Home
last modified time | relevance | path

Searched refs:authkey (Results 1 – 25 of 33) sorted by relevance

12

/linux-6.12.1/security/keys/
Drequest_key_auth.c167 struct key *authkey = NULL; in request_key_auth_new() local
216 authkey = key_alloc(&key_type_request_key_auth, desc, in request_key_auth_new()
220 if (IS_ERR(authkey)) { in request_key_auth_new()
221 ret = PTR_ERR(authkey); in request_key_auth_new()
226 ret = key_instantiate_and_link(authkey, rka, 0, NULL, NULL); in request_key_auth_new()
230 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new()
231 return authkey; in request_key_auth_new()
234 key_put(authkey); in request_key_auth_new()
259 struct key *authkey; in key_get_instantiation_authkey() local
269 authkey = ERR_CAST(authkey_ref); in key_get_instantiation_authkey()
[all …]
Drequest_key.c59 void complete_request_key(struct key *authkey, int error) in complete_request_key() argument
61 struct request_key_auth *rka = get_request_key_auth(authkey); in complete_request_key()
64 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key()
67 key_negate_and_link(key, key_negative_timeout, NULL, authkey); in complete_request_key()
69 key_revoke(authkey); in complete_request_key()
118 static int call_sbin_request_key(struct key *authkey, void *aux) in call_sbin_request_key() argument
121 struct request_key_auth *rka = get_request_key_auth(authkey); in call_sbin_request_key()
130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key()
150 ret = key_link(keyring, authkey); in call_sbin_request_key()
216 complete_request_key(authkey, ret); in call_sbin_request_key()
[all …]
Dkey.c429 struct key *authkey, in __key_instantiate_and_link() argument
465 if (authkey) in __key_instantiate_and_link()
466 key_invalidate(authkey); in __key_instantiate_and_link()
502 struct key *authkey) in key_instantiate_and_link() argument
539 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link()
578 struct key *authkey) in key_reject_and_link() argument
621 if (authkey) in key_reject_and_link()
622 key_invalidate(authkey); in key_reject_and_link()
Dkeyctl.c1518 struct key *authkey; in keyctl_assume_authority() local
1537 authkey = key_get_instantiation_authkey(id); in keyctl_assume_authority()
1538 if (IS_ERR(authkey)) { in keyctl_assume_authority()
1539 ret = PTR_ERR(authkey); in keyctl_assume_authority()
1543 ret = keyctl_change_reqkey_auth(authkey); in keyctl_assume_authority()
1545 ret = authkey->serial; in keyctl_assume_authority()
1546 key_put(authkey); in keyctl_assume_authority()
/linux-6.12.1/include/linux/
Dkey-type.h175 struct key *authkey);
180 struct key *authkey);
181 extern void complete_request_key(struct key *authkey, int error);
186 struct key *authkey) in key_negate_and_link() argument
188 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link()
/linux-6.12.1/fs/nfs/
Dnfs4idmap.c64 struct key *authkey; member
567 complete_request_key(data->authkey, ret); in nfs_idmap_complete_pipe_upcall()
568 key_put(data->authkey); in nfs_idmap_complete_pipe_upcall()
580 static int nfs_idmap_legacy_upcall(struct key *authkey, void *aux) in nfs_idmap_legacy_upcall() argument
583 struct request_key_auth *rka = get_request_key_auth(authkey); in nfs_idmap_legacy_upcall()
602 data->authkey = key_get(authkey); in nfs_idmap_legacy_upcall()
620 complete_request_key(authkey, ret); in nfs_idmap_legacy_upcall()
624 static int nfs_idmap_instantiate(struct key *key, struct key *authkey, char *data, size_t datalen) in nfs_idmap_instantiate() argument
628 authkey); in nfs_idmap_instantiate()
633 struct key *key, struct key *authkey) in nfs_idmap_read_and_verify_message() argument
[all …]
/linux-6.12.1/drivers/crypto/qce/
Dsha.h20 u8 authkey[QCE_SHA_MAX_BLOCKSIZE]; member
56 u8 *authkey; member
Dsha.c86 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle()
89 rctx->authkey = ctx->authkey; in qce_ahash_async_req_handle()
344 memset(ctx->authkey, 0, sizeof(ctx->authkey)); in qce_ahash_hmac_setkey()
347 memcpy(ctx->authkey, key, keylen); in qce_ahash_hmac_setkey()
381 ahash_request_set_crypt(req, &sg, ctx->authkey, keylen); in qce_ahash_hmac_setkey()
Dcommon.c181 qce_cpu_to_be32p_array(mackey, rctx->authkey, rctx->authklen); in qce_setup_regs_ahash()
429 u32 authkey[QCE_SHA_HMAC_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local
470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
