Searched refs:datablob (Results 1 – 7 of 7) sorted by relevance
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 77 static int datablob_parse(char **datablob, struct trusted_key_payload *p) in datablob_parse() argument 86 c = strsep(datablob, " \t"); in datablob_parse() 93 c = strsep(datablob, " \t"); in datablob_parse() 104 c = strsep(datablob, " \t"); in datablob_parse() 155 char *datablob, *orig_datablob; in trusted_instantiate() local 163 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate() 164 if (!datablob) in trusted_instantiate() 166 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 167 datablob[datalen] = '\0'; in trusted_instantiate() 175 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate() [all …]
|
| H A D | trusted_caam.c | 76 static bool is_key_pkey(char **datablob) in is_key_pkey() argument 84 c = strsep(datablob, " \t"); in is_key_pkey() 92 static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob) in trusted_caam_seal() argument 105 if (is_key_pkey(&datablob)) { in trusted_caam_seal() 108 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_seal() 128 static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob) in trusted_caam_unseal() argument 137 if (is_key_pkey(&datablob)) { in trusted_caam_unseal() 140 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_unseal()
|
| H A D | trusted_tee.c | 63 static int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) in trusted_tee_seal() argument 110 static int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tee_unseal() argument
|
| H A D | trusted_dcp.c | 200 static int trusted_dcp_seal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_seal() argument 242 static int trusted_dcp_unseal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_unseal() argument
|
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 171 static int datablob_parse(char *datablob, const char **format, in datablob_parse() argument 181 keyword = strsep(&datablob, " \t"); in datablob_parse() 189 p = strsep(&datablob, " \t"); in datablob_parse() 201 *master_desc = strsep(&datablob, " \t"); in datablob_parse() 220 *decrypted_datalen = strsep(&datablob, " \t"); in datablob_parse() 234 *decrypted_data = strsep(&datablob, " \t"); in datablob_parse() 243 *hex_encoded_iv = strsep(&datablob, " \t"); in datablob_parse() 789 char *datablob = NULL; in encrypted_instantiate() local 801 datablob = kmalloc(datalen + 1, GFP_KERNEL); in encrypted_instantiate() 802 if (!datablob) in encrypted_instantiate() [all …]
|
| /linux/include/keys/ |
| H A D | trusted-type.h | 62 int (*seal)(struct trusted_key_payload *p, char *datablob); 65 int (*unseal)(struct trusted_key_payload *p, char *datablob);
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|