| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 82 static int datablob_parse(char **datablob, struct trusted_key_payload *p) in datablob_parse() argument 91 c = strsep(datablob, " \t"); in datablob_parse() 98 c = strsep(datablob, " \t"); in datablob_parse() 109 c = strsep(datablob, " \t"); in datablob_parse() 160 char *datablob, *orig_datablob; in trusted_instantiate() local 168 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate() 169 if (!datablob) in trusted_instantiate() 171 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 172 datablob[datalen] = '\0'; in trusted_instantiate() 180 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate() [all …]
|
| H A D | trusted_caam.c | 76 static bool is_key_pkey(char **datablob) in is_key_pkey() argument 84 c = strsep(datablob, " \t"); in is_key_pkey() 92 static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob) in trusted_caam_seal() argument 105 if (is_key_pkey(&datablob)) { in trusted_caam_seal() 108 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_seal() 128 static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob) in trusted_caam_unseal() argument 137 if (is_key_pkey(&datablob)) { in trusted_caam_unseal() 140 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_unseal()
|
| H A D | trusted_pkwm.c | 23 static int getoptions(char *datablob, struct trusted_key_options *opt) in getoptions() argument 26 char *p = datablob; in getoptions() 33 if (!datablob) in getoptions() 38 while ((p = strsep(&datablob, " \t"))) { in getoptions() 81 static int trusted_pkwm_seal(struct trusted_key_payload *p, char *datablob) in trusted_pkwm_seal() argument 94 rc = getoptions(datablob, options); in trusted_pkwm_seal() 130 static int trusted_pkwm_unseal(struct trusted_key_payload *p, char *datablob) in trusted_pkwm_unseal() argument
|
| H A D | trusted_tee.c | 32 * [out] memref[1] Sealed key datablob 39 * [in] memref[0] Sealed key datablob 63 static int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) in trusted_tee_seal() argument 110 static int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tee_unseal() argument
|
| H A D | trusted_dcp.c | 200 static int trusted_dcp_seal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_seal() argument 242 static int trusted_dcp_unseal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_unseal() argument
|
| H A D | trusted_tpm1.c | 852 static int trusted_tpm_seal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_seal() argument 866 ret = getoptions(datablob, p, options); in trusted_tpm_seal() 897 static int trusted_tpm_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_unseal() argument 911 ret = getoptions(datablob, p, options); in trusted_tpm_unseal()
|
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 161 * datablob format: 172 static int datablob_parse(char *datablob, const char **format, in datablob_parse() 182 keyword = strsep(&datablob, " \t"); in datablob_parse() 190 p = strsep(&datablob, " \t"); in datablob_parse() 202 *master_desc = strsep(&datablob, " \t"); in datablob_parse() 221 *decrypted_datalen = strsep(&datablob, " \t"); in datablob_parse() 235 *decrypted_data = strsep(&datablob, " \t"); in datablob_parse() 244 *hex_encoded_iv = strsep(&datablob, " \t"); in datablob_parse() 286 /* copy datablob master_desc and datalen strings */ in datablob_format() 517 dump_hmac("datablob", in datablob_hmac_verify() 171 datablob_parse(char * datablob,const char ** format,char ** master_desc,char ** decrypted_datalen,char ** hex_encoded_iv,char ** decrypted_data) datablob_parse() argument 789 char *datablob = NULL; encrypted_instantiate() local [all...] |
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|