| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 82 static int datablob_parse(char **datablob, struct trusted_key_payload *p) in datablob_parse() argument 91 c = strsep(datablob, " \t"); in datablob_parse() 98 c = strsep(datablob, " \t"); in datablob_parse() 109 c = strsep(datablob, " \t"); in datablob_parse() 160 char *datablob, *orig_datablob; in trusted_instantiate() local 168 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate() 169 if (!datablob) in trusted_instantiate() 171 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 172 datablob[datalen] = '\0'; in trusted_instantiate() 180 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate() [all …]
|
| H A D | trusted_caam.c | 76 static bool is_key_pkey(char **datablob) in is_key_pkey() argument 84 c = strsep(datablob, " \t"); in is_key_pkey() 92 static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob) in trusted_caam_seal() argument 105 if (is_key_pkey(&datablob)) { in trusted_caam_seal() 108 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_seal() 128 static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob) in trusted_caam_unseal() argument 137 if (is_key_pkey(&datablob)) { in trusted_caam_unseal() 140 ret = get_pkey_options(datablob, &info.pkey_info); in trusted_caam_unseal()
|
| H A D | trusted_pkwm.c | 23 static int getoptions(char *datablob, struct trusted_key_options *opt) in getoptions() argument 26 char *p = datablob; in getoptions() 33 if (!datablob) in getoptions() 38 while ((p = strsep(&datablob, " \t"))) { in getoptions() 81 static int trusted_pkwm_seal(struct trusted_key_payload *p, char *datablob) in trusted_pkwm_seal() argument 94 rc = getoptions(datablob, options); in trusted_pkwm_seal() 130 static int trusted_pkwm_unseal(struct trusted_key_payload *p, char *datablob) in trusted_pkwm_unseal() argument
|
| H A D | trusted_tee.c | 63 static int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) in trusted_tee_seal() argument 110 static int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tee_unseal() argument
|
| H A D | trusted_dcp.c | 200 static int trusted_dcp_seal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_seal() argument 242 static int trusted_dcp_unseal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_unseal() argument
|
| H A D | trusted_tpm1.c | 852 static int trusted_tpm_seal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_seal() argument 866 ret = getoptions(datablob, p, options); in trusted_tpm_seal() 897 static int trusted_tpm_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_unseal() argument 911 ret = getoptions(datablob, p, options); in trusted_tpm_unseal()
|
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 172 static int datablob_parse(char *datablob, const char **format, in datablob_parse() argument 182 keyword = strsep(&datablob, " \t"); in datablob_parse() 190 p = strsep(&datablob, " \t"); in datablob_parse() 202 *master_desc = strsep(&datablob, " \t"); in datablob_parse() 221 *decrypted_datalen = strsep(&datablob, " \t"); in datablob_parse() 235 *decrypted_data = strsep(&datablob, " \t"); in datablob_parse() 244 *hex_encoded_iv = strsep(&datablob, " \t"); in datablob_parse() 790 char *datablob = NULL; in encrypted_instantiate() local 802 datablob = kmalloc(datalen + 1, GFP_KERNEL); in encrypted_instantiate() 803 if (!datablob) in encrypted_instantiate() [all …]
|
| /linux/include/keys/ |
| H A D | trusted-type.h | 67 int (*seal)(struct trusted_key_payload *p, char *datablob); 70 int (*unseal)(struct trusted_key_payload *p, char *datablob);
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|