| /security/keys/ |
| A D | big_key.c | 63 size_t datalen = prep->datalen; in big_key_preparse() local 69 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) in big_key_preparse() 75 payload->length = datalen; in big_key_preparse() 77 if (datalen > BIG_KEY_FILE_THRESHOLD) { in big_key_preparse() 230 size_t datalen = payload->length; in big_key_read() local 233 if (!buffer || buflen < datalen) in big_key_read() 234 return datalen; in big_key_read() 236 if (datalen > BIG_KEY_FILE_THRESHOLD) { in big_key_read() 265 ret = datalen; in big_key_read() 268 memcpy(buffer, buf, datalen); in big_key_read() [all …]
|
| A D | user_defined.c | 62 size_t datalen = prep->datalen; in user_preparse() local 64 if (datalen <= 0 || datalen > 32767 || !prep->data) in user_preparse() 67 upayload = kmalloc(sizeof(*upayload) + datalen, GFP_KERNEL); in user_preparse() 72 prep->quotalen = datalen; in user_preparse() 74 upayload->datalen = datalen; in user_preparse() 75 memcpy(upayload->data, prep->data, datalen); in user_preparse() 107 ret = key_payload_reserve(key, prep->datalen); in user_update() 162 seq_printf(m, ": %u", key->datalen); in user_describe() 177 ret = upayload->datalen; in user_read() 181 if (buflen > upayload->datalen) in user_read() [all …]
|
| A D | request_key_auth.c | 86 size_t datalen; in request_key_auth_read() local 92 datalen = rka->callout_len; in request_key_auth_read() 93 ret = datalen; in request_key_auth_read() 97 if (buflen > datalen) in request_key_auth_read() 98 buflen = datalen; in request_key_auth_read()
|
| A D | key.c | 293 key->datalen = type->def_datalen; in key_alloc() 374 int key_payload_reserve(struct key *key, size_t datalen) in key_payload_reserve() argument 376 int delta = (int)datalen - key->datalen; in key_payload_reserve() 403 key->datalen = datalen; in key_payload_reserve() 501 size_t datalen, in key_instantiate_and_link() argument 512 prep.datalen = datalen; in key_instantiate_and_link() 853 prep.datalen = plen; in __key_create_or_update() 1095 prep.datalen = plen; in key_update()
|
| A D | dh.c | 43 duplicate = kmemdup(payload->data, payload->datalen, in dh_data_from_key() 47 ret = payload->datalen; in dh_data_from_key()
|
| A D | keyring.c | 125 return prep->datalen != 0 ? -EINVAL : 0; in keyring_preparse() 1331 keyring->datalen + KEYQUOTA_LINK_BYTES); in __key_link_begin() 1397 keyring->datalen - KEYQUOTA_LINK_BYTES); in __key_link_end() 1515 key_payload_reserve(keyring, keyring->datalen - KEYQUOTA_LINK_BYTES); in __key_unlink()
|
| /security/keys/trusted-keys/ |
| A D | trusted_core.c | 154 size_t datalen = prep->datalen; in trusted_instantiate() local 160 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_instantiate() 163 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate() 166 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 167 datablob[datalen] = '\0'; in trusted_instantiate() 234 size_t datalen = prep->datalen; in trusted_update() local 243 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_update() 246 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_update() 256 memcpy(datablob, prep->data, datalen); in trusted_update() 257 datablob[datalen] = '\0'; in trusted_update()
|
| A D | trusted_tpm1.c | 51 static int TSS_sha1(const unsigned char *data, unsigned int datalen, in TSS_sha1() argument 63 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); in TSS_sha1() 470 const unsigned char *data, uint32_t datalen, in tpm_seal() argument 515 datsize = htonl(datalen); in tpm_seal() 530 sizeof(uint32_t), &datsize, datalen, data, 0, in tpm_seal() 539 &datsize, datalen, data, 0, 0); in tpm_seal() 550 tpm_buf_append_u32(tb, datalen); in tpm_seal() 551 tpm_buf_append(tb, data, datalen); in tpm_seal() 590 unsigned char *data, unsigned int *datalen) in tpm_unseal() argument 654 *datalen = LOAD32(tb->data, TPM_DATA_OFFSET); in tpm_unseal() [all …]
|
| /security/keys/encrypted-keys/ |
| A D | encrypted.c | 604 const char *datalen, in encrypted_key_alloc() argument 740 const char *datalen) in __ekey_init() argument 748 epayload->iv = epayload->datalen + strlen(datalen) + 1; in __ekey_init() 763 memcpy(epayload->datalen, datalen, strlen(datalen)); in __ekey_init() 823 size_t datalen = prep->datalen; in encrypted_instantiate() local 826 if (datalen <= 0 || datalen > 32767 || !prep->data) in encrypted_instantiate() 832 datablob[datalen] = 0; in encrypted_instantiate() 882 size_t datalen = prep->datalen; in encrypted_update() local 887 if (datalen <= 0 || datalen > 32767 || !prep->data) in encrypted_update() 894 buf[datalen] = 0; in encrypted_update() [all …]
|
| /security/integrity/ima/ |
| A D | ima_fs.c | 113 void ima_putc(struct seq_file *m, void *data, int datalen) in ima_putc() argument 115 while (datalen--) in ima_putc() 333 size_t datalen, loff_t *ppos) in ima_write_policy() argument 338 if (datalen >= PAGE_SIZE) in ima_write_policy() 339 datalen = PAGE_SIZE - 1; in ima_write_policy() 346 data = memdup_user_nul(buf, datalen); in ima_write_policy()
|
| A D | ima_crypto.c | 596 u32 datalen = field_data[i].len; in ima_calc_field_array_hash_tfm() local 598 datalen : (__force u32)cpu_to_le32(datalen); in ima_calc_field_array_hash_tfm() 607 memcpy(buffer, data_to_hash, datalen); in ima_calc_field_array_hash_tfm() 609 datalen = IMA_EVENT_NAME_LEN_MAX + 1; in ima_calc_field_array_hash_tfm() 611 rc = crypto_shash_update(shash, data_to_hash, datalen); in ima_calc_field_array_hash_tfm()
|
| A D | ima_template_lib.c | 45 static int ima_write_template_field_data(const void *data, const u32 datalen, in ima_write_template_field_data() argument 50 u32 buflen = datalen; in ima_write_template_field_data() 53 buflen = datalen + 1; in ima_write_template_field_data() 59 memcpy(buf, data, datalen); in ima_write_template_field_data() 69 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++) in ima_write_template_field_data()
|
| A D | ima.h | 275 void ima_putc(struct seq_file *m, void *data, int datalen);
|
| /security/integrity/ |
| A D | digsig_asymmetric.c | 83 int siglen, const char *data, int datalen) in asymmetric_verify() argument 125 pks.digest_size = datalen; in asymmetric_verify()
|
| A D | integrity.h | 169 int siglen, const char *data, int datalen); 172 int siglen, const char *data, int datalen) in asymmetric_verify() argument
|