/linux-4.4.14/security/keys/ |
D | request_key_auth.c | 152 struct key *authkey = NULL; in request_key_auth_new() local 202 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 206 if (IS_ERR(authkey)) { in request_key_auth_new() 207 ret = PTR_ERR(authkey); in request_key_auth_new() 212 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 216 kleave(" = {%d,%d}", authkey->serial, atomic_read(&authkey->usage)); in request_key_auth_new() 217 return authkey; in request_key_auth_new() 227 key_revoke(authkey); in request_key_auth_new() 228 key_put(authkey); in request_key_auth_new() 254 struct key *authkey; in key_get_instantiation_authkey() local [all …]
|
D | request_key.c | 35 kenter("{%d,%d},%d", cons->key->serial, cons->authkey->serial, error); in complete_request_key() 39 cons->authkey); in complete_request_key() 41 key_revoke(cons->authkey); in complete_request_key() 44 key_put(cons->authkey); in complete_request_key() 100 struct key *key = cons->key, *authkey = cons->authkey, *keyring, in call_sbin_request_key() local 107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); in call_sbin_request_key() 127 ret = key_link(keyring, authkey); in call_sbin_request_key() 209 struct key *authkey; in construct_key() local 219 authkey = request_key_auth_new(key, callout_info, callout_len, in construct_key() 221 if (IS_ERR(authkey)) { in construct_key() [all …]
|
D | key.c | 405 struct key *authkey, in __key_instantiate_and_link() argument 436 if (authkey) in __key_instantiate_and_link() 437 key_revoke(authkey); in __key_instantiate_and_link() 475 struct key *authkey) in key_instantiate_and_link() argument 498 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 536 struct key *authkey) in key_reject_and_link() argument 575 if (authkey) in key_reject_and_link() 576 key_revoke(authkey); in key_reject_and_link()
|
D | keyctl.c | 1350 struct key *authkey; in keyctl_assume_authority() local 1369 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1370 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1371 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1375 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1378 key_put(authkey); in keyctl_assume_authority() 1380 ret = authkey->serial; in keyctl_assume_authority()
|
/linux-4.4.14/drivers/crypto/qce/ |
D | sha.h | 27 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 63 u8 *authkey; member
|
D | sha.c | 87 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 90 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 378 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 381 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 416 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
D | common.c | 265 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash()
|
/linux-4.4.14/include/crypto/ |
D | authenc.h | 27 const u8 *authkey; member
|
/linux-4.4.14/fs/nfs/ |
D | nfs4idmap.c | 602 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 606 authkey); in nfs_idmap_instantiate() 611 struct key *key, struct key *authkey) in nfs_idmap_read_and_verify_message() argument 626 ret = nfs_idmap_instantiate(key, authkey, id_str, len); in nfs_idmap_read_and_verify_message() 632 ret = nfs_idmap_instantiate(key, authkey, im->im_name, len); in nfs_idmap_read_and_verify_message() 683 cons->key, cons->authkey); in idmap_pipe_downcall()
|
/linux-4.4.14/include/linux/ |
D | key-type.h | 26 struct key *authkey;/* authorisation for key being constructed */ member
|
/linux-4.4.14/drivers/crypto/ |
D | ixp4xx_crypto.c | 183 u8 authkey[MAX_KEYLEN]; member 1124 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1128 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1165 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1171 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey()
|
D | picoxcell_crypto.c | 478 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey()
|
D | talitos.c | 860 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey()
|
/linux-4.4.14/crypto/ |
D | authenc.c | 74 keys->authkey = key; in crypto_authenc_extractkeys() 96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
|
/linux-4.4.14/net/sctp/ |
D | socket.c | 3453 struct sctp_authkey *authkey; in sctp_setsockopt_auth_key() local 3463 authkey = memdup_user(optval, optlen); in sctp_setsockopt_auth_key() 3464 if (IS_ERR(authkey)) in sctp_setsockopt_auth_key() 3465 return PTR_ERR(authkey); in sctp_setsockopt_auth_key() 3467 if (authkey->sca_keylength > optlen - sizeof(struct sctp_authkey)) { in sctp_setsockopt_auth_key() 3472 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); in sctp_setsockopt_auth_key() 3473 if (!asoc && authkey->sca_assoc_id && sctp_style(sk, UDP)) { in sctp_setsockopt_auth_key() 3478 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() 3480 kzfree(authkey); in sctp_setsockopt_auth_key()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 300 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 387 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
|
/linux-4.4.14/drivers/crypto/caam/ |
D | caamalg.c | 1314 ret = gen_split_aead_key(ctx, keys.authkey, keys.authkeylen); in aead_setkey()
|
/linux-4.4.14/Documentation/security/ |
D | keys.txt | 1375 (*) struct key *authkey;
|