/linux-4.1.27/security/keys/ |
H A D | request_key_auth.c | 152 struct key *authkey = NULL; request_key_auth_new() local 202 authkey = key_alloc(&key_type_request_key_auth, desc, request_key_auth_new() 206 if (IS_ERR(authkey)) { request_key_auth_new() 207 ret = PTR_ERR(authkey); request_key_auth_new() 212 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); request_key_auth_new() 216 kleave(" = {%d,%d}", authkey->serial, atomic_read(&authkey->usage)); request_key_auth_new() 217 return authkey; request_key_auth_new() 227 key_revoke(authkey); request_key_auth_new() 228 key_put(authkey); request_key_auth_new() 254 struct key *authkey; key_get_instantiation_authkey() local 262 authkey = ERR_CAST(authkey_ref); key_get_instantiation_authkey() 263 if (authkey == ERR_PTR(-EAGAIN)) key_get_instantiation_authkey() 264 authkey = ERR_PTR(-ENOKEY); key_get_instantiation_authkey() 268 authkey = key_ref_to_ptr(authkey_ref); key_get_instantiation_authkey() 269 if (test_bit(KEY_FLAG_REVOKED, &authkey->flags)) { key_get_instantiation_authkey() 270 key_put(authkey); key_get_instantiation_authkey() 271 authkey = ERR_PTR(-EKEYREVOKED); key_get_instantiation_authkey() 275 return authkey; key_get_instantiation_authkey()
|
H A D | request_key.c | 35 kenter("{%d,%d},%d", cons->key->serial, cons->authkey->serial, error); complete_request_key() 39 cons->authkey); complete_request_key() 41 key_revoke(cons->authkey); complete_request_key() 44 key_put(cons->authkey); complete_request_key() 100 struct key *key = cons->key, *authkey = cons->authkey, *keyring, call_sbin_request_key() local 107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); call_sbin_request_key() 127 ret = key_link(keyring, authkey); call_sbin_request_key() 209 struct key *authkey; construct_key() local 219 authkey = request_key_auth_new(key, callout_info, callout_len, construct_key() 221 if (IS_ERR(authkey)) { construct_key() 223 ret = PTR_ERR(authkey); construct_key() 224 authkey = NULL; construct_key() 226 cons->authkey = key_get(authkey); construct_key() 239 !test_bit(KEY_FLAG_REVOKED, &authkey->flags)); construct_key() 240 key_put(authkey); construct_key() 257 struct key *dest_keyring = *_dest_keyring, *authkey; construct_get_dest_keyring() local 272 authkey = cred->request_key_auth; construct_get_dest_keyring() 273 down_read(&authkey->sem); construct_get_dest_keyring() 274 rka = authkey->payload.data; construct_get_dest_keyring() 276 &authkey->flags)) construct_get_dest_keyring() 279 up_read(&authkey->sem); construct_get_dest_keyring()
|
H A D | key.c | 405 struct key *authkey, __key_instantiate_and_link() 436 if (authkey) __key_instantiate_and_link() 437 key_revoke(authkey); __key_instantiate_and_link() 461 * @authkey: The authorisation token permitting instantiation. 475 struct key *authkey) key_instantiate_and_link() 498 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); key_instantiate_and_link() 517 * @authkey: The authorisation token permitting instantiation. 536 struct key *authkey) key_reject_and_link() 575 if (authkey) key_reject_and_link() 576 key_revoke(authkey); key_reject_and_link() 402 __key_instantiate_and_link(struct key *key, struct key_preparsed_payload *prep, struct key *keyring, struct key *authkey, struct assoc_array_edit **_edit) __key_instantiate_and_link() argument 471 key_instantiate_and_link(struct key *key, const void *data, size_t datalen, struct key *keyring, struct key *authkey) key_instantiate_and_link() argument 532 key_reject_and_link(struct key *key, unsigned timeout, unsigned error, struct key *keyring, struct key *authkey) key_reject_and_link() argument
|
H A D | keyctl.c | 1356 struct key *authkey; keyctl_assume_authority() local 1375 authkey = key_get_instantiation_authkey(id); keyctl_assume_authority() 1376 if (IS_ERR(authkey)) { keyctl_assume_authority() 1377 ret = PTR_ERR(authkey); keyctl_assume_authority() 1381 ret = keyctl_change_reqkey_auth(authkey); keyctl_assume_authority() 1384 key_put(authkey); keyctl_assume_authority() 1386 ret = authkey->serial; keyctl_assume_authority()
