/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | encrypted.c | 305 struct key *ukey; in request_user_key() local 307 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key() 308 if (IS_ERR(ukey)) in request_user_key() 311 down_read(&ukey->sem); in request_user_key() 312 upayload = user_key_payload_locked(ukey); in request_user_key() 315 up_read(&ukey->sem); in request_user_key() 316 key_put(ukey); in request_user_key() 317 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key() 323 return ukey; in request_user_key()
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | encrypted.c | 311 struct key *ukey; in request_user_key() local 313 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key() 314 if (IS_ERR(ukey)) in request_user_key() 317 down_read(&ukey->sem); in request_user_key() 318 upayload = user_key_payload_locked(ukey); in request_user_key() 321 up_read(&ukey->sem); in request_user_key() 322 key_put(ukey); in request_user_key() 323 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key() 329 return ukey; in request_user_key()
|
/kernel/linux/linux-5.10/net/tipc/ |
H A D | crypto.h | 168 int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, 176 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
|
H A D | crypto.c | 255 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, 328 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info) in tipc_aead_key_validate() argument 333 if (unlikely(!crypto_has_alg(ukey->alg_name, 0, 0))) { in tipc_aead_key_validate() 339 if (strcmp(ukey->alg_name, "gcm(aes)")) { in tipc_aead_key_validate() 345 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate() 497 * @ukey: pointer to user key data 507 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, in tipc_aead_init() argument 525 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init() 536 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0); in tipc_aead_init() 550 err |= crypto_aead_setkey(tfm, ukey in tipc_aead_init() 1123 tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, u8 mode, bool master_key) tipc_crypto_key_init() argument [all...] |
H A D | node.c | 2921 struct tipc_aead_key *ukey; in __tipc_nl_node_set_key() local 2946 rc = tipc_nl_retrieve_key(attrs, &ukey); in __tipc_nl_node_set_key() 2952 rc = tipc_aead_key_validate(ukey, info); in __tipc_nl_node_set_key() 2977 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key()
|
/kernel/linux/linux-6.6/net/tipc/ |
H A D | crypto.h | 168 int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, 176 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
|
H A D | crypto.c | 259 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, 331 * @ukey: pointer to user key data 334 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info) in tipc_aead_key_validate() argument 339 if (unlikely(!crypto_has_alg(ukey->alg_name, 0, 0))) { in tipc_aead_key_validate() 345 if (strcmp(ukey->alg_name, "gcm(aes)")) { in tipc_aead_key_validate() 351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate() 504 * @ukey: pointer to user key data 514 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, in tipc_aead_init() argument 532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init() 543 tfm = crypto_alloc_aead(ukey in tipc_aead_init() 1119 tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, u8 mode, bool master_key) tipc_crypto_key_init() argument [all...] |
H A D | node.c | 2967 struct tipc_aead_key *ukey; in __tipc_nl_node_set_key() local 2992 rc = tipc_nl_retrieve_key(attrs, &ukey); in __tipc_nl_node_set_key() 2998 rc = tipc_aead_key_validate(ukey, info); in __tipc_nl_node_set_key() 3023 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key()
|
/kernel/linux/linux-5.10/net/ceph/ |
H A D | ceph_common.c | 361 struct key *ukey; in get_secret() local 366 ukey = request_key(&key_type_ceph, name, NULL); in get_secret() 367 if (IS_ERR(ukey)) { in get_secret() 370 key_err = PTR_ERR(ukey); in get_secret() 392 ckey = ukey->payload.data[0]; in get_secret() 399 key_put(ukey); in get_secret()
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | ceph_common.c | 357 struct key *ukey; in get_secret() local 362 ukey = request_key(&key_type_ceph, name, NULL); in get_secret() 363 if (IS_ERR(ukey)) { in get_secret() 366 key_err = PTR_ERR(ukey); in get_secret() 388 ckey = ukey->payload.data[0]; in get_secret() 395 key_put(ukey); in get_secret()
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | syscall.c | 1000 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument 1003 return memdup_user(ukey, key_size); in __bpf_copy_key() 1005 if (ukey) in __bpf_copy_key() 1016 void __user *ukey = u64_to_user_ptr(attr->key); in map_lookup_elem() local 1046 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem() 1083 void __user *ukey = u64_to_user_ptr(attr->key); in map_update_elem() local 1111 key = __bpf_copy_key(ukey, map->key_size); in map_update_elem() 1150 void __user *ukey = u64_to_user_ptr(attr->key); in map_delete_elem() local 1170 key = __bpf_copy_key(ukey, map->key_size); in map_delete_elem() 1205 void __user *ukey in map_get_next_key() local 1493 void __user *ukey = u64_to_user_ptr(attr->key); map_lookup_and_delete_elem() local [all...] |
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | syscall.c | 1406 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument 1409 return vmemdup_user(ukey, key_size); in __bpf_copy_key() 1411 if (ukey) in __bpf_copy_key() 1417 static void *___bpf_copy_key(bpfptr_t ukey, u64 key_size) in ___bpf_copy_key() argument 1420 return kvmemdup_bpfptr(ukey, key_size); in ___bpf_copy_key() 1422 if (!bpfptr_is_null(ukey)) in ___bpf_copy_key() 1433 void __user *ukey = u64_to_user_ptr(attr->key); in map_lookup_elem() local 1463 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem() 1508 bpfptr_t ukey = make_bpfptr(attr->key, uattr.is_kernel); in map_update_elem() local 1536 key = ___bpf_copy_key(ukey, ma in map_update_elem() 1564 bpfptr_t ukey = make_bpfptr(attr->key, uattr.is_kernel); map_delete_elem() local 1619 void __user *ukey = u64_to_user_ptr(attr->key); map_get_next_key() local 1904 void __user *ukey = u64_to_user_ptr(attr->key); map_lookup_and_delete_elem() local [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | af_alg.c | 205 static int alg_setkey(struct sock *sk, sockptr_t ukey, unsigned int keylen) in alg_setkey() argument 217 if (copy_from_sockptr(key, ukey, keylen)) in alg_setkey()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | af_alg.c | 208 static int alg_setkey(struct sock *sk, sockptr_t ukey, unsigned int keylen) in alg_setkey() argument 220 if (copy_from_sockptr(key, ukey, keylen)) in alg_setkey()
|
/kernel/linux/linux-5.10/arch/arm64/kernel/ |
H A D | ptrace.c | 920 static struct ptrauth_key pac_key_from_user(__uint128_t ukey) in pac_key_from_user() argument 923 .lo = (unsigned long)ukey, in pac_key_from_user() 924 .hi = (unsigned long)(ukey >> 64), in pac_key_from_user()
|
/kernel/linux/linux-6.6/arch/arm64/kernel/ |
H A D | ptrace.c | 1268 static struct ptrauth_key pac_key_from_user(__uint128_t ukey) in pac_key_from_user() argument 1271 .lo = (unsigned long)ukey, in pac_key_from_user() 1272 .hi = (unsigned long)(ukey >> 64), in pac_key_from_user()
|
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | pkey_api.c | 1109 static void *_copy_key_from_user(void __user *ukey, size_t keylen) in _copy_key_from_user() argument 1111 if (!ukey || keylen < MINKEYBLOBSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user() 1114 return memdup_user(ukey, keylen); in _copy_key_from_user()
|
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | pkey_api.c | 1323 static void *_copy_key_from_user(void __user *ukey, size_t keylen) in _copy_key_from_user() argument 1325 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user() 1328 return memdup_user(ukey, keylen); in _copy_key_from_user()
|