Lines Matching refs:data
158 * datablob_parse - parse the keyctl data
161 * new [<format>] <master-key name> <decrypted data length>
162 * load [<format>] <master-key name> <decrypted data length>
163 * <encrypted iv + data>
166 * Tokenizes a copy of the keyctl data, returning a pointer to each token,
288 /* convert the hex encoded iv, encrypted-data and HMAC to ascii */
320 *master_key = upayload->data;
445 /* Before returning data to userspace, encrypt decrypted data. */
743 * For a new key, use a random number for both the iv and data
744 * itself. For an old key, decrypt the hex encoded data.
793 if (datalen <= 0 || datalen > 32767 || !prep->data)
800 memcpy(datablob, prep->data, datalen);
844 struct encrypted_key_payload *epayload = key->payload.data[0];
854 if (datalen <= 0 || datalen > 32767 || !prep->data)
862 memcpy(buf, prep->data, datalen);
893 * encrypted_read - format and copy out the encrypted data
896 * <master-key name> <decrypted data length> <encrypted iv> <encrypted data>
914 /* returns the hex encoded iv, encrypted-data, and hmac as ascii */
964 kfree_sensitive(key->payload.data[0]);