/security/integrity/ |
H A D | digsig_asymmetric.c | 68 int siglen, const char *data, int datalen) 94 pks.digest_size = datalen; 67 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
|
H A D | integrity.h | 151 int siglen, const char *data, int datalen); 154 int siglen, const char *data, int datalen) 153 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
|
/security/keys/ |
H A D | big_key.c | 53 size_t datalen = prep->datalen; local 57 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) 63 prep->type_data[1] = (void *)(unsigned long)datalen; 65 if (datalen > BIG_KEY_FILE_THRESHOLD) { 71 file = shmem_kernel_file_setup("", datalen, 0); 77 written = kernel_write(file, prep->data, prep->datalen, 0); 78 if (written != datalen) { 93 void *data = kmalloc(datalen, GFP_KERNE 155 unsigned long datalen = key->type_data.x[1]; local 171 unsigned long datalen = key->type_data.x[1]; local [all...] |
H A D | user_defined.c | 66 size_t datalen = prep->datalen; local 68 if (datalen <= 0 || datalen > 32767 || !prep->data) 71 upayload = kmalloc(sizeof(*upayload) + datalen, GFP_KERNEL); 76 prep->quotalen = datalen; 78 upayload->datalen = datalen; 79 memcpy(upayload->data, prep->data, datalen); 100 size_t datalen local [all...] |
H A D | request_key_auth.c | 88 size_t datalen; local 91 datalen = rka->callout_len; 92 ret = datalen; 96 if (buflen > datalen) 97 buflen = datalen;
|
H A D | key.c | 292 key->datalen = type->def_datalen; 356 * @datalen: The amount of data payload the caller now wants. 364 int key_payload_reserve(struct key *key, size_t datalen) argument 366 int delta = (int)datalen - key->datalen; 392 key->datalen = datalen; 461 * @datalen: The length of @data. 475 size_t datalen, 485 prep.datalen 473 key_instantiate_and_link(struct key *key, const void *data, size_t datalen, struct key *keyring, struct key *authkey) argument [all...] |
H A D | trusted.c | 59 static int TSS_sha1(const unsigned char *data, unsigned int datalen, argument 71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); 460 const unsigned char *data, uint32_t datalen, 499 datsize = htonl(datalen); 514 sizeof(uint32_t), &datsize, datalen, data, 0, 523 &datsize, datalen, data, 0, 0); 531 store32(tb, TPM_SEAL_SIZE + pcrinfosize + datalen); 537 store32(tb, datalen); 538 storebytes(tb, data, datalen); 577 unsigned char *data, unsigned int *datalen) 458 tpm_seal(struct tpm_buf *tb, uint16_t keytype, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *data, uint32_t datalen, unsigned char *blob, uint32_t *bloblen, const unsigned char *blobauth, const unsigned char *pcrinfo, uint32_t pcrinfosize) argument 573 tpm_unseal(struct tpm_buf *tb, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *blob, int bloblen, const unsigned char *blobauth, unsigned char *data, unsigned int *datalen) argument 903 size_t datalen = prep->datalen; local 990 size_t datalen = prep->datalen; local [all...] |
/security/integrity/ima/ |
H A D | ima_fs.c | 102 void ima_putc(struct seq_file *m, void *data, int datalen) argument 104 while (datalen--) 252 size_t datalen, loff_t *ppos) 257 if (datalen >= PAGE_SIZE) 258 datalen = PAGE_SIZE - 1; 266 data = kmalloc(datalen + 1, GFP_KERNEL); 270 *(data + datalen) = '\0'; 273 if (copy_from_user(data, buf, datalen)) 251 ima_write_policy(struct file *file, const char __user *buf, size_t datalen, loff_t *ppos) argument
|
H A D | ima_template_lib.c | 34 static int ima_write_template_field_data(const void *data, const u32 datalen, argument 39 u32 buflen = datalen; 42 buflen = datalen + 1; 48 memcpy(buf, data, datalen); 58 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++)
|
H A D | ima_crypto.c | 508 u32 datalen = field_data[i].len; local 517 memcpy(buffer, data_to_hash, datalen); 519 datalen = IMA_EVENT_NAME_LEN_MAX + 1; 521 rc = crypto_shash_update(shash, data_to_hash, datalen);
|
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 289 /* copy datablob master_desc and datalen strings */ 291 epayload->master_desc, epayload->datalen); 319 *master_keylen = upayload->datalen; 601 const char *datalen) 612 ret = kstrtol(datalen, 10, &dlen); 633 + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen; 709 const char *datalen) 716 epayload->datalen = epayload->master_desc + strlen(master_desc) + 1; 717 epayload->iv = epayload->datalen + strlen(datalen) 598 encrypted_key_alloc(struct key *key, const char *format, const char *master_desc, const char *datalen) argument 707 __ekey_init(struct encrypted_key_payload *epayload, const char *format, const char *master_desc, const char *datalen) argument 741 encrypted_init(struct encrypted_key_payload *epayload, const char *key_desc, const char *format, const char *master_desc, const char *datalen, const char *hex_encoded_iv) argument 785 size_t datalen = prep->datalen; local 845 size_t datalen = prep->datalen; local [all...] |