Searched refs:ukey (Results 1 – 4 of 4) sorted by relevance
/Linux-v4.19/security/keys/encrypted-keys/ |
D | encrypted.c | 304 struct key *ukey; in request_user_key() local 306 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key() 307 if (IS_ERR(ukey)) in request_user_key() 310 down_read(&ukey->sem); in request_user_key() 311 upayload = user_key_payload_locked(ukey); in request_user_key() 314 up_read(&ukey->sem); in request_user_key() 315 key_put(ukey); in request_user_key() 316 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key() 322 return ukey; in request_user_key()
|
/Linux-v4.19/net/ceph/ |
D | ceph_common.c | 301 struct key *ukey; in get_secret() local 306 ukey = request_key(&key_type_ceph, name, NULL); in get_secret() 307 if (IS_ERR(ukey)) { in get_secret() 310 key_err = PTR_ERR(ukey); in get_secret() 332 ckey = ukey->payload.data[0]; in get_secret() 339 key_put(ukey); in get_secret()
|
/Linux-v4.19/kernel/bpf/ |
D | syscall.c | 660 void __user *ukey = u64_to_user_ptr(attr->key); in map_lookup_elem() local 682 key = memdup_user(ukey, map->key_size); in map_lookup_elem() 748 void __user *ukey = u64_to_user_ptr(attr->key); in map_update_elem() local 770 key = memdup_user(ukey, map->key_size); in map_update_elem() 848 void __user *ukey = u64_to_user_ptr(attr->key); in map_delete_elem() local 868 key = memdup_user(ukey, map->key_size); in map_delete_elem() 898 void __user *ukey = u64_to_user_ptr(attr->key); in map_get_next_key() local 919 if (ukey) { in map_get_next_key() 920 key = memdup_user(ukey, map->key_size); in map_get_next_key()
|
/Linux-v4.19/crypto/ |
D | af_alg.c | 207 static int alg_setkey(struct sock *sk, char __user *ukey, in alg_setkey() argument 220 if (copy_from_user(key, ukey, keylen)) in alg_setkey()
|