/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-verity-verify-sig.c | 35 const struct user_key_payload *ukp; in verity_verify_get_sig_from_key() local 45 ukp = user_key_payload_locked(key); in verity_verify_get_sig_from_key() 46 if (!ukp) { in verity_verify_get_sig_from_key() 51 sig_opts->sig = kmalloc(ukp->datalen, GFP_KERNEL); in verity_verify_get_sig_from_key() 56 sig_opts->sig_size = ukp->datalen; in verity_verify_get_sig_from_key() 58 memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); in verity_verify_get_sig_from_key()
|
H A D | dm-crypt.c | 2429 const struct user_key_payload *ukp; in set_key_user() local 2431 ukp = user_key_payload_locked(key); in set_key_user() 2432 if (!ukp) in set_key_user() 2435 if (cc->key_size != ukp->datalen) in set_key_user() 2438 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user()
|
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-verity-verify-sig.c | 35 const struct user_key_payload *ukp; in verity_verify_get_sig_from_key() local 45 ukp = user_key_payload_locked(key); in verity_verify_get_sig_from_key() 46 if (!ukp) { in verity_verify_get_sig_from_key() 51 sig_opts->sig = kmalloc(ukp->datalen, GFP_KERNEL); in verity_verify_get_sig_from_key() 56 sig_opts->sig_size = ukp->datalen; in verity_verify_get_sig_from_key() 58 memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); in verity_verify_get_sig_from_key()
|
H A D | dm-crypt.c | 2497 const struct user_key_payload *ukp; in set_key_user() local 2499 ukp = user_key_payload_locked(key); in set_key_user() 2500 if (!ukp) in set_key_user() 2503 if (cc->key_size != ukp->datalen) in set_key_user() 2506 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user()
|
/kernel/linux/linux-5.10/lib/ |
H A D | digsig.c | 81 const struct user_key_payload *ukp; in digsig_verify_rsa() local 85 ukp = user_key_payload_locked(key); in digsig_verify_rsa() 87 if (!ukp) { in digsig_verify_rsa() 93 if (ukp->datalen < sizeof(*pkh)) in digsig_verify_rsa() 96 pkh = (struct pubkey_hdr *)ukp->data; in digsig_verify_rsa() 108 endp = ukp->data + ukp->datalen; in digsig_verify_rsa()
|
/kernel/linux/linux-6.6/lib/ |
H A D | digsig.c | 81 const struct user_key_payload *ukp; in digsig_verify_rsa() local 85 ukp = user_key_payload_locked(key); in digsig_verify_rsa() 87 if (!ukp) { in digsig_verify_rsa() 93 if (ukp->datalen < sizeof(*pkh)) in digsig_verify_rsa() 96 pkh = (struct pubkey_hdr *)ukp->data; in digsig_verify_rsa() 108 endp = ukp->data + ukp->datalen; in digsig_verify_rsa()
|
/kernel/linux/linux-5.10/fs/crypto/ |
H A D | keysetup_v1.c | 99 const struct user_key_payload *ukp; in find_and_lock_process_key() local 113 ukp = user_key_payload_locked(key); in find_and_lock_process_key() 115 if (!ukp) /* was the key revoked before we acquired its semaphore? */ in find_and_lock_process_key() 118 payload = (const struct fscrypt_key *)ukp->data; in find_and_lock_process_key() 120 if (ukp->datalen != sizeof(struct fscrypt_key) || in find_and_lock_process_key()
|
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | keysetup_v1.c | 99 const struct user_key_payload *ukp; in find_and_lock_process_key() local 113 ukp = user_key_payload_locked(key); in find_and_lock_process_key() 115 if (!ukp) /* was the key revoked before we acquired its semaphore? */ in find_and_lock_process_key() 118 payload = (const struct fscrypt_key *)ukp->data; in find_and_lock_process_key() 120 if (ukp->datalen != sizeof(struct fscrypt_key) || in find_and_lock_process_key()
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | auth.c | 260 const struct user_key_payload *ukp; in ubifs_init_authentication() local 296 ukp = user_key_payload_locked(keyring_key); in ubifs_init_authentication() 297 if (!ukp) { in ubifs_init_authentication() 334 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | auth.c | 259 const struct user_key_payload *ukp; in ubifs_init_authentication() local 295 ukp = user_key_payload_locked(keyring_key); in ubifs_init_authentication() 296 if (!ukp) { in ubifs_init_authentication() 333 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication()
|
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 115 struct user_key_payload *ukp; in ecryptfs_get_key_payload_data() local 121 ukp = user_key_payload_locked(key); in ecryptfs_get_key_payload_data() 122 if (!ukp) in ecryptfs_get_key_payload_data() 125 return (struct ecryptfs_auth_tok *)ukp->data; in ecryptfs_get_key_payload_data()
|
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 115 struct user_key_payload *ukp; in ecryptfs_get_key_payload_data() local 121 ukp = user_key_payload_locked(key); in ecryptfs_get_key_payload_data() 122 if (!ukp) in ecryptfs_get_key_payload_data() 125 return (struct ecryptfs_auth_tok *)ukp->data; in ecryptfs_get_key_payload_data()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | af_alg.c | 236 const struct user_key_payload *ukp; in key_data_ptr_user() local 238 ukp = user_key_payload_locked(key); in key_data_ptr_user() 239 if (IS_ERR_OR_NULL(ukp)) in key_data_ptr_user() 244 return ukp->data; in key_data_ptr_user()
|