| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_verify.c | 22 static int pkcs7_digest(struct pkcs7_message *pkcs7, in pkcs7_digest() argument 62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, in pkcs7_digest() 125 int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf, u32 *len, in pkcs7_get_digest() argument 128 struct pkcs7_signed_info *sinfo = pkcs7->signed_infos; in pkcs7_get_digest() 137 ret = pkcs7_digest(pkcs7, sinfo); in pkcs7_get_digest() 159 static int pkcs7_find_key(struct pkcs7_message *pkcs7, in pkcs7_find_key() argument 167 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 200 static int pkcs7_verify_sig_chain(struct pkcs7_message *pkcs7, in pkcs7_verify_sig_chain() argument 210 for (p = pkcs7->certs; p; p = p->next) in pkcs7_verify_sig_chain() 261 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain() [all …]
|
| H A D | pkcs7_parser.c | 57 void pkcs7_free_message(struct pkcs7_message *pkcs7) in pkcs7_free_message() argument 62 if (pkcs7) { in pkcs7_free_message() 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 68 while (pkcs7->crl) { in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 73 while (pkcs7->signed_infos) { in pkcs7_free_message() 74 sinfo = pkcs7->signed_infos; in pkcs7_free_message() [all …]
|
| H A D | pkcs7_trust.c | 22 static int pkcs7_validate_trust_one(struct pkcs7_message *pkcs7, in pkcs7_validate_trust_one() argument 158 int pkcs7_validate_trust(struct pkcs7_message *pkcs7, in pkcs7_validate_trust() argument 166 for (p = pkcs7->certs; p; p = p->next) in pkcs7_validate_trust() 169 for (sinfo = pkcs7->signed_infos; sinfo; sinfo = sinfo->next) { in pkcs7_validate_trust() 170 ret = pkcs7_validate_trust_one(pkcs7, sinfo, trust_keyring); in pkcs7_validate_trust()
|
| H A D | Makefile | 51 pkcs7.asn1.o \ 56 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h 57 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
|
| H A D | verify_pefile.c | 126 const u8 *pkcs7; in pefile_strip_sig_wrapper() local 168 pkcs7 = pebuf + ctx->sig_offset; in pefile_strip_sig_wrapper() 169 if (pkcs7[0] != (ASN1_CONS_BIT | ASN1_SEQ)) in pefile_strip_sig_wrapper() 172 switch (pkcs7[1]) { in pefile_strip_sig_wrapper() 174 len = pkcs7[1] + 2; in pefile_strip_sig_wrapper() 179 len = pkcs7[2] + 3; in pefile_strip_sig_wrapper() 182 len = ((pkcs7[2] << 8) | pkcs7[3]) + 4; in pefile_strip_sig_wrapper()
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | system_keyring.c | 161 struct pkcs7_message *pkcs7, in verify_pkcs7_message_sig() argument 172 if (data && pkcs7_supply_detached_data(pkcs7, data, len) < 0) { in verify_pkcs7_message_sig() 178 ret = pkcs7_verify(pkcs7, usage); in verify_pkcs7_message_sig() 202 ret = is_key_on_revocation_list(pkcs7); in verify_pkcs7_message_sig() 208 ret = pkcs7_validate_trust(pkcs7, trusted_keys); in verify_pkcs7_message_sig() 218 ret = pkcs7_get_content_data(pkcs7, &data, &len, &asn1hdrlen); in verify_pkcs7_message_sig() 254 struct pkcs7_message *pkcs7; in verify_pkcs7_signature() local 257 pkcs7 = pkcs7_parse_message(raw_pkcs7, pkcs7_len); in verify_pkcs7_signature() 258 if (IS_ERR(pkcs7)) in verify_pkcs7_signature() 259 return PTR_ERR(pkcs7); in verify_pkcs7_signature() [all …]
|
| H A D | blacklist.c | 183 int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument 187 ret = pkcs7_validate_trust(pkcs7, blacklist_keyring); in is_key_on_revocation_list()
