Home
last modified time | relevance | path

Searched refs:datablob (Results 1 – 7 of 7) sorted by relevance

/linux/security/keys/trusted-keys/
H A Dtrusted_core.c77 static int datablob_parse(char **datablob, struct trusted_key_payload *p) in datablob_parse() argument
86 c = strsep(datablob, " \t"); in datablob_parse()
93 c = strsep(datablob, " \t"); in datablob_parse()
104 c = strsep(datablob, " \t"); in datablob_parse()
155 char *datablob, *orig_datablob; in trusted_instantiate() local
163 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate()
164 if (!datablob) in trusted_instantiate()
166 memcpy(datablob, prep->data, datalen); in trusted_instantiate()
167 datablob[datalen] = '\0'; in trusted_instantiate()
175 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate()
[all …]
H A Dtrusted_caam.c76 static bool is_key_pkey(char **datablob) in is_key_pkey() argument
84 c = strsep(datablob, " \t"); in is_key_pkey()
92 static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob) in trusted_caam_seal() argument
105 if (is_key_pkey(&datablob)) { in trusted_caam_seal()
108 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_seal()
128 static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob) in trusted_caam_unseal() argument
137 if (is_key_pkey(&datablob)) { in trusted_caam_unseal()
140 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_unseal()
H A Dtrusted_tee.c63 static int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) in trusted_tee_seal() argument
110 static int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tee_unseal() argument
H A Dtrusted_dcp.c200 static int trusted_dcp_seal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_seal() argument
242 static int trusted_dcp_unseal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_unseal() argument
/linux/security/keys/encrypted-keys/
H A Dencrypted.c171 static int datablob_parse(char *datablob, const char **format, in datablob_parse() argument
181 keyword = strsep(&datablob, " \t"); in datablob_parse()
189 p = strsep(&datablob, " \t"); in datablob_parse()
201 *master_desc = strsep(&datablob, " \t"); in datablob_parse()
220 *decrypted_datalen = strsep(&datablob, " \t"); in datablob_parse()
234 *decrypted_data = strsep(&datablob, " \t"); in datablob_parse()
243 *hex_encoded_iv = strsep(&datablob, " \t"); in datablob_parse()
789 char *datablob = NULL; in encrypted_instantiate() local
801 datablob = kmalloc(datalen + 1, GFP_KERNEL); in encrypted_instantiate()
802 if (!datablob) in encrypted_instantiate()
[all …]
/linux/include/keys/
H A Dtrusted-type.h62 int (*seal)(struct trusted_key_payload *p, char *datablob);
65 int (*unseal)(struct trusted_key_payload *p, char *datablob);
/linux/Documentation/security/keys/
H A Decryptfs.rst28 In order to avoid known-plaintext attacks, the datablob obtained through