| /linux/security/keys/ |
| H A D | request_key_auth.c | 167 struct key *authkey = NULL; in request_key_auth_new() local 216 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 220 if (IS_ERR(authkey)) { in request_key_auth_new() 221 ret = PTR_ERR(authkey); in request_key_auth_new() 226 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 230 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 231 return authkey; in request_key_auth_new() 234 key_put(authkey); in request_key_auth_new() 259 struct key *authkey; in key_get_instantiation_authkey() local 269 authkey = ERR_CAST(authkey_ref); in key_get_instantiation_authkey() [all …]
|
| H A D | request_key.c | 59 void complete_request_key(struct key *authkey, int error) in complete_request_key() argument 61 struct request_key_auth *rka = get_request_key_auth(authkey); in complete_request_key() 64 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key() 67 key_negate_and_link(key, key_negative_timeout, NULL, authkey); in complete_request_key() 69 key_revoke(authkey); in complete_request_key() 118 static int call_sbin_request_key(struct key *authkey, void *aux) in call_sbin_request_key() argument 121 struct request_key_auth *rka = get_request_key_auth(authkey); in call_sbin_request_key() 130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 150 ret = key_link(keyring, authkey); in call_sbin_request_key() 216 complete_request_key(authkey, ret); in call_sbin_request_key() [all …]
|
| H A D | key.c | 430 struct key *authkey, in __key_instantiate_and_link() argument 466 if (authkey) in __key_instantiate_and_link() 467 key_invalidate(authkey); in __key_instantiate_and_link() 503 struct key *authkey) in key_instantiate_and_link() argument 540 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 579 struct key *authkey) in key_reject_and_link() argument 622 if (authkey) in key_reject_and_link() 623 key_invalidate(authkey); in key_reject_and_link()
|
| H A D | keyctl.c | 1518 struct key *authkey; in keyctl_assume_authority() local 1537 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1538 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1539 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1543 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1545 ret = authkey->serial; in keyctl_assume_authority() 1546 key_put(authkey); in keyctl_assume_authority()
|
| /linux/fs/nfs/ |
| H A D | nfs4idmap.c | 64 struct key *authkey; member 554 complete_request_key(data->authkey, ret); in nfs_idmap_complete_pipe_upcall() 555 key_put(data->authkey); in nfs_idmap_complete_pipe_upcall() 567 static int nfs_idmap_legacy_upcall(struct key *authkey, void *aux) in nfs_idmap_legacy_upcall() argument 570 struct request_key_auth *rka = get_request_key_auth(authkey); in nfs_idmap_legacy_upcall() 589 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall() 607 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall() 611 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 615 authkey); in nfs_idmap_instantiate() 620 struct key *key, struct key *authkey) in nfs_idmap_read_and_verify_message() argument [all …]
|
| /linux/include/linux/ |
| H A D | key-type.h | 178 struct key *authkey); 183 struct key *authkey); 184 extern void complete_request_key(struct key *authkey, int error); 189 struct key *authkey) in key_negate_and_link() argument 191 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link()
|
| /linux/drivers/crypto/qce/ |
| H A D | sha.h | 20 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 56 u8 *authkey; member
|
| H A D | common.c | 181 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash() 429 u32 authkey[QCE_SHA_HMAC_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local 470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead() 471 qce_write_array(qce, REG_AUTH_KEY0, (u32 *)authkey, authkey_words); in qce_setup_regs_aead()
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.h | 314 u8 authkey[SHA512_BLOCK_SIZE]; member
|
| /linux/crypto/ |
| H A D | authenc.c | 75 keys->authkey = key; in crypto_authenc_extractkeys() 97 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
|
| H A D | essiv.c | 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
|
| /linux/drivers/crypto/bcm/ |
| H A D | cipher.h | 183 u8 authkey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 761 ret = crypto_shash_digest(&ctx->sdesc->shash, keys->authkey, in aead_hmac_init() 767 memcpy(ctx->key, keys->authkey, authkeylen); in aead_hmac_init()
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg_qi.c | 230 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 239 ret = gen_split_key(jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
| H A D | caamalg.c | 621 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 630 ret = gen_split_key(ctx->jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 488 if (safexcel_hmac_setkey(&ctx->base, keys.authkey, keys.authkeylen, in safexcel_aead_setkey()
|
| /linux/Documentation/security/keys/ |
| H A D | core.rst | 1665 * ``struct key *authkey;``
|