Home
last modified time | relevance | path

Searched refs:type_data (Results 1 – 16 of 16) sorted by relevance

/linux-4.1.27/security/keys/
Dbig_key.c63 prep->type_data[1] = (void *)(unsigned long)datalen; in big_key_preparse()
130 if (key_is_instantiated(key) && key->type_data.x[1] > BIG_KEY_FILE_THRESHOLD) in big_key_revoke()
139 if (key->type_data.x[1] > BIG_KEY_FILE_THRESHOLD) { in big_key_destroy()
155 unsigned long datalen = key->type_data.x[1]; in big_key_describe()
171 unsigned long datalen = key->type_data.x[1]; in big_key_read()
Dkey.c557 key->type_data.reject_error = -error; in key_reject_and_link()
1049 key->type_data.p[0] = prep->type_data[0]; in generic_key_instantiate()
1050 key->type_data.p[1] = prep->type_data[1]; in generic_key_instantiate()
1053 prep->type_data[0] = NULL; in generic_key_instantiate()
1054 prep->type_data[1] = NULL; in generic_key_instantiate()
Dkeyring.c121 list_add_tail(&keyring->type_data.link, in keyring_publish_name()
390 if (keyring->type_data.link.next != NULL && in keyring_destroy()
391 !list_empty(&keyring->type_data.link)) in keyring_destroy()
392 list_del(&keyring->type_data.link); in keyring_destroy()
575 ctx->result = ERR_PTR(key->type_data.reject_error); in keyring_search_iterator()
993 type_data.link in find_keyring_by_name()
Drequest_key.c596 return key->type_data.reject_error; in wait_for_key_construction()
/linux-4.1.27/net/dns_resolver/
Ddns_key.c125 prep->type_data[0] = ERR_PTR(-derrno); in dns_resolver_preparse()
140 if (prep->type_data[0]) { in dns_resolver_preparse()
141 kleave(" = 0 [h_error %ld]", PTR_ERR(prep->type_data[0])); in dns_resolver_preparse()
226 int err = key->type_data.x[0]; in dns_resolver_describe()
244 if (key->type_data.x[0]) in dns_resolver_read()
245 return key->type_data.x[0]; in dns_resolver_read()
Ddns_query.c140 ret = rkey->type_data.x[0]; in dns_query()
/linux-4.1.27/crypto/asymmetric_keys/
Dasymmetric_type.c303 struct asymmetric_key_subtype *subtype = prep->type_data[0]; in asymmetric_key_free_preparse()
304 struct asymmetric_key_ids *kids = prep->type_data[1]; in asymmetric_key_free_preparse()
327 struct asymmetric_key_ids *kids = key->type_data.p[1]; in asymmetric_key_destroy()
332 key->type_data.p[0] = NULL; in asymmetric_key_destroy()
339 key->type_data.p[1] = NULL; in asymmetric_key_destroy()
Dasymmetric_keys.h20 return key->type_data.p[1]; in asymmetric_key_ids()
Dx509_public_key.c323 prep->type_data[0] = &public_key_subtype; in x509_key_preparse()
324 prep->type_data[1] = kids; in x509_key_preparse()
/linux-4.1.27/include/keys/
Dasymmetric-subtype.h52 return key->type_data.p[0]; in asymmetric_key_subtype()
/linux-4.1.27/Documentation/crypto/
Dasymmetric-keys.txt189 Asymmetric keys point to this with their type_data[0] member.
272 void *type_data[2];
286 the key and attach it to ->description, ->type_data[0] should be set to
288 initialised data for that subtype, ->type_data[1] should point to a hex
292 When clearing up, the data attached to ->type_data[1] and ->description
295 the subtype pointed to by ->type_data[0] will be put.
/linux-4.1.27/include/linux/
Dkey-type.h43 void *type_data[2]; /* Private key-type data */ member
Dkey.h197 } type_data; member
/linux-4.1.27/net/rxrpc/
Dar-key.c151 prep->type_data[0] = (void *)((unsigned long)prep->type_data[0] + 1); in rxrpc_preparse_xdr_rxkad()
767 prep->type_data[0] = (void *)((unsigned long)prep->type_data[0] + 1); in rxrpc_preparse()
834 memcpy(&prep->type_data, prep->data, 8); in rxrpc_preparse_s()
Drxkad.c854 memcpy(&iv, &conn->server_key->type_data, sizeof(iv)); in rxkad_decrypt_ticket()
/linux-4.1.27/Documentation/security/
Dkeys.txt1146 void *type_data[2];
1163 The method can attach anything it likes to type_data[] and payload. These
1176 description, type_data and payload fields of the key_preparsed_payload