Lines Matching defs:payload
54 * tpm2_seal_trusted() - seal the payload of a trusted key
57 * @payload: the key data in clear and encrypted form
63 struct trusted_key_payload *payload,
100 tpm_buf_append_u16(&buf, 4 + options->blobauth_len + payload->key_len + 1);
106 tpm_buf_append_u16(&buf, payload->key_len + 1);
107 tpm_buf_append(&buf, payload->key, payload->key_len);
108 tpm_buf_append_u8(&buf, payload->migratable);
155 memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len);
156 payload->blob_len = blob_len;
176 * @payload: the key data in clear and encrypted form
181 * -E2BIG on wrong payload size.
186 struct trusted_key_payload *payload,
196 private_len = be16_to_cpup((__be16 *) &payload->blob[0]);
197 if (private_len > (payload->blob_len - 2))
200 public_len = be16_to_cpup((__be16 *) &payload->blob[2 + private_len]);
202 if (blob_len > payload->blob_len)
216 tpm_buf_append(&buf, payload->blob, blob_len);
241 * @payload: the key data in clear and encrypted form
250 struct trusted_key_payload *payload,
290 memcpy(payload->key, data, data_len - 1);
291 payload->key_len = data_len - 1;
292 payload->migratable = data[data_len - 1];
301 * tpm2_unseal_trusted() - unseal the payload of a trusted key
304 * @payload: the key data in clear and encrypted form
310 struct trusted_key_payload *payload,
320 rc = tpm2_load_cmd(chip, payload, options, &blob_handle);
324 rc = tpm2_unseal_cmd(chip, payload, options, blob_handle);