144 sig = signer.sign(h)
192 signer = pss.new(key)
193 sig = signer.sign(h)
/OK3568_Linux_fs/external/security/rk_tee_user/v1/tools/ta_resign_tool-release/linux/
H A Dresign_ta.py75 signer = PKCS1_v1_5.new(key)
79 sig_len = len(signer.sign(h))
90 sig = signer.sign(h)
104 signer = PKCS1_v1_5.new(key)
108 sig_len = len(signer.sign(h))
123 sig = signer.sign(h)
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb26 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
27 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
32 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
33 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'),
38 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND'))
39 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/scripts/
H A Dsign.py55 signer = PKCS1_v1_5.new(key)
59 sig_len = len(signer.sign(h))
70 sig = signer.sign(h)
/OK3568_Linux_fs/kernel/scripts/
H A Dget_maintainer.pl1576 foreach my $signer (@signature_lines) {
1577 $signer = deduplicate_email($signer);
1759 foreach my $signer (@commit_signers) {
1760 $signer = deduplicate_email($signer);
2135 my $signer = $signers[0];
2137 $signer = deduplicate_email($signer);
2140 foreach my $ref(@{$commit_signer_hash{$signer}}) {
2149 push(@{$commit_signer_hash{$signer}},
2224 foreach my $signer (@signers) {
2225 $signer = deduplicate_email($signer);
[all …]
/OK3568_Linux_fs/u-boot/scripts/
H A Dget_maintainer.pl1380 foreach my $signer (@signature_lines) {
1381 $signer = deduplicate_email($signer);
1913 my $signer = $signers[0];
1915 $signer = deduplicate_email($signer);
1918 foreach my $ref(@{$commit_signer_hash{$signer}}) {
1927 push(@{$commit_signer_hash{$signer}},
2002 foreach my $signer (@signers) {
2003 $signer = deduplicate_email($signer);
2165 foreach my $signer (@signers) {
2166 $signer = deduplicate_email($signer);
[all …]
/OK3568_Linux_fs/u-boot/doc/uImage.FIT/
H A Dverified-boot.txt25 Images are signed using a private key known only to the signer, but can
46 | signer | * | U-Boot |
62 The public key from the signer allows us to verify and therefore trust
73 The above method works for a signer providing images to a run-time U-Boot.
76 1. Master private key is used by the signer to sign a first-stage image.
H A Dsignature.txt84 allow the signer to operate. These should be added to the .its file.
103 - signer-name: Name of the signer (e.g. "mkimage")
105 - signer-version: Version string of the signer (e.g. "2013.01")
107 - comment: Additional information about the signer or image
116 For config bindings, these properties are added by the signer:
118 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
/OK3568_Linux_fs/yocto/poky/meta/classes/
H A Dsign_ipk.bbclass45 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
49 signer.detach_sign(ipk_to_sign,
H A Dsign_rpm.bbclass56 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
59 signer.sign_rpms(rpms,
H A Dsstate.bbclass378 signer = get_signer(d, 'local')
379 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")):
882 signer = get_signer(d, 'local')
886 signer.detach_sign(sstate_pkg, d.getVar('SSTATE_SIG_KEY', False), None,
/OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/rpm/
H A D__init__.py15 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
17 signer = None
25 if signer:
28 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'),
130 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND'))
132 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
/OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/ipk/
H A D__init__.py18 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
20 signer = None
53 if signer:
57 signer.detach_sign(f,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/scripts/
H A Dsign_encrypt.py238 signer = pss.new(key)
239 sig = signer.sign(h)
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/scripts/
H A Dsign_encrypt.py238 signer = pss.new(key)
239 sig = signer.sign(h)
/OK3568_Linux_fs/yocto/poky/meta/lib/oe/package_manager/deb/
H A D__init__.py84 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
86 signer = None
87 if signer:
89 signer.detach_sign(f,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/
H A Dcms.h264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
278 X509 **signer, X509_ALGOR **pdig,
H A Docsp.h435 X509 *signer,
483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
H A Dts.h532 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch265 + X509 *signer = NULL;
266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) {
267 + return WvX509(X509_dup(signer));
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/gnutls/gnutls/
H A DCVE-2022-2509.patch41 + if (prev && prev != signer)

12