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | sha.h | 27 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member in struct:qce_sha_ctx 46 * @authkey: pointer to auth key in sha ctx 65 u8 *authkey; member in struct:qce_sha_reqctx
|
H A D | sha.c | 88 rctx->authkey = ctx->authkey; qce_ahash_async_req_handle() 91 rctx->authkey = ctx->authkey; qce_ahash_async_req_handle() 382 memset(ctx->authkey, 0, sizeof(ctx->authkey)); qce_ahash_hmac_setkey() 385 memcpy(ctx->authkey, key, keylen); qce_ahash_hmac_setkey() 420 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); qce_ahash_hmac_setkey()
|
H A D | common.c | 265 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); qce_setup_regs_ahash()
|
/linux-4.1.27/include/crypto/ |
H A D | authenc.h | 27 const u8 *authkey; member in struct:crypto_authenc_keys
|
/linux-4.1.27/fs/nfs/ |
H A D | nfs4idmap.c | 617 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) nfs_idmap_instantiate() argument 621 authkey); nfs_idmap_instantiate() 626 struct key *key, struct key *authkey) nfs_idmap_read_and_verify_message() 641 ret = nfs_idmap_instantiate(key, authkey, id_str, len); nfs_idmap_read_and_verify_message() 647 ret = nfs_idmap_instantiate(key, authkey, im->im_name, len); nfs_idmap_read_and_verify_message() 698 cons->key, cons->authkey); idmap_pipe_downcall() 624 nfs_idmap_read_and_verify_message(struct idmap_msg *im, struct idmap_msg *upcall, struct key *key, struct key *authkey) nfs_idmap_read_and_verify_message() argument
|
/linux-4.1.27/include/linux/ |
H A D | key-type.h | 26 struct key *authkey;/* authorisation for key being constructed */ member in struct:key_construction 145 * - authkey is the authority to assume when instantiating this key
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 182 u8 authkey[MAX_KEYLEN]; member in struct:ixp_ctx 1115 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, aead_setup() 1119 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, aead_setup() 1156 if (keys.authkeylen > sizeof(ctx->authkey)) aead_setkey() 1162 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); aead_setkey()
|
H A D | picoxcell_crypto.c | 519 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); spacc_aead_setkey()
|
H A D | talitos.c | 691 memcpy(ctx->key, keys.authkey, keys.authkeylen); aead_setkey()
|
/linux-4.1.27/crypto/ |
H A D | authenc.c | 78 keys->authkey = key; crypto_authenc_extractkeys() 100 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); crypto_authenc_setkey()
|
H A D | authencesn.c | 74 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); crypto_authenc_esn_setkey()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 308 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) qat_alg_aead_init_enc_session() 394 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) qat_alg_aead_init_dec_session()
|
/linux-4.1.27/net/sctp/ |
H A D | socket.c | 3466 struct sctp_authkey *authkey; sctp_setsockopt_auth_key() local 3476 authkey = memdup_user(optval, optlen); sctp_setsockopt_auth_key() 3477 if (IS_ERR(authkey)) sctp_setsockopt_auth_key() 3478 return PTR_ERR(authkey); sctp_setsockopt_auth_key() 3480 if (authkey->sca_keylength > optlen - sizeof(struct sctp_authkey)) { sctp_setsockopt_auth_key() 3485 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); sctp_setsockopt_auth_key() 3486 if (!asoc && authkey->sca_assoc_id && sctp_style(sk, UDP)) { sctp_setsockopt_auth_key() 3491 ret = sctp_auth_set_key(ep, asoc, authkey); sctp_setsockopt_auth_key() 3493 kzfree(authkey); sctp_setsockopt_auth_key()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamalg.c | 1684 ret = gen_split_aead_key(ctx, keys.authkey, keys.authkeylen); aead_setkey()
|