Searched refs:datablob (Results 1 - 3 of 3) sorted by relevance
/linux-4.1.27/include/keys/ |
H A D | encrypted-type.h | 23 char *format; /* datablob: format */ 24 char *master_desc; /* datablob: master key name */ 25 char *datalen; /* datablob: decrypted key length */ 26 u8 *iv; /* datablob: iv */ 27 u8 *encrypted_data; /* datablob: encrypted data */ 28 unsigned short datablob_len; /* length of datablob */ 33 u8 payload_data[0]; /* payload data + datablob + hmac */
|
/linux-4.1.27/security/keys/ |
H A D | trusted.c | 803 static int datablob_parse(char *datablob, struct trusted_key_payload *p, datablob_parse() argument 813 c = strsep(&datablob, " \t"); datablob_parse() 820 c = strsep(&datablob, " \t"); datablob_parse() 827 ret = getoptions(datablob, p, o); datablob_parse() 834 c = strsep(&datablob, " \t"); datablob_parse() 843 ret = getoptions(datablob, p, o); datablob_parse() 850 ret = getoptions(datablob, p, o); datablob_parse() 904 char *datablob; trusted_instantiate() local 912 datablob = kmalloc(datalen + 1, GFP_KERNEL); trusted_instantiate() 913 if (!datablob) trusted_instantiate() 915 memcpy(datablob, prep->data, datalen); trusted_instantiate() 916 datablob[datalen] = '\0'; trusted_instantiate() 929 key_cmd = datablob_parse(datablob, payload, options); trusted_instantiate() 964 kfree(datablob); trusted_instantiate() 991 char *datablob; trusted_update() local 1002 datablob = kmalloc(datalen + 1, GFP_KERNEL); trusted_update() 1003 if (!datablob) trusted_update() 1016 memcpy(datablob, prep->data, datalen); trusted_update() 1017 datablob[datalen] = '\0'; trusted_update() 1018 ret = datablob_parse(datablob, new_p, new_o); trusted_update() 1048 kfree(datablob); trusted_update() 1055 * On success, return to userspace the trusted key datablob size.
|
/linux-4.1.27/security/keys/encrypted-keys/ |
H A D | encrypted.c | 166 * datablob format: 177 static int datablob_parse(char *datablob, const char **format, datablob_parse() argument 187 keyword = strsep(&datablob, " \t"); datablob_parse() 195 p = strsep(&datablob, " \t"); datablob_parse() 206 *master_desc = strsep(&datablob, " \t"); datablob_parse() 225 *decrypted_datalen = strsep(&datablob, " \t"); datablob_parse() 247 *hex_encoded_iv = strsep(&datablob, " \t"); datablob_parse() 289 /* copy datablob master_desc and datalen strings */ datablob_format() 553 dump_hmac("datablob", datablob_hmac_verify() 597 /* Allocate memory for decrypted key and datablob. */ encrypted_key_alloc() 771 * Decrypt an existing encrypted datablob or create a new encrypted key 780 char *datablob = NULL; encrypted_instantiate() local 791 datablob = kmalloc(datalen + 1, GFP_KERNEL); encrypted_instantiate() 792 if (!datablob) encrypted_instantiate() 794 datablob[datalen] = 0; encrypted_instantiate() 795 memcpy(datablob, prep->data, datalen); encrypted_instantiate() 796 ret = datablob_parse(datablob, &format, &master_desc, encrypted_instantiate() 816 kfree(datablob); encrypted_instantiate() 833 * The next read will return an encrypted datablob using the new 891 * The resulting datablob format is: 894 * On success, return to userspace the encrypted key datablob size.
|
Completed in 97 milliseconds