/kernel/linux/linux-5.10/security/keys/ |
H A D | request_key_auth.c | 167 struct key *authkey = NULL; in request_key_auth_new() local 216 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 220 if (IS_ERR(authkey)) { in request_key_auth_new() 221 ret = PTR_ERR(authkey); in request_key_auth_new() 226 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 230 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 231 return authkey; in request_key_auth_new() 234 key_put(authkey); in request_key_auth_new() 259 struct key *authkey; in key_get_instantiation_authkey() local [all...] |
H A D | request_key.c | 52 * @authkey: The authorisation key. 59 void complete_request_key(struct key *authkey, int error) in complete_request_key() argument 61 struct request_key_auth *rka = get_request_key_auth(authkey); in complete_request_key() 64 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key() 67 key_negate_and_link(key, key_negative_timeout, NULL, authkey); in complete_request_key() 69 key_revoke(authkey); in complete_request_key() 118 static int call_sbin_request_key(struct key *authkey, void *aux) in call_sbin_request_key() argument 121 struct request_key_auth *rka = get_request_key_auth(authkey); in call_sbin_request_key() 130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 150 ret = key_link(keyring, authkey); in call_sbin_request_key() 231 struct key *authkey; construct_key() local 269 struct key *dest_keyring = *_dest_keyring, *authkey; construct_get_dest_keyring() local [all...] |
H A D | key.c | 428 struct key *authkey, in __key_instantiate_and_link() 464 if (authkey) in __key_instantiate_and_link() 465 key_invalidate(authkey); in __key_instantiate_and_link() 487 * @authkey: The authorisation token permitting instantiation. 501 struct key *authkey) in key_instantiate_and_link() 537 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 557 * @authkey: The authorisation token permitting instantiation. 576 struct key *authkey) in key_reject_and_link() 619 if (authkey) in key_reject_and_link() 620 key_invalidate(authkey); in key_reject_and_link() 425 __key_instantiate_and_link(struct key *key, struct key_preparsed_payload *prep, struct key *keyring, struct key *authkey, struct assoc_array_edit **_edit) __key_instantiate_and_link() argument 497 key_instantiate_and_link(struct key *key, const void *data, size_t datalen, struct key *keyring, struct key *authkey) key_instantiate_and_link() argument 572 key_reject_and_link(struct key *key, unsigned timeout, unsigned error, struct key *keyring, struct key *authkey) key_reject_and_link() argument [all...] |
H A D | keyctl.c | 1518 struct key *authkey; in keyctl_assume_authority() local 1537 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1538 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1539 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1543 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1545 ret = authkey->serial; in keyctl_assume_authority() 1546 key_put(authkey); in keyctl_assume_authority()
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | request_key_auth.c | 167 struct key *authkey = NULL; in request_key_auth_new() local 216 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new() 220 if (IS_ERR(authkey)) { in request_key_auth_new() 221 ret = PTR_ERR(authkey); in request_key_auth_new() 226 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new() 230 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new() 231 return authkey; in request_key_auth_new() 234 key_put(authkey); in request_key_auth_new() 259 struct key *authkey; in key_get_instantiation_authkey() local [all...] |
H A D | request_key.c | 52 * @authkey: The authorisation key. 59 void complete_request_key(struct key *authkey, int error) in complete_request_key() argument 61 struct request_key_auth *rka = get_request_key_auth(authkey); in complete_request_key() 64 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key() 67 key_negate_and_link(key, key_negative_timeout, NULL, authkey); in complete_request_key() 69 key_revoke(authkey); in complete_request_key() 118 static int call_sbin_request_key(struct key *authkey, void *aux) in call_sbin_request_key() argument 121 struct request_key_auth *rka = get_request_key_auth(authkey); in call_sbin_request_key() 130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 150 ret = key_link(keyring, authkey); in call_sbin_request_key() 231 struct key *authkey; construct_key() local 269 struct key *dest_keyring = *_dest_keyring, *authkey; construct_get_dest_keyring() local [all...] |
H A D | key.c | 428 struct key *authkey, in __key_instantiate_and_link() 464 if (authkey) in __key_instantiate_and_link() 465 key_invalidate(authkey); in __key_instantiate_and_link() 486 * @authkey: The authorisation token permitting instantiation. 500 struct key *authkey) in key_instantiate_and_link() 537 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link() 557 * @authkey: The authorisation token permitting instantiation. 576 struct key *authkey) in key_reject_and_link() 619 if (authkey) in key_reject_and_link() 620 key_invalidate(authkey); in key_reject_and_link() 425 __key_instantiate_and_link(struct key *key, struct key_preparsed_payload *prep, struct key *keyring, struct key *authkey, struct assoc_array_edit **_edit) __key_instantiate_and_link() argument 496 key_instantiate_and_link(struct key *key, const void *data, size_t datalen, struct key *keyring, struct key *authkey) key_instantiate_and_link() argument 572 key_reject_and_link(struct key *key, unsigned timeout, unsigned error, struct key *keyring, struct key *authkey) key_reject_and_link() argument [all...] |
H A D | keyctl.c | 1518 struct key *authkey; in keyctl_assume_authority() local 1537 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority() 1538 if (IS_ERR(authkey)) { in keyctl_assume_authority() 1539 ret = PTR_ERR(authkey); in keyctl_assume_authority() 1543 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority() 1545 ret = authkey->serial; in keyctl_assume_authority() 1546 key_put(authkey); in keyctl_assume_authority()
