Searched refs:key_len (Results 1 – 9 of 9) sorted by relevance
| /security/keys/trusted-keys/ |
| A D | trusted_core.c | 99 p->key_len = keylen; in datablob_parse() 158 size_t key_len; in trusted_instantiate() local 191 key_len = payload->key_len; in trusted_instantiate() 193 key_len); in trusted_instantiate() 197 if (ret != key_len) { in trusted_instantiate() 267 new_p->key_len = p->key_len; in trusted_update() 268 memcpy(new_p->key, p->key, p->key_len); in trusted_update() 327 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() argument 329 return get_random_bytes_wait(key, key_len) ?: key_len; in kernel_get_random() 334 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
|
| A D | trusted_dcp.c | 206 blen = calc_blob_len(p->key_len); in trusted_dcp_seal() 218 ret = do_aead_crypto(p->key, b->payload, p->key_len, plain_blob_key, in trusted_dcp_seal() 231 put_unaligned_le32(p->key_len, &b->payload_len); in trusted_dcp_seal() 255 p->key_len = le32_to_cpu(b->payload_len); in trusted_dcp_unseal() 256 blen = calc_blob_len(p->key_len); in trusted_dcp_unseal() 276 ret = do_aead_crypto(b->payload, p->key, p->key_len + DCP_BLOB_AUTHLEN, in trusted_dcp_unseal()
|
| A D | trusted_tee.c | 86 param[0].u.memref.size = p->key_len; in trusted_tee_seal() 146 p->key_len = param[1].u.memref.size; in trusted_tee_unseal() 157 static int trusted_tee_get_random(unsigned char *key, size_t key_len) in trusted_tee_get_random() argument 167 reg_shm = tee_shm_register_kernel_buf(pvt_data.ctx, key, key_len); in trusted_tee_get_random() 179 param[0].u.memref.size = key_len; in trusted_tee_get_random()
|
| A D | trusted_caam.c | 23 .input = p->key, .input_len = p->key_len, in trusted_caam_seal() 49 p->key_len = info.output_len; in trusted_caam_unseal()
|
| A D | trusted_tpm2.c | 296 tpm_buf_append_u16(&sized, payload->key_len); in tpm2_seal_trusted() 297 tpm_buf_append(&sized, payload->key, payload->key_len); in tpm2_seal_trusted() 557 payload->key_len = data_len - 1; in tpm2_unseal_cmd() 565 payload->key_len = data_len; in tpm2_unseal_cmd()
|
| A D | trusted_tpm1.c | 683 p->key[p->key_len] = p->migratable; in key_seal() 686 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 709 o->blobauth, p->key, &p->key_len); in key_unseal() 714 p->migratable = p->key[--p->key_len]; in key_unseal() 987 static int trusted_tpm_get_random(unsigned char *key, size_t key_len) in trusted_tpm_get_random() argument 989 return tpm_get_random(chip, key, key_len); in trusted_tpm_get_random()
|
| /security/keys/encrypted-keys/ |
| A D | masterkey_trusted.c | 40 *master_keylen = tpayload->key_len; in request_trusted_key()
|
| A D | encrypted.c | 384 unsigned int key_len) in init_skcipher_req() argument 397 ret = crypto_skcipher_setkey(tfm, key, key_len); in init_skcipher_req()
|
| /security/apparmor/ |
| A D | policy_unpack.c | 1084 params.key_len = sizeof(void *); in unpack_profile()
|
Completed in 19 milliseconds