/linux/security/keys/ |
A D | request_key_auth.c | 167 struct key *authkey = NULL; in request_key_auth_new() local 220 if (IS_ERR(authkey)) { in request_key_auth_new() 221 ret = PTR_ERR(authkey); in request_key_auth_new() 230 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 231 return authkey; in request_key_auth_new() 234 key_put(authkey); in request_key_auth_new() 259 struct key *authkey; in key_get_instantiation_authkey() local 269 authkey = ERR_CAST(authkey_ref); in key_get_instantiation_authkey() 271 authkey = ERR_PTR(-ENOKEY); in key_get_instantiation_authkey() 277 key_put(authkey); in key_get_instantiation_authkey() [all …]
|
A D | request_key.c | 66 key_revoke(authkey); in complete_request_key() 147 ret = key_link(keyring, authkey); in call_sbin_request_key() 213 complete_request_key(authkey, ret); in call_sbin_request_key() 228 struct key *authkey; in construct_key() local 236 if (IS_ERR(authkey)) in construct_key() 237 return PTR_ERR(authkey); in construct_key() 244 ret = actor(authkey, aux); in construct_key() 251 key_put(authkey); in construct_key() 285 down_read(&authkey->sem); in construct_get_dest_keyring() 288 &authkey->flags)) in construct_get_dest_keyring() [all …]
|
A D | key.c | 427 struct key *authkey, in __key_instantiate_and_link() argument 463 if (authkey) in __key_instantiate_and_link() 464 key_invalidate(authkey); in __key_instantiate_and_link() 502 struct key *authkey) in key_instantiate_and_link() argument 539 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 578 struct key *authkey) in key_reject_and_link() argument 622 if (authkey) in key_reject_and_link() 623 key_invalidate(authkey); in key_reject_and_link()
|
A D | keyctl.c | 1513 struct key *authkey; in keyctl_assume_authority() local 1532 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1533 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1534 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1538 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1540 ret = authkey->serial; in keyctl_assume_authority() 1541 key_put(authkey); in keyctl_assume_authority()
|
/linux/fs/nfs/ |
A D | nfs4idmap.c | 64 struct key *authkey; member 567 struct key *authkey = idmap->idmap_upcall_data->authkey; in nfs_idmap_complete_pipe_upcall_locked() local 571 complete_request_key(authkey, ret); in nfs_idmap_complete_pipe_upcall_locked() 572 key_put(authkey); in nfs_idmap_complete_pipe_upcall_locked() 604 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall() 622 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall() 630 authkey); in nfs_idmap_instantiate() 672 struct key *authkey; in idmap_pipe_downcall() local 684 authkey = idmap->idmap_upcall_data->authkey; in idmap_pipe_downcall() 685 rka = get_request_key_auth(authkey); in idmap_pipe_downcall() [all …]
|
/linux/include/linux/ |
A D | key-type.h | 174 struct key *authkey); 179 struct key *authkey); 180 extern void complete_request_key(struct key *authkey, int error); 185 struct key *authkey) in key_negate_and_link() argument 187 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link()
|
/linux/drivers/crypto/qce/ |
A D | sha.c | 86 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 89 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 342 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 345 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 379 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
A D | sha.h | 20 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 56 u8 *authkey; member
|
A D | common.c | 180 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash() 428 u32 authkey[QCE_SHA_HMAC_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local 469 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead() 470 qce_write_array(qce, REG_AUTH_KEY0, (u32 *)authkey, authkey_words); in qce_setup_regs_aead()
|
A D | aead.c | 646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
|
/linux/drivers/crypto/bcm/ |
A D | cipher.c | 707 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req() 1312 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req() 1935 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue() 2051 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init() 2280 memcpy(ctx->authkey, key, keylen); in ahash_setkey() 2386 memcpy(ctx->authkey, key, keylen); in ahash_hmac_setkey() 2396 memcpy(ctx->ipad, ctx->authkey, ctx->authkeylen); in ahash_hmac_setkey() 2782 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in aead_authenc_setkey() 2783 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_authenc_setkey() 2821 flow_dump(" auth: ", ctx->authkey, ctx->authkeylen); in aead_authenc_setkey() [all …]
|
A D | cipher.h | 183 u8 authkey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/linux/include/crypto/ |
A D | authenc.h | 22 const u8 *authkey; member
|
/linux/drivers/crypto/ |
A D | ixp4xx_crypto.c | 183 u8 authkey[MAX_KEYLEN]; member 1221 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1225 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1251 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1257 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1281 if (keys.authkeylen > sizeof(ctx->authkey)) in des3_aead_setkey() 1288 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in des3_aead_setkey()
|
A D | sa2ul.h | 313 u8 authkey[SHA512_BLOCK_SIZE]; member
|
A D | sa2ul.c | 1461 memset(ctx->authkey, 0, bs); in sa_sha_setup() 1835 cfg.akey = keys.authkey; in sa_aead_setkey() 1840 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey() 1854 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey()
|
/linux/crypto/ |
A D | authenc.c | 77 keys->authkey = key; in crypto_authenc_extractkeys() 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
|
A D | authencesn.c | 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
|
A D | essiv.c | 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
|
/linux/drivers/crypto/ccree/ |
A D | cc_aead.c | 410 static int cc_get_plain_hmac_key(struct crypto_aead *tfm, const u8 *authkey, in cc_get_plain_hmac_key() argument 443 key = kmemdup(authkey, keylen, GFP_KERNEL); in cc_get_plain_hmac_key() 549 const u8 *enckey, *authkey; in cc_aead_setkey() local 564 authkey = keys.authkey; in cc_aead_setkey() 583 authkey = NULL; in cc_aead_setkey() 599 memcpy(ctx->auth_state.xcbc.xcbc_keys, authkey, in cc_aead_setkey() 602 rc = cc_get_plain_hmac_key(tfm, authkey, ctx->auth_keylen); in cc_aead_setkey()
|
/linux/net/sctp/ |
A D | socket.c | 3620 struct sctp_authkey *authkey, in sctp_setsockopt_auth_key() argument 3634 if (authkey->sca_keylength > optlen - sizeof(*authkey)) in sctp_setsockopt_auth_key() 3637 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); in sctp_setsockopt_auth_key() 3643 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() 3648 authkey->sca_assoc_id = SCTP_FUTURE_ASSOC; in sctp_setsockopt_auth_key() 3650 if (authkey->sca_assoc_id == SCTP_FUTURE_ASSOC || in sctp_setsockopt_auth_key() 3651 authkey->sca_assoc_id == SCTP_ALL_ASSOC) { in sctp_setsockopt_auth_key() 3652 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() 3660 authkey->sca_assoc_id == SCTP_ALL_ASSOC) { in sctp_setsockopt_auth_key() 3662 int res = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key() [all …]
|
/linux/drivers/crypto/qat/qat_common/ |
A D | qat_algs.c | 277 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 364 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
|
/linux/drivers/crypto/caam/ |
A D | caamalg_qi.c | 225 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 234 ret = gen_split_key(jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
A D | caamalg.c | 605 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 614 ret = gen_split_key(ctx->jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()
|
/linux/drivers/crypto/hisilicon/sec2/ |
A D | sec_crypto.c | 1055 ret = crypto_shash_tfm_digest(hash_tfm, keys->authkey, in sec_aead_auth_set_key() 1063 memcpy(ctx->a_key, keys->authkey, keys->authkeylen); in sec_aead_auth_set_key()
|