Searched refs:ukp (Results 1 – 8 of 8) sorted by relevance
| /linux/lib/ |
| H A D | digsig.c | 77 const struct user_key_payload *ukp; in digsig_verify_rsa() local 81 ukp = user_key_payload_locked(key); in digsig_verify_rsa() 83 if (!ukp) { in digsig_verify_rsa() 89 if (ukp->datalen < sizeof(*pkh)) in digsig_verify_rsa() 92 pkh = (struct pubkey_hdr *)ukp->data; in digsig_verify_rsa() 104 endp = ukp->data + ukp->datalen; in digsig_verify_rsa()
|
| /linux/drivers/md/ |
| H A D | dm-verity-verify-sig.c | 42 const struct user_key_payload *ukp; in verity_verify_get_sig_from_key() local 52 ukp = user_key_payload_locked(key); in verity_verify_get_sig_from_key() 53 if (!ukp) { in verity_verify_get_sig_from_key() 58 sig_opts->sig = kmalloc(ukp->datalen, GFP_KERNEL); in verity_verify_get_sig_from_key() 63 sig_opts->sig_size = ukp->datalen; in verity_verify_get_sig_from_key() 65 memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); in verity_verify_get_sig_from_key()
|
| H A D | dm-crypt.c | 2474 const struct user_key_payload *ukp; in set_key_user() local 2476 ukp = user_key_payload_locked(key); in set_key_user() 2477 if (!ukp) in set_key_user() 2480 if (cc->key_size != ukp->datalen) in set_key_user() 2483 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user()
|
| /linux/kernel/ |
| H A D | crash_dump_dm_crypt.c | 144 const struct user_key_payload *ukp; in read_key_from_user_keying() local 157 ukp = user_key_payload_locked(key); in read_key_from_user_keying() 158 if (!ukp) { in read_key_from_user_keying() 163 if (ukp->datalen > KEY_SIZE_MAX) { in read_key_from_user_keying() 164 pr_err("Key size %u exceeds maximum (%u)\n", ukp->datalen, KEY_SIZE_MAX); in read_key_from_user_keying() 169 memcpy(dm_key->data, ukp->data, ukp->datalen); in read_key_from_user_keying() 170 dm_key->key_size = ukp->datalen; in read_key_from_user_keying()
|
| /linux/fs/crypto/ |
| H A D | keysetup_v1.c | 90 const struct user_key_payload *ukp; in find_and_lock_process_key() local 104 ukp = user_key_payload_locked(key); in find_and_lock_process_key() 106 if (!ukp) /* was the key revoked before we acquired its semaphore? */ in find_and_lock_process_key() 109 payload = (const struct fscrypt_key *)ukp->data; in find_and_lock_process_key() 111 if (ukp->datalen != sizeof(struct fscrypt_key) || in find_and_lock_process_key()
|
| /linux/fs/ubifs/ |
| H A D | auth.c | 258 const struct user_key_payload *ukp; in ubifs_init_authentication() local 294 ukp = user_key_payload_locked(keyring_key); in ubifs_init_authentication() 295 if (!ukp) { in ubifs_init_authentication() 332 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication()
|
| /linux/fs/ecryptfs/ |
| H A D | ecryptfs_kernel.h | 117 struct user_key_payload *ukp; in ecryptfs_get_key_payload_data() local 123 ukp = user_key_payload_locked(key); in ecryptfs_get_key_payload_data() 124 if (!ukp) in ecryptfs_get_key_payload_data() 127 return (struct ecryptfs_auth_tok *)ukp->data; in ecryptfs_get_key_payload_data()
|
| /linux/crypto/ |
| H A D | af_alg.c | 236 const struct user_key_payload *ukp; in key_data_ptr_user() local 238 ukp = user_key_payload_locked(key); in key_data_ptr_user() 239 if (IS_ERR_OR_NULL(ukp)) in key_data_ptr_user() 244 return ukp->data; in key_data_ptr_user()
|