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | nfs4idmap.c | 64 struct key *authkey; member 567 complete_request_key(data->authkey, ret); in nfs_idmap_complete_pipe_upcall() 568 key_put(data->authkey); in nfs_idmap_complete_pipe_upcall() 580 static int nfs_idmap_legacy_upcall(struct key *authkey, void *aux) in nfs_idmap_legacy_upcall() argument 583 struct request_key_auth *rka = get_request_key_auth(authkey); in nfs_idmap_legacy_upcall() 602 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall() 620 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall() 624 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 628 authkey); in nfs_idmap_instantiate() 631 nfs_idmap_read_and_verify_message(struct idmap_msg *im, struct idmap_msg *upcall, struct key *key, struct key *authkey) nfs_idmap_read_and_verify_message() argument 671 struct key *authkey; idmap_pipe_downcall() local [all...] |
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | nfs4idmap.c | 64 struct key *authkey; member 567 complete_request_key(data->authkey, ret); in nfs_idmap_complete_pipe_upcall() 568 key_put(data->authkey); in nfs_idmap_complete_pipe_upcall() 580 static int nfs_idmap_legacy_upcall(struct key *authkey, void *aux) in nfs_idmap_legacy_upcall() argument 583 struct request_key_auth *rka = get_request_key_auth(authkey); in nfs_idmap_legacy_upcall() 602 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall() 620 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall() 624 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument 628 authkey); in nfs_idmap_instantiate() 631 nfs_idmap_read_and_verify_message(struct idmap_msg *im, struct idmap_msg *upcall, struct key *key, struct key *authkey) nfs_idmap_read_and_verify_message() argument 671 struct key *authkey; idmap_pipe_downcall() local [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | key-type.h | 136 * - authkey is the authority to assume when instantiating this key 174 struct key *authkey); 179 struct key *authkey); 180 extern void complete_request_key(struct key *authkey, int error); 185 struct key *authkey) in key_negate_and_link() 187 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link() 182 key_negate_and_link(struct key *key, unsigned timeout, struct key *keyring, struct key *authkey) key_negate_and_link() argument
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | key-type.h | 137 * - authkey is the authority to assume when instantiating this key 175 struct key *authkey); 180 struct key *authkey); 181 extern void complete_request_key(struct key *authkey, int error); 186 struct key *authkey) in key_negate_and_link() 188 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link() 183 key_negate_and_link(struct key *key, unsigned timeout, struct key *keyring, struct key *authkey) key_negate_and_link() argument
|
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | sha.h | 19 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 37 * @authkey: pointer to auth key in sha ctx 55 u8 *authkey; member
|
H A D | sha.c | 80 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 83 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 377 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 380 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 414 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | sha.h | 20 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member 38 * @authkey: pointer to auth key in sha ctx 56 u8 *authkey; member
|
H A D | sha.c | 86 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 89 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle() 344 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey() 347 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey() 381 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
|
H A D | common.c | 181 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash() 429 u32 authkey[QCE_SHA_HMAC_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local 470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead() 471 qce_write_array(qce, REG_AUTH_KEY0, (u32 *)authkey, authkey_words); in qce_setup_regs_aead()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | authenc.h | 22 const u8 *authkey; member
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | authenc.h | 22 const u8 *authkey; member
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 708 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req() 1314 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req() 1937 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue() 2053 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init() 2282 memcpy(ctx->authkey, key, keylen); in ahash_setkey() 2335 rc = do_shash("md5", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2339 rc = do_shash("sha1", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2343 rc = do_shash("sha224", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2347 rc = do_shash("sha256", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2351 rc = do_shash("sha384", ctx->authkey, ke in ahash_hmac_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 706 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req() 1311 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req() 1934 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue() 2050 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init() 2279 memcpy(ctx->authkey, key, keylen); in ahash_setkey() 2332 rc = do_shash("md5", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2336 rc = do_shash("sha1", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2340 rc = do_shash("sha224", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2344 rc = do_shash("sha256", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey() 2348 rc = do_shash("sha384", ctx->authkey, ke in ahash_hmac_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 181 u8 authkey[MAX_KEYLEN]; member 1128 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1132 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1158 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1164 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1188 if (keys.authkeylen > sizeof(ctx->authkey)) in des3_aead_setkey() 1195 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in des3_aead_setkey()
|
H A D | sa2ul.h | 310 u8 authkey[SHA512_BLOCK_SIZE]; member
|
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 182 u8 authkey[MAX_KEYLEN]; member 1223 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup() 1227 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup() 1253 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1259 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1283 if (keys.authkeylen > sizeof(ctx->authkey)) in des3_aead_setkey() 1290 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in des3_aead_setkey()
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | sa2ul.h | 314 u8 authkey[SHA512_BLOCK_SIZE]; member
|