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | pkcs7.h | 23 extern void pkcs7_free_message(struct pkcs7_message *pkcs7); 25 extern int pkcs7_get_content_data(const struct pkcs7_message *pkcs7, 32 extern int pkcs7_validate_trust(struct pkcs7_message *pkcs7, 38 extern int pkcs7_verify(struct pkcs7_message *pkcs7, 41 extern int pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, 44 extern int pkcs7_get_digest(struct pkcs7_message *pkcs7, const u8 **buf,
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/gnutls/gnutls/ |
| H A D | CVE-2022-2509.patch | 11 lib/x509/pkcs7.c | 3 +- 13 tests/pkcs7-verify-double-free.c | 215 +++++++++++++++++++++++++++++++ 15 create mode 100644 tests/pkcs7-verify-double-free.c 25 +** libgnutls: Fixed double free during verification of pkcs7 signatures. 32 diff --git a/lib/x509/pkcs7.c b/lib/x509/pkcs7.c 34 --- a/lib/x509/pkcs7.c 35 +++ b/lib/x509/pkcs7.c 36 @@ -1318,7 +1318,8 @@ gnutls_x509_crt_t find_signer(gnutls_pkcs7_t pkcs7, gnutls_x509_trust_list_t … 37 issuer = find_verified_issuer_of(pkcs7, issuer, purpose, vflags); 55 + x509cert-dntypes id-on-xmppAddr tls13-compat-mode ciphersuite-name pkcs7-verify-double-free [all …]
|
| /OK3568_Linux_fs/kernel/include/keys/ |
| H A D | system_keyring.h | 34 extern struct pkcs7_message *pkcs7; 55 extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7); 61 static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) in is_key_on_revocation_list() argument
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | sign-file.c | 234 PKCS7 *pkcs7 = NULL; in main() local 329 pkcs7 = PKCS7_sign(x509, private_key, NULL, bm, in main() 332 ERR(!pkcs7, "PKCS7_sign"); in main() 347 ERR(i2d_PKCS7_bio(b, pkcs7) < 0, in main() 379 ERR(i2d_PKCS7_bio(bd, pkcs7) < 0, "%s", dest_name); in main()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-gnome/libjcat/ |
| H A D | libjcat_0.1.11.bb | 21 pkcs7 \ 25 PACKAGECONFIG[pkcs7] = "-Dpkcs7=true,-Dpkcs7=false,gnutls gnutls-native"
|
| /OK3568_Linux_fs/kernel/ |
| H A D | .gitignore | 48 crypto/asymmetric_keys/pkcs7.asn1.c 49 crypto/asymmetric_keys/pkcs7.asn1.h
|
| H A D | MAINTAINERS | 2857 F: include/crypto/pkcs7.h
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | verification.h | 46 struct pkcs7_message *pkcs7,
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/iwd/ |
| H A D | iwd_1.26.bb | 52 kernel-module-pkcs7-message \
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 134 the pkcs7 signature of the roothash. The pkcs7 signature is used to validate
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/ |
| H A D | strongswan_5.9.6.bb | 158 ${PN}-plugin-pkcs7 \
|
| /OK3568_Linux_fs/output/sessions/2025-06-06_01-57-56/ |
| H A D | 10-kernel-build_2025-06-06_01-57-58.log | |
| H A D | build_2025-06-06_01-57-58.log | |
| H A D | 10-kernel-build.log | |
| H A D | build.log | |
| /OK3568_Linux_fs/yocto/poky/meta/lib/oeqa/files/ |
| H A D | buildhistory_filelist1.txt | 4258 -rw-r--r-- root root 11590 ./usr/include/openssl/pkcs7.h 8341 -rw-r--r-- root root 1090 ./usr/share/mime/application/pkcs7-mime.xml 8342 -rw-r--r-- root root 3684 ./usr/share/mime/application/pkcs7-signature.xml 8656 -rw-r--r-- root root 3264 ./usr/share/mime/application/x-pkcs7-certificates.xml
|
| H A D | buildhistory_filelist2.txt | 4259 -rw-r--r-- root root 11590 ./usr/include/openssl/pkcs7.h 8344 -rw-r--r-- root root 1090 ./usr/share/mime/application/pkcs7-mime.xml 8345 -rw-r--r-- root root 3684 ./usr/share/mime/application/pkcs7-signature.xml 8659 -rw-r--r-- root root 3264 ./usr/share/mime/application/x-pkcs7-certificates.xml
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |