Searched refs:datablob (Results 1 – 8 of 8) sorted by relevance
/linux-6.12.1/security/keys/trusted-keys/ |
D | trusted_core.c | 77 static int datablob_parse(char **datablob, struct trusted_key_payload *p) in datablob_parse() argument 86 c = strsep(datablob, " \t"); in datablob_parse() 93 c = strsep(datablob, " \t"); in datablob_parse() 104 c = strsep(datablob, " \t"); in datablob_parse() 155 char *datablob, *orig_datablob; in trusted_instantiate() local 163 orig_datablob = datablob = kmalloc(datalen + 1, GFP_KERNEL); in trusted_instantiate() 164 if (!datablob) in trusted_instantiate() 166 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 167 datablob[datalen] = '\0'; in trusted_instantiate() 175 key_cmd = datablob_parse(&datablob, payload); in trusted_instantiate() [all …]
|
D | trusted_caam.c | 19 static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob) in trusted_caam_seal() argument 36 static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob) in trusted_caam_unseal() argument
|
D | trusted_tee.c | 63 static int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) in trusted_tee_seal() argument 110 static int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tee_unseal() argument
|
D | trusted_dcp.c | 200 static int trusted_dcp_seal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_seal() argument 237 static int trusted_dcp_unseal(struct trusted_key_payload *p, char *datablob) in trusted_dcp_unseal() argument
|
D | trusted_tpm1.c | 899 static int trusted_tpm_seal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_seal() argument 913 ret = getoptions(datablob, p, options); in trusted_tpm_seal() 944 static int trusted_tpm_unseal(struct trusted_key_payload *p, char *datablob) in trusted_tpm_unseal() argument 958 ret = getoptions(datablob, p, options); in trusted_tpm_unseal()
|
/linux-6.12.1/security/keys/encrypted-keys/ |
D | encrypted.c | 176 static int datablob_parse(char *datablob, const char **format, in datablob_parse() argument 186 keyword = strsep(&datablob, " \t"); in datablob_parse() 194 p = strsep(&datablob, " \t"); in datablob_parse() 206 *master_desc = strsep(&datablob, " \t"); in datablob_parse() 225 *decrypted_datalen = strsep(&datablob, " \t"); in datablob_parse() 239 *decrypted_data = strsep(&datablob, " \t"); in datablob_parse() 248 *hex_encoded_iv = strsep(&datablob, " \t"); in datablob_parse() 817 char *datablob = NULL; in encrypted_instantiate() local 829 datablob = kmalloc(datalen + 1, GFP_KERNEL); in encrypted_instantiate() 830 if (!datablob) in encrypted_instantiate() [all …]
|
/linux-6.12.1/include/keys/ |
D | trusted-type.h | 62 int (*seal)(struct trusted_key_payload *p, char *datablob); 65 int (*unseal)(struct trusted_key_payload *p, char *datablob);
|
/linux-6.12.1/Documentation/security/keys/ |
D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|