Searched refs:type_data (Results 1 – 16 of 16) sorted by relevance
/linux-4.1.27/security/keys/ |
D | big_key.c | 63 prep->type_data[1] = (void *)(unsigned long)datalen; in big_key_preparse() 130 if (key_is_instantiated(key) && key->type_data.x[1] > BIG_KEY_FILE_THRESHOLD) in big_key_revoke() 139 if (key->type_data.x[1] > BIG_KEY_FILE_THRESHOLD) { in big_key_destroy() 155 unsigned long datalen = key->type_data.x[1]; in big_key_describe() 171 unsigned long datalen = key->type_data.x[1]; in big_key_read()
|
D | key.c | 557 key->type_data.reject_error = -error; in key_reject_and_link() 1049 key->type_data.p[0] = prep->type_data[0]; in generic_key_instantiate() 1050 key->type_data.p[1] = prep->type_data[1]; in generic_key_instantiate() 1053 prep->type_data[0] = NULL; in generic_key_instantiate() 1054 prep->type_data[1] = NULL; in generic_key_instantiate()
|
D | keyring.c | 121 list_add_tail(&keyring->type_data.link, in keyring_publish_name() 390 if (keyring->type_data.link.next != NULL && in keyring_destroy() 391 !list_empty(&keyring->type_data.link)) in keyring_destroy() 392 list_del(&keyring->type_data.link); in keyring_destroy() 575 ctx->result = ERR_PTR(key->type_data.reject_error); in keyring_search_iterator() 993 type_data.link in find_keyring_by_name()
|
D | request_key.c | 596 return key->type_data.reject_error; in wait_for_key_construction()
|
/linux-4.1.27/net/dns_resolver/ |
D | dns_key.c | 125 prep->type_data[0] = ERR_PTR(-derrno); in dns_resolver_preparse() 140 if (prep->type_data[0]) { in dns_resolver_preparse() 141 kleave(" = 0 [h_error %ld]", PTR_ERR(prep->type_data[0])); in dns_resolver_preparse() 226 int err = key->type_data.x[0]; in dns_resolver_describe() 244 if (key->type_data.x[0]) in dns_resolver_read() 245 return key->type_data.x[0]; in dns_resolver_read()
|
D | dns_query.c | 140 ret = rkey->type_data.x[0]; in dns_query()
|
/linux-4.1.27/crypto/asymmetric_keys/ |
D | asymmetric_type.c | 303 struct asymmetric_key_subtype *subtype = prep->type_data[0]; in asymmetric_key_free_preparse() 304 struct asymmetric_key_ids *kids = prep->type_data[1]; in asymmetric_key_free_preparse() 327 struct asymmetric_key_ids *kids = key->type_data.p[1]; in asymmetric_key_destroy() 332 key->type_data.p[0] = NULL; in asymmetric_key_destroy() 339 key->type_data.p[1] = NULL; in asymmetric_key_destroy()
|
D | asymmetric_keys.h | 20 return key->type_data.p[1]; in asymmetric_key_ids()
|
D | x509_public_key.c | 323 prep->type_data[0] = &public_key_subtype; in x509_key_preparse() 324 prep->type_data[1] = kids; in x509_key_preparse()
|
/linux-4.1.27/include/keys/ |
D | asymmetric-subtype.h | 52 return key->type_data.p[0]; in asymmetric_key_subtype()
|
/linux-4.1.27/Documentation/crypto/ |
D | asymmetric-keys.txt | 189 Asymmetric keys point to this with their type_data[0] member. 272 void *type_data[2]; 286 the key and attach it to ->description, ->type_data[0] should be set to 288 initialised data for that subtype, ->type_data[1] should point to a hex 292 When clearing up, the data attached to ->type_data[1] and ->description 295 the subtype pointed to by ->type_data[0] will be put.
|
/linux-4.1.27/include/linux/ |
D | key-type.h | 43 void *type_data[2]; /* Private key-type data */ member
|
D | key.h | 197 } type_data; member
|
/linux-4.1.27/net/rxrpc/ |
D | ar-key.c | 151 prep->type_data[0] = (void *)((unsigned long)prep->type_data[0] + 1); in rxrpc_preparse_xdr_rxkad() 767 prep->type_data[0] = (void *)((unsigned long)prep->type_data[0] + 1); in rxrpc_preparse() 834 memcpy(&prep->type_data, prep->data, 8); in rxrpc_preparse_s()
|
D | rxkad.c | 854 memcpy(&iv, &conn->server_key->type_data, sizeof(iv)); in rxkad_decrypt_ticket()
|
/linux-4.1.27/Documentation/security/ |
D | keys.txt | 1146 void *type_data[2]; 1163 The method can attach anything it likes to type_data[] and payload. These 1176 description, type_data and payload fields of the key_preparsed_payload
|