| /security/keys/ |
| A D | big_key.c | 59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse() local 67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse() 123 payload->data = enckey; in big_key_preparse() 135 payload->data = data; in big_key_preparse() 154 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_free_preparse() local 167 struct big_key_payload *payload = to_big_key_payload(key->payload); in big_key_revoke() local 180 struct big_key_payload *payload = to_big_key_payload(key->payload); in big_key_destroy() local 188 payload->data = NULL; in big_key_destroy() 213 struct big_key_payload *payload = to_big_key_payload(key->payload); in big_key_describe() local 219 payload->length, in big_key_describe() [all …]
|
| A D | user_defined.c | 73 prep->payload.data[0] = upayload; in user_preparse() 85 kfree_sensitive(prep->payload.data[0]); in user_free_preparse() 91 struct user_key_payload *payload; in user_free_payload_rcu() local 93 payload = container_of(head, struct user_key_payload, rcu); in user_free_payload_rcu() 94 kfree_sensitive(payload); in user_free_payload_rcu() 115 rcu_assign_keypointer(key, prep->payload.data[0]); in user_update() 116 prep->payload.data[0] = NULL; in user_update() 148 struct user_key_payload *upayload = key->payload.data[0]; in user_destroy()
|
| A D | key.c | 809 const void *payload, in __key_create_or_update() argument 852 prep.data = payload; in __key_create_or_update() 1016 const void *payload, in key_create_or_update() argument 1053 const void *payload, in key_create() argument 1094 prep.data = payload; in key_update() 1203 key->payload.data[1] = prep->payload.data[1]; in generic_key_instantiate() 1204 key->payload.data[2] = prep->payload.data[2]; in generic_key_instantiate() 1205 key->payload.data[3] = prep->payload.data[3]; in generic_key_instantiate() 1206 prep->payload.data[0] = NULL; in generic_key_instantiate() 1207 prep->payload.data[1] = NULL; in generic_key_instantiate() [all …]
|
| A D | keyctl.c | 82 void *payload; in SYSCALL_DEFINE5() local 112 payload = NULL; in SYSCALL_DEFINE5() 117 if (!payload) in SYSCALL_DEFINE5() 147 kvfree_sensitive(payload, plen); in SYSCALL_DEFINE5() 330 void *payload; in keyctl_update_key() local 338 payload = NULL; in keyctl_update_key() 342 if (!payload) in keyctl_update_key() 362 kvfree_sensitive(payload, plen); in keyctl_update_key() 1181 void *payload; in keyctl_instantiate_key_common() local 1205 payload = NULL; in keyctl_instantiate_key_common() [all …]
|
| A D | dh.c | 38 const struct user_key_payload *payload; in dh_data_from_key() local 41 payload = user_key_payload_locked(key); in dh_data_from_key() 43 duplicate = kmemdup(payload->data, payload->datalen, in dh_data_from_key() 47 ret = payload->datalen; in dh_data_from_key()
|
| A D | request_key_auth.c | 148 struct request_key_auth *rka = rcu_access_pointer(key->payload.rcu_data0); in request_key_auth_destroy() 198 irka = cred->request_key_auth->payload.data[0]; in request_key_auth_new()
|
| A D | gc.c | 371 memset(&key->payload, KEY_DESTROY, sizeof(key->payload)); in key_garbage_collector()
|
| A D | process_keys.c | 560 rka = ctx->cred->request_key_auth->payload.data[0]; in search_process_keyrings_rcu() 734 rka = ctx.cred->request_key_auth->payload.data[0]; in lookup_user_key()
|
| A D | Kconfig | 60 bool "Large payload keys"
|
| A D | keyring.c | 556 const union key_payload *payload, in restrict_link_reject() argument 1414 return keyring->restrict_link->check(keyring, key->type, &key->payload, in __key_link_check_restriction()
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm2.c | 84 work1 = payload->blob; in tpm2_key_encode() 94 return work1 - payload->blob; in tpm2_key_encode() 120 payload->blob_len); in tpm2_key_decode() 297 tpm_buf_append(&sized, payload->key, payload->key_len); in tpm2_seal_trusted() 401 blob = payload->blob; in tpm2_load_cmd() 402 payload->old_format = 1; in tpm2_load_cmd() 410 if (payload->blob_len < 4) in tpm2_load_cmd() 429 payload->migratable = 0; in tpm2_load_cmd() 431 payload->migratable = 1; in tpm2_load_cmd() 467 if (blob != payload->blob) in tpm2_load_cmd() [all …]
|
| A D | trusted_core.c | 153 struct trusted_key_payload *payload = NULL; in trusted_instantiate() local 169 payload = trusted_payload_alloc(key); in trusted_instantiate() 170 if (!payload) { in trusted_instantiate() 175 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate() 181 dump_payload(payload); in trusted_instantiate() 186 dump_payload(payload); in trusted_instantiate() 191 key_len = payload->key_len; in trusted_instantiate() 213 rcu_assign_keypointer(key, payload); in trusted_instantiate() 215 kfree_sensitive(payload); in trusted_instantiate() 240 p = key->payload.data[0]; in trusted_update() [all …]
|
| A D | trusted_dcp.c | 61 __u8 payload[]; member 218 ret = do_aead_crypto(p->key, b->payload, p->key_len, plain_blob_key, in trusted_dcp_seal() 276 ret = do_aead_crypto(b->payload, p->key, p->key_len + DCP_BLOB_AUTHLEN, in trusted_dcp_unseal()
|
| /security/integrity/ima/ |
| A D | ima_queue_keys.c | 61 kfree(entry->payload); in ima_free_key_entry() 68 const void *payload, in ima_alloc_key_entry() argument 77 entry->payload = kmemdup(payload, payload_len, GFP_KERNEL); in ima_alloc_key_entry() 83 if ((entry == NULL) || (entry->payload == NULL) || in ima_alloc_key_entry() 104 bool ima_queue_key(struct key *keyring, const void *payload, in ima_queue_key() argument 110 entry = ima_alloc_key_entry(keyring, payload, payload_len); in ima_queue_key() 163 entry->payload, in ima_process_queued_keys()
|
| A D | ima_asymmetric_keys.c | 30 const void *payload, size_t payload_len, in ima_post_key_create_or_update() argument 39 if (!payload || (payload_len == 0)) in ima_post_key_create_or_update() 43 queued = ima_queue_key(keyring, payload, payload_len); in ima_post_key_create_or_update() 63 process_buffer_measurement(&nop_mnt_idmap, NULL, payload, payload_len, in ima_post_key_create_or_update()
|
| A D | ima.h | 243 const void *payload, size_t plen, 363 void *payload; member 369 bool ima_queue_key(struct key *keyring, const void *payload, 376 const void *payload, in ima_queue_key() argument
|
| /security/keys/encrypted-keys/ |
| A D | masterkey_trusted.c | 38 tpayload = tkey->payload.data[0]; in request_trusted_key()
|
| A D | encrypted.c | 877 struct encrypted_key_payload *epayload = key->payload.data[0]; in encrypted_update() 997 kfree_sensitive(key->payload.data[0]); in encrypted_destroy()
|
| /security/integrity/evm/ |
| A D | evm_crypto.c | 437 ekp = evm_key->payload.data[0]; in evm_init_key()
|
| /security/ |
| A D | security.c | 5580 const void *payload, size_t payload_len, in security_key_post_create_or_update() argument 5583 call_void_hook(key_post_create_or_update, keyring, key, payload, in security_key_post_create_or_update()
|