Searched refs:ukey (Results 1 – 6 of 6) sorted by relevance
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 306 struct key *ukey; in request_user_key() local 308 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key() 309 if (IS_ERR(ukey)) in request_user_key() 312 down_read(&ukey->sem); in request_user_key() 313 upayload = user_key_payload_locked(ukey); in request_user_key() 316 up_read(&ukey->sem); in request_user_key() 317 key_put(ukey); in request_user_key() 318 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key() 324 return ukey; in request_user_key()
|
| /linux/net/tipc/ |
| H A D | crypto.h | 168 int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, 176 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
|
| H A D | crypto.c | 259 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, 334 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info) in tipc_aead_key_validate() argument 339 if (unlikely(!crypto_has_alg(ukey->alg_name, 0, 0))) { in tipc_aead_key_validate() 345 if (strcmp(ukey->alg_name, "gcm(aes)")) { in tipc_aead_key_validate() 351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate() 514 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, in tipc_aead_init() argument 532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init() 543 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0); in tipc_aead_init() 557 err |= crypto_aead_setkey(tfm, ukey->key, keylen); in tipc_aead_init() 592 bin2hex(tmp->hint, ukey->key + keylen - TIPC_AEAD_HINT_LEN, in tipc_aead_init() [all …]
|
| H A D | node.c | 2966 struct tipc_aead_key *ukey; in __tipc_nl_node_set_key() local 2991 rc = tipc_nl_retrieve_key(attrs, &ukey); in __tipc_nl_node_set_key() 2997 rc = tipc_aead_key_validate(ukey, info); in __tipc_nl_node_set_key() 3022 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key()
|
| /linux/net/ceph/ |
| H A D | ceph_common.c | 357 struct key *ukey; in get_secret() local 362 ukey = request_key(&key_type_ceph, name, NULL); in get_secret() 363 if (IS_ERR(ukey)) { in get_secret() 366 key_err = PTR_ERR(ukey); in get_secret() 388 ckey = ukey->payload.data[0]; in get_secret() 395 key_put(ukey); in get_secret()
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 1693 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument 1696 return vmemdup_user(ukey, key_size); in __bpf_copy_key() 1698 if (ukey) in __bpf_copy_key() 1704 static void *___bpf_copy_key(bpfptr_t ukey, u64 key_size) in ___bpf_copy_key() argument 1707 return kvmemdup_bpfptr(ukey, key_size); in ___bpf_copy_key() 1709 if (!bpfptr_is_null(ukey)) in ___bpf_copy_key() 1720 void __user *ukey = u64_to_user_ptr(attr->key); in map_lookup_elem() local 1741 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem() 1782 bpfptr_t ukey = make_bpfptr(attr->key, uattr.is_kernel); in map_update_elem() local 1806 key = ___bpf_copy_key(ukey, map->key_size); in map_update_elem() [all …]
|