Home
last modified time | relevance | path

Searched refs:master_key (Results 1 – 12 of 12) sorted by relevance

/openbmc/linux/security/keys/encrypted-keys/
H A Dencrypted.h9 const u8 **master_key, size_t *master_keylen);
12 const u8 **master_key, in request_trusted_key() argument
20 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() argument
23 master_key, master_keylen, 0); in dump_master_key()
49 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() argument
H A Dencrypted.c326 *master_key = upayload->data; in request_user_key()
356 const u8 *master_key, size_t master_keylen) in get_derived_key() argument
375 memcpy(derived_buf + strlen(derived_buf) + 1, master_key, in get_derived_key()
417 const u8 **master_key, size_t *master_keylen) in request_master_key() argument
425 master_key, master_keylen); in request_master_key()
430 master_key, master_keylen); in request_master_key()
446 dump_master_key(*master_key, *master_keylen); in request_master_key()
495 const u8 *master_key, size_t master_keylen) in datablob_hmac_append() argument
517 const u8 *format, const u8 *master_key, in datablob_hmac_verify() argument
686 const u8 *master_key; in encrypted_key_decrypt() local
[all …]
H A Dmasterkey_trusted.c28 const u8 **master_key, size_t *master_keylen) in request_trusted_key() argument
39 *master_key = tpayload->key; in request_trusted_key()
/openbmc/linux/drivers/net/ppp/
H A Dppp_mppe.c95 unsigned char master_key[MPPE_MAX_KEY_LEN]; member
134 crypto_shash_update(state->sha1, state->master_key, in get_new_key_from_sha()
177 if (optlen != CILEN_MPPE + sizeof(state->master_key) || in mppe_alloc()
209 memcpy(state->master_key, &options[CILEN_MPPE], in mppe_alloc()
210 sizeof(state->master_key)); in mppe_alloc()
211 memcpy(state->session_key, state->master_key, in mppe_alloc()
212 sizeof(state->master_key)); in mppe_alloc()
283 (int)sizeof(state->master_key), state->master_key, in mppe_init()
/openbmc/linux/net/tipc/
H A Dcrypto.h126 master_key:1, member
137 master_key:1,
169 u8 mode, bool master_key);
H A Dcrypto.c284 bool master_key);
1069 ehdr->master_key = aead->crypto->key_master; in tipc_ehdr_build()
1120 u8 mode, bool master_key) in tipc_crypto_key_init() argument
1130 rc = tipc_crypto_key_attach(c, aead, 0, master_key); in tipc_crypto_key_init()
1149 bool master_key) in tipc_crypto_key_attach() argument
1157 if (master_key) { in tipc_crypto_key_attach()
1194 c->key_master |= master_key; in tipc_crypto_key_attach()
1393 rx->key_master = ehdr->master_key; in tipc_crypto_key_synch()
H A Dnode.c2969 bool rekeying = true, master_key = false; in __tipc_nl_node_set_key() local
3007 master_key = !!(attrs[TIPC_NLA_NODE_KEY_MASTER]); in __tipc_nl_node_set_key()
3024 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key()
3033 if (!master_key && tipc_crypto_key_distr(tx, rc, NULL)) in __tipc_nl_node_set_key()
/openbmc/linux/fs/crypto/
H A Dhkdf.c68 int fscrypt_init_hkdf(struct fscrypt_hkdf *hkdf, const u8 *master_key, in fscrypt_init_hkdf() argument
87 err = hkdf_extract(hmac_tfm, master_key, master_key_size, prk); in fscrypt_init_hkdf()
H A Dkeysetup_v1.c47 static int derive_key_aes(const u8 *master_key, in derive_key_aes() argument
75 sg_init_one(&src_sg, master_key, derived_keysize); in derive_key_aes()
H A Dfscrypt_private.h309 int fscrypt_init_hkdf(struct fscrypt_hkdf *hkdf, const u8 *master_key,
/openbmc/qemu/crypto/
H A Dblock-luks.c1625 g_autofree uint8_t *master_key = NULL; in qcrypto_block_luks_amend_add_keyslot() local
1671 master_key = g_new0(uint8_t, luks->header.master_key_len); in qcrypto_block_luks_amend_add_keyslot()
1673 if (qcrypto_block_luks_find_key(block, old_password, master_key, in qcrypto_block_luks_amend_add_