/Linux-v4.19/security/keys/ |
D | request_key_auth.c | 156 struct key *authkey = NULL; in request_key_auth_new() local 204 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 208 if (IS_ERR(authkey)) { in request_key_auth_new() 209 ret = PTR_ERR(authkey); in request_key_auth_new() 214 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 218 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 219 return authkey; in request_key_auth_new() 222 key_put(authkey); in request_key_auth_new() 246 struct key *authkey; in key_get_instantiation_authkey() local 254 authkey = ERR_CAST(authkey_ref); in key_get_instantiation_authkey() [all …]
|
D | request_key.c | 35 kenter("{%d,%d},%d", cons->key->serial, cons->authkey->serial, error); in complete_request_key() 39 cons->authkey); in complete_request_key() 41 key_revoke(cons->authkey); in complete_request_key() 44 key_put(cons->authkey); in complete_request_key() 101 struct key *key = cons->key, *authkey = cons->authkey, *keyring, in call_sbin_request_key() local 108 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); in call_sbin_request_key() 128 ret = key_link(keyring, authkey); in call_sbin_request_key() 210 struct key *authkey; in construct_key() local 220 authkey = request_key_auth_new(key, callout_info, callout_len, in construct_key() 222 if (IS_ERR(authkey)) { in construct_key() [all …]
|
D | key.c | 425 struct key *authkey, in __key_instantiate_and_link() argument 460 if (authkey) in __key_instantiate_and_link() 461 key_revoke(authkey); in __key_instantiate_and_link() 499 struct key *authkey) in key_instantiate_and_link() argument 531 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 570 struct key *authkey) in key_reject_and_link() argument 608 if (authkey) in key_reject_and_link() 609 key_revoke(authkey); in key_reject_and_link()
|
D | keyctl.c | 1387 struct key *authkey; in keyctl_assume_authority() local 1406 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1407 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1408 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1412 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1414 ret = authkey->serial; in keyctl_assume_authority() 1415 key_put(authkey); in keyctl_assume_authority()
|
/Linux-v4.19/drivers/crypto/qce/ |
D | sha.h | 27 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 63 u8 *authkey; member
|
D | sha.c | 87 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 90 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 367 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 370 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 404 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
D | common.c | 265 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash()
|
/Linux-v4.19/include/crypto/ |
D | authenc.h | 27 const u8 *authkey; member
|
/Linux-v4.19/fs/nfs/ |
D | nfs4idmap.c | 611 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 615 authkey); in nfs_idmap_instantiate() 620 struct key *key, struct key *authkey) in nfs_idmap_read_and_verify_message() argument 636 ret = nfs_idmap_instantiate(key, authkey, id_str, len); in nfs_idmap_read_and_verify_message() 642 ret = nfs_idmap_instantiate(key, authkey, im->im_name, len); in nfs_idmap_read_and_verify_message() 693 cons->key, cons->authkey); in idmap_pipe_downcall()
|
/Linux-v4.19/drivers/crypto/bcm/ |
D | cipher.c | 754 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req() 1360 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req() 2033 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue() 2150 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init() 2379 memcpy(ctx->authkey, key, keylen); in ahash_setkey() 2432 rc = do_shash("md5", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2436 rc = do_shash("sha1", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2440 rc = do_shash("sha224", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2444 rc = do_shash("sha256", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2448 rc = do_shash("sha384", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() [all …]
|
D | cipher.h | 193 u8 authkey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/Linux-v4.19/include/linux/ |
D | key-type.h | 26 struct key *authkey;/* authorisation for key being constructed */ member
|
/Linux-v4.19/drivers/crypto/ |
D | ixp4xx_crypto.c | 182 u8 authkey[MAX_KEYLEN]; member 1118 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1122 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1159 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1165 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey()
|
D | picoxcell_crypto.c | 499 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey()
|
D | atmel-aes.c | 2141 keys.authkey, keys.authkeylen, in atmel_aes_authenc_setkey()
|
D | talitos.c | 898 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey()
|
/Linux-v4.19/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 208 if (safexcel_hmac_setkey("safexcel-sha1", keys.authkey, in safexcel_aead_aes_setkey() 213 if (safexcel_hmac_setkey("safexcel-sha224", keys.authkey, in safexcel_aead_aes_setkey() 218 if (safexcel_hmac_setkey("safexcel-sha256", keys.authkey, in safexcel_aead_aes_setkey() 223 if (safexcel_hmac_setkey("safexcel-sha384", keys.authkey, in safexcel_aead_aes_setkey() 228 if (safexcel_hmac_setkey("safexcel-sha512", keys.authkey, in safexcel_aead_aes_setkey()
|
/Linux-v4.19/crypto/ |
D | authenc.c | 74 keys->authkey = key; in crypto_authenc_extractkeys() 96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
|
/Linux-v4.19/net/sctp/ |
D | socket.c | 3711 struct sctp_authkey *authkey; in sctp_setsockopt_auth_key() local 3726 authkey = memdup_user(optval, optlen); in sctp_setsockopt_auth_key() 3727 if (IS_ERR(authkey)) in sctp_setsockopt_auth_key() 3728 return PTR_ERR(authkey); in sctp_setsockopt_auth_key() 3730 if (authkey->sca_keylength > optlen - sizeof(struct sctp_authkey)) { in sctp_setsockopt_auth_key() 3735 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); in sctp_setsockopt_auth_key() 3736 if (!asoc && authkey->sca_assoc_id && sctp_style(sk, UDP)) { in sctp_setsockopt_auth_key() 3741 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() 3743 kzfree(authkey); in sctp_setsockopt_auth_key()
|
/Linux-v4.19/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 301 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 388 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
|
/Linux-v4.19/drivers/crypto/caam/ |
D | caamalg_qi.c | 230 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 239 ret = gen_split_key(jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
D | caamalg.c | 545 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 554 ret = gen_split_key(ctx->jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
/Linux-v4.19/drivers/crypto/chelsio/ |
D | chcr_algo.c | 3447 err = crypto_shash_digest(shash, keys.authkey, in chcr_authenc_setkey() 3456 memcpy(o_ptr, keys.authkey, keys.authkeylen); in chcr_authenc_setkey()
|
/Linux-v4.19/Documentation/security/keys/ |
D | core.rst | 1472 * ``struct key *authkey;``
|