471 qce_write_array(qce, REG_AUTH_KEY0, (u32 *)authkey, authkey_words); in qce_setup_regs_aead()
Daead.c646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
/linux-6.12.1/include/crypto/
Dauthenc.h22 const u8 *authkey; member
/linux-6.12.1/drivers/crypto/bcm/
Dcipher.c706 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_ahash_req()
1311 hash_parms.key_buf = (u8 *)ctx->authkey; in handle_aead_req()
1934 NULL, 0, NULL, 0, ctx->authkey, in ahash_enqueue()
2050 ret = crypto_shash_setkey(hash, ctx->authkey, in ahash_init()
2279 memcpy(ctx->authkey, key, keylen); in ahash_setkey()
2332 rc = do_shash("md5", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey()
2336 rc = do_shash("sha1", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey()
2340 rc = do_shash("sha224", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey()
2344 rc = do_shash("sha256", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey()
2348 rc = do_shash("sha384", ctx->authkey, key, keylen, NULL, in ahash_hmac_setkey()
[all …]
Dcipher.h183 u8 authkey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
/linux-6.12.1/drivers/crypto/intel/ixp4xx/
Dixp4xx_crypto.c182 u8 authkey[MAX_KEYLEN]; member
1223 ret = setup_auth(&tfm->base, 0, authsize, ctx->authkey, in aead_setup()
1227 ret = setup_auth(&tfm->base, 1, authsize, ctx->authkey, in aead_setup()
1253 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey()
1259 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey()
1283 if (keys.authkeylen > sizeof(ctx->authkey)) in des3_aead_setkey()
1290 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in des3_aead_setkey()
/linux-6.12.1/drivers/crypto/
Dsa2ul.h314 u8 authkey[SHA512_BLOCK_SIZE]; member
Dsa2ul.c1462 memset(ctx->authkey, 0, bs); in sa_sha_setup()
1836 cfg.akey = keys.authkey; in sa_aead_setkey()
1841 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey()
1855 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey()
/linux-6.12.1/crypto/
Dauthenc.c77 keys->authkey = key; in crypto_authenc_extractkeys()
99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
Dauthencesn.c73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
Dessiv.c115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
/linux-6.12.1/drivers/crypto/ccree/
Dcc_aead.c410 static int cc_get_plain_hmac_key(struct crypto_aead *tfm, const u8 *authkey, in cc_get_plain_hmac_key() argument
443 key = kmemdup(authkey, keylen, GFP_KERNEL); in cc_get_plain_hmac_key()
549 const u8 *enckey, *authkey; in cc_aead_setkey() local
564 authkey = keys.authkey; in cc_aead_setkey()
583 authkey = NULL; in cc_aead_setkey()
599 memcpy(ctx->auth_state.xcbc.xcbc_keys, authkey, in cc_aead_setkey()
602 rc = cc_get_plain_hmac_key(tfm, authkey, ctx->auth_keylen); in cc_aead_setkey()
/linux-6.12.1/net/sctp/
Dsocket.c3631 struct sctp_authkey *authkey, in sctp_setsockopt_auth_key() argument
3643 optlen = min_t(unsigned int, optlen, USHRT_MAX + sizeof(*authkey)); in sctp_setsockopt_auth_key()
3645 if (authkey->sca_keylength > optlen - sizeof(*authkey)) in sctp_setsockopt_auth_key()
3648 asoc = sctp_id2assoc(sk, authkey->sca_assoc_id); in sctp_setsockopt_auth_key()
3649 if (!asoc && authkey->sca_assoc_id > SCTP_ALL_ASSOC && in sctp_setsockopt_auth_key()
3654 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key()
3659 authkey->sca_assoc_id = SCTP_FUTURE_ASSOC; in sctp_setsockopt_auth_key()
3661 if (authkey->sca_assoc_id == SCTP_FUTURE_ASSOC || in sctp_setsockopt_auth_key()
3662 authkey->sca_assoc_id == SCTP_ALL_ASSOC) { in sctp_setsockopt_auth_key()
3663 ret = sctp_auth_set_key(ep, asoc, authkey); in sctp_setsockopt_auth_key()
[all …]
/linux-6.12.1/drivers/crypto/intel/qat/qat_common/
Dqat_algs.c264 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session()
351 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
/linux-6.12.1/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.c761 ret = crypto_shash_digest(&ctx->sdesc->shash, keys->authkey, in aead_hmac_init()
767 memcpy(ctx->key, keys->authkey, authkeylen); in aead_hmac_init()
/linux-6.12.1/drivers/crypto/marvell/octeontx2/
Dotx2_cptvf_algs.c849 ret = crypto_shash_digest(&ctx->sdesc->shash, keys->authkey, in aead_hmac_init()
856 memcpy(ctx->key, keys->authkey, authkeylen); in aead_hmac_init()
/linux-6.12.1/drivers/crypto/caam/
Dcaamalg_qi.c230 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey()
239 ret = gen_split_key(jrdev, ctx->key, &ctx->adata, keys.authkey, in aead_setkey()

12