Lines Matching refs:to

19 The "asymmetric" key type is designed to be a container for the keys used in
24 associated with the key and provides operations to describe and destroy it.
29 it would also be possible to provide access to cryptographic hardware (such as
30 a TPM) that might be used to both retain the relevant key and perform
32 merely be an interface to the TPM driver.
35 for extracting information from the blobs of data passed to the instantiation
36 function. The first data parser that recognises the blob gets to set the
40 key, or it may interpret it as a reference to a key held somewhere else in the
49 the opportunity to pre-parse a key and to determine the description the key
52 This can then be used to refer to the key, either by complete match or by
53 partial match. The key type may also use other criteria to refer to a key.
60 function will examine a key's fingerprint to see if the hex digits given
86 For general access to asymmetric keys from within the kernel, the following
91 This gives access to functions for dealing with asymmetric / public keys.
122 An operation is provided to perform cryptographic signature verification, using
123 an asymmetric key to provide or to provide access to the public key.
129 it to check the signature. The caller must have parsed the signature and
130 transferred the relevant bits to the structure pointed to by sig.
148 hash must be pointed to by sig->digest and the size of the hash be placed in
189 Asymmetric keys point to this with their type_data[0] member.
191 The owner and name fields should be set to the owning module and the name of
198 Mandatory. This allows the subtype to display something in /proc/keys
213 given -ENOTSUPP. The subtype may do anything it likes to implement an
214 operation, including offloading to hardware.
221 The asymmetric key type doesn't generally want to store or to deal with a raw
222 blob of data that holds the key data. It would have to parse it and error
223 check it each time it wanted to use it. Further, the contents of the blob may
227 Also, the blob may represent a pointer to some hardware containing the key
234 - Pointer to TPM key.
235 - Pointer to UEFI key.
253 The owner and name fields should be set to the owning module and the name of
261 This is called to preparse the key from the key creation and update paths.
263 allocated, and as such, is permitted to provide the key's description in
264 the case that the caller declines to do so.
266 The caller passes a pointer to the following struct with all of the fields
279 The instantiation data is in a blob pointed to by data and is datalen in
280 size. The parse() function is not permitted to change these two values at
282 recognise the blob format and will not return -EBADMSG to indicate it is
286 the key and attach it to ->description, ->type_data[0] should be set to
287 point to the subtype to be used, ->payload should be set to point to the
288 initialised data for that subtype, ->type_data[1] should point to a hex
289 fingerprint and quotalen should be updated to indicate how much quota this
292 When clearing up, the data attached to ->type_data[1] and ->description
293 will be kfree()'d and the data attached to ->payload will be passed to the
294 subtype's ->destroy() method to be disposed of. A module reference for
295 the subtype pointed to by ->type_data[0] will be put.
306 Functions are provided to register and unregister parsers: