Searched defs:datalen (Results 1 - 11 of 11) sorted by relevance

/security/integrity/
H A Ddigsig_asymmetric.c68 int siglen, const char *data, int datalen)
94 pks.digest_size = datalen;
67 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
H A Dintegrity.h151 int siglen, const char *data, int datalen);
154 int siglen, const char *data, int datalen)
153 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
/security/keys/
H A Dbig_key.c53 size_t datalen = prep->datalen; local
57 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data)
63 prep->type_data[1] = (void *)(unsigned long)datalen;
65 if (datalen > BIG_KEY_FILE_THRESHOLD) {
71 file = shmem_kernel_file_setup("", datalen, 0);
77 written = kernel_write(file, prep->data, prep->datalen, 0);
78 if (written != datalen) {
93 void *data = kmalloc(datalen, GFP_KERNE
155 unsigned long datalen = key->type_data.x[1]; local
171 unsigned long datalen = key->type_data.x[1]; local
[all...]
H A Duser_defined.c66 size_t datalen = prep->datalen; local
68 if (datalen <= 0 || datalen > 32767 || !prep->data)
71 upayload = kmalloc(sizeof(*upayload) + datalen, GFP_KERNEL);
76 prep->quotalen = datalen;
78 upayload->datalen = datalen;
79 memcpy(upayload->data, prep->data, datalen);
100 size_t datalen local
[all...]
H A Drequest_key_auth.c88 size_t datalen; local
91 datalen = rka->callout_len;
92 ret = datalen;
96 if (buflen > datalen)
97 buflen = datalen;
H A Dkey.c292 key->datalen = type->def_datalen;
356 * @datalen: The amount of data payload the caller now wants.
364 int key_payload_reserve(struct key *key, size_t datalen) argument
366 int delta = (int)datalen - key->datalen;
392 key->datalen = datalen;
461 * @datalen: The length of @data.
475 size_t datalen,
485 prep.datalen
473 key_instantiate_and_link(struct key *key, const void *data, size_t datalen, struct key *keyring, struct key *authkey) argument
[all...]
H A Dtrusted.c59 static int TSS_sha1(const unsigned char *data, unsigned int datalen, argument
71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest);
460 const unsigned char *data, uint32_t datalen,
499 datsize = htonl(datalen);
514 sizeof(uint32_t), &datsize, datalen, data, 0,
523 &datsize, datalen, data, 0, 0);
531 store32(tb, TPM_SEAL_SIZE + pcrinfosize + datalen);
537 store32(tb, datalen);
538 storebytes(tb, data, datalen);
577 unsigned char *data, unsigned int *datalen)
458 tpm_seal(struct tpm_buf *tb, uint16_t keytype, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *data, uint32_t datalen, unsigned char *blob, uint32_t *bloblen, const unsigned char *blobauth, const unsigned char *pcrinfo, uint32_t pcrinfosize) argument
573 tpm_unseal(struct tpm_buf *tb, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *blob, int bloblen, const unsigned char *blobauth, unsigned char *data, unsigned int *datalen) argument
903 size_t datalen = prep->datalen; local
990 size_t datalen = prep->datalen; local
[all...]
/security/integrity/ima/
H A Dima_fs.c102 void ima_putc(struct seq_file *m, void *data, int datalen) argument
104 while (datalen--)
252 size_t datalen, loff_t *ppos)
257 if (datalen >= PAGE_SIZE)
258 datalen = PAGE_SIZE - 1;
266 data = kmalloc(datalen + 1, GFP_KERNEL);
270 *(data + datalen) = '\0';
273 if (copy_from_user(data, buf, datalen))
251 ima_write_policy(struct file *file, const char __user *buf, size_t datalen, loff_t *ppos) argument
H A Dima_template_lib.c34 static int ima_write_template_field_data(const void *data, const u32 datalen, argument
39 u32 buflen = datalen;
42 buflen = datalen + 1;
48 memcpy(buf, data, datalen);
58 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++)
H A Dima_crypto.c508 u32 datalen = field_data[i].len; local
517 memcpy(buffer, data_to_hash, datalen);
519 datalen = IMA_EVENT_NAME_LEN_MAX + 1;
521 rc = crypto_shash_update(shash, data_to_hash, datalen);
/security/keys/encrypted-keys/
H A Dencrypted.c289 /* copy datablob master_desc and datalen strings */
291 epayload->master_desc, epayload->datalen);
319 *master_keylen = upayload->datalen;
601 const char *datalen)
612 ret = kstrtol(datalen, 10, &dlen);
633 + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen;
709 const char *datalen)
716 epayload->datalen = epayload->master_desc + strlen(master_desc) + 1;
717 epayload->iv = epayload->datalen + strlen(datalen)
598 encrypted_key_alloc(struct key *key, const char *format, const char *master_desc, const char *datalen) argument
707 __ekey_init(struct encrypted_key_payload *epayload, const char *format, const char *master_desc, const char *datalen) argument
741 encrypted_init(struct encrypted_key_payload *epayload, const char *key_desc, const char *format, const char *master_desc, const char *datalen, const char *hex_encoded_iv) argument
785 size_t datalen = prep->datalen; local
845 size_t datalen = prep->datalen; local
[all...]

Completed in 79 milliseconds