/Linux-v5.4/security/keys/ |
D | request_key_auth.c | 168 struct key *authkey = NULL; in request_key_auth_new() local 217 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 221 if (IS_ERR(authkey)) { in request_key_auth_new() 222 ret = PTR_ERR(authkey); in request_key_auth_new() 227 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 231 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 232 return authkey; in request_key_auth_new() 235 key_put(authkey); in request_key_auth_new() 260 struct key *authkey; in key_get_instantiation_authkey() local 270 authkey = ERR_CAST(authkey_ref); in key_get_instantiation_authkey() [all …]
|
D | request_key.c | 56 void complete_request_key(struct key *authkey, int error) in complete_request_key() argument 58 struct request_key_auth *rka = get_request_key_auth(authkey); in complete_request_key() 61 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key() 64 key_negate_and_link(key, key_negative_timeout, NULL, authkey); in complete_request_key() 66 key_revoke(authkey); in complete_request_key() 115 static int call_sbin_request_key(struct key *authkey, void *aux) in call_sbin_request_key() argument 118 struct request_key_auth *rka = get_request_key_auth(authkey); in call_sbin_request_key() 127 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 147 ret = key_link(keyring, authkey); in call_sbin_request_key() 213 complete_request_key(authkey, ret); in call_sbin_request_key() [all …]
|
D | key.c | 424 struct key *authkey, in __key_instantiate_and_link() argument 459 if (authkey) in __key_instantiate_and_link() 460 key_invalidate(authkey); in __key_instantiate_and_link() 498 struct key *authkey) in key_instantiate_and_link() argument 534 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 573 struct key *authkey) in key_reject_and_link() argument 616 if (authkey) in key_reject_and_link() 617 key_invalidate(authkey); in key_reject_and_link()
|
D | keyctl.c | 1443 struct key *authkey; in keyctl_assume_authority() local 1462 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1463 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1464 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1468 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1470 ret = authkey->serial; in keyctl_assume_authority() 1471 key_put(authkey); in keyctl_assume_authority()
|
/Linux-v5.4/fs/nfs/ |
D | nfs4idmap.c | 63 struct key *authkey; member 566 struct key *authkey = idmap->idmap_upcall_data->authkey; in nfs_idmap_complete_pipe_upcall_locked() local 570 complete_request_key(authkey, ret); in nfs_idmap_complete_pipe_upcall_locked() 571 key_put(authkey); in nfs_idmap_complete_pipe_upcall_locked() 581 static int nfs_idmap_legacy_upcall(struct key *authkey, void *aux) in nfs_idmap_legacy_upcall() argument 584 struct request_key_auth *rka = get_request_key_auth(authkey); in nfs_idmap_legacy_upcall() 603 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall() 621 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall() 625 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 629 authkey); in nfs_idmap_instantiate() [all …]
|
/Linux-v5.4/include/linux/ |
D | key-type.h | 173 struct key *authkey); 178 struct key *authkey); 179 extern void complete_request_key(struct key *authkey, int error); 184 struct key *authkey) in key_negate_and_link() argument 186 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link()
|
/Linux-v5.4/drivers/crypto/qce/ |
D | sha.h | 19 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 55 u8 *authkey; member
|
D | sha.c | 79 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 82 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 359 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 362 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 396 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
D | common.c | 257 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash()
|
/Linux-v5.4/include/crypto/ |
D | authenc.h | 22 const u8 *authkey; member
|
/Linux-v5.4/drivers/crypto/bcm/ |
D | cipher.c | 743 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req() 1349 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req() 1998 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue() 2114 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init() 2343 memcpy(ctx->authkey, key, keylen); in ahash_setkey() 2396 rc = do_shash("md5", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2400 rc = do_shash("sha1", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2404 rc = do_shash("sha224", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2408 rc = do_shash("sha256", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2412 rc = do_shash("sha384", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() [all …]
|
D | cipher.h | 180 u8 authkey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/Linux-v5.4/drivers/crypto/ |
D | ixp4xx_crypto.c | 178 u8 authkey[MAX_KEYLEN]; member 1111 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1115 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1152 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1158 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1183 if (keys.authkeylen > sizeof(ctx->authkey)) in des3_aead_setkey() 1190 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in des3_aead_setkey()
|
D | talitos.c | 904 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 945 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_des3_setkey()
|
D | picoxcell_crypto.c | 486 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey()
|
/Linux-v5.4/crypto/ |
D | authenc.c | 77 keys->authkey = key; in crypto_authenc_extractkeys() 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
|
D | essiv.c | 128 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
|
/Linux-v5.4/drivers/crypto/ccree/ |
D | cc_aead.c | 413 static int cc_get_plain_hmac_key(struct crypto_aead *tfm, const u8 *authkey, in cc_get_plain_hmac_key() argument 446 key = kmemdup(authkey, keylen, GFP_KERNEL); in cc_get_plain_hmac_key() 551 const u8 *enckey, *authkey; in cc_aead_setkey() local 566 authkey = keys.authkey; in cc_aead_setkey() 586 authkey = NULL; in cc_aead_setkey() 602 memcpy(ctx->auth_state.xcbc.xcbc_keys, authkey, in cc_aead_setkey() 605 rc = cc_get_plain_hmac_key(tfm, authkey, ctx->auth_keylen); in cc_aead_setkey()
|
/Linux-v5.4/net/sctp/ |
D | socket.c | 3687 struct sctp_authkey *authkey; in sctp_setsockopt_auth_key() local 3696 optlen = min_t(unsigned int, optlen, USHRT_MAX + sizeof(*authkey)); in sctp_setsockopt_auth_key() 3698 authkey = memdup_user(optval, optlen); in sctp_setsockopt_auth_key() 3699 if (IS_ERR(authkey)) in sctp_setsockopt_auth_key() 3700 return PTR_ERR(authkey); in sctp_setsockopt_auth_key() 3702 if (authkey->sca_keylength > optlen - sizeof(*authkey)) in sctp_setsockopt_auth_key() 3705 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); in sctp_setsockopt_auth_key() 3706 if (!asoc && authkey->sca_assoc_id > SCTP_ALL_ASSOC && in sctp_setsockopt_auth_key() 3711 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() 3716 authkey->sca_assoc_id = SCTP_FUTURE_ASSOC; in sctp_setsockopt_auth_key() [all …]
|
/Linux-v5.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 353 if (safexcel_hmac_setkey("safexcel-sha1", keys.authkey, in safexcel_aead_setkey() 358 if (safexcel_hmac_setkey("safexcel-sha224", keys.authkey, in safexcel_aead_setkey() 363 if (safexcel_hmac_setkey("safexcel-sha256", keys.authkey, in safexcel_aead_setkey() 368 if (safexcel_hmac_setkey("safexcel-sha384", keys.authkey, in safexcel_aead_setkey() 373 if (safexcel_hmac_setkey("safexcel-sha512", keys.authkey, in safexcel_aead_setkey()
|
/Linux-v5.4/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 321 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 408 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
|
/Linux-v5.4/drivers/crypto/caam/ |
D | caamalg_qi.c | 217 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 226 ret = gen_split_key(jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
D | caamalg.c | 592 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 601 ret = gen_split_key(ctx->jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
/Linux-v5.4/drivers/crypto/chelsio/ |
D | chcr_algo.c | 3497 err = crypto_shash_digest(shash, keys.authkey, in chcr_authenc_setkey() 3506 memcpy(o_ptr, keys.authkey, keys.authkeylen); in chcr_authenc_setkey()
|