/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 49 const char *key_desc) in ecryptfs_fill_auth_tok() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 48 ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, const char *key_desc) ecryptfs_fill_auth_tok() argument
|
H A D | ecryptfs_format.h | 25 const char *key_desc);
|
H A D | encrypted.c | 747 const char *key_desc, const char *format, in encrypted_init() 754 ret = valid_ecryptfs_desc(key_desc); in encrypted_init() 759 key_desc); in encrypted_init() 746 encrypted_init(struct encrypted_key_payload *epayload, const char *key_desc, const char *format, const char *master_desc, const char *datalen, const char *hex_encoded_iv) encrypted_init() argument
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 49 const char *key_desc) in ecryptfs_fill_auth_tok() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 48 ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, const char *key_desc) ecryptfs_fill_auth_tok() argument
|
H A D | ecryptfs_format.h | 25 const char *key_desc);
|
H A D | encrypted.c | 774 const char *key_desc, const char *format, in encrypted_init() 781 ret = valid_ecryptfs_desc(key_desc); in encrypted_init() 786 key_desc); in encrypted_init() 773 encrypted_init(struct encrypted_key_payload *epayload, const char *key_desc, const char *format, const char *master_desc, const char *datalen, const char *hex_encoded_iv, const char *decrypted_data) encrypted_init() argument
|
/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-verity-verify-sig.c | 31 static int verity_verify_get_sig_from_key(const char *key_desc, in verity_verify_get_sig_from_key() argument 39 key_desc, NULL); in verity_verify_get_sig_from_key()
|
H A D | dm-crypt.c | 2463 char *new_key_string, *key_desc; in crypt_set_keyring_key() local 2479 key_desc = strpbrk(key_string, ":"); in crypt_set_keyring_key() 2480 if (!key_desc || key_desc == key_string || !strlen(key_desc + 1)) in crypt_set_keyring_key() 2483 if (!strncmp(key_string, "logon:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2486 } else if (!strncmp(key_string, "user:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2490 } else if (!strncmp(key_string, "encrypted:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2502 key = request_key(type, key_desc + 1, NULL); in crypt_set_keyring_key() 2554 /* remaining key string should be :<logon|user>:<key_desc> */ in get_key_size() [all...] |
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-verity-verify-sig.c | 31 static int verity_verify_get_sig_from_key(const char *key_desc, in verity_verify_get_sig_from_key() argument 39 key_desc, NULL); in verity_verify_get_sig_from_key()
|
H A D | dm-crypt.c | 2545 char *new_key_string, *key_desc; in crypt_set_keyring_key() local 2561 key_desc = strchr(key_string, ':'); in crypt_set_keyring_key() 2562 if (!key_desc || key_desc == key_string || !strlen(key_desc + 1)) in crypt_set_keyring_key() 2565 if (!strncmp(key_string, "logon:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2568 } else if (!strncmp(key_string, "user:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2572 !strncmp(key_string, "encrypted:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2576 !strncmp(key_string, "trusted:", key_desc - key_string + 1)) { in crypt_set_keyring_key() 2587 key = request_key(type, key_desc in crypt_set_keyring_key() [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | lsm_audit.h | 90 char *key_desc; member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | lsm_audit.h | 91 char *key_desc; member
|
/kernel/linux/linux-5.10/security/ |
H A D | lsm_audit.c | 411 if (a->u.key_struct.key_desc) { in dump_common_audit_data() 412 audit_log_format(ab, " key_desc="); in dump_common_audit_data() 413 audit_log_untrustedstring(ab, a->u.key_struct.key_desc); in dump_common_audit_data()
|
/kernel/linux/linux-6.6/security/ |
H A D | lsm_audit.c | 395 if (a->u.key_struct.key_desc) { in dump_common_audit_data() 396 audit_log_format(ab, " key_desc="); in dump_common_audit_data() 397 audit_log_untrustedstring(ab, a->u.key_struct.key_desc); in dump_common_audit_data()
|
/kernel/linux/linux-5.10/drivers/net/wireless/rsi/ |
H A D | rsi_mgmt.h | 472 __le16 key_desc; member
|
H A D | rsi_91x_mgmt.c | 841 set_key->key_desc = cpu_to_le16(key_descriptor); in rsi_hal_load_key()
|
/kernel/linux/linux-6.6/drivers/net/wireless/rsi/ |
H A D | rsi_mgmt.h | 472 __le16 key_desc; member
|
H A D | rsi_91x_mgmt.c | 841 set_key->key_desc = cpu_to_le16(key_descriptor); in rsi_hal_load_key()
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_lsm.c | 4350 ad.a.u.key_struct.key_desc = keyp->description; in smack_key_permission() 4421 ad.a.u.key_struct.key_desc = key->description; in smack_watch_key()
|
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_lsm.c | 4487 ad.a.u.key_struct.key_desc = keyp->description; in smack_key_permission() 4558 ad.a.u.key_struct.key_desc = key->description; in smack_watch_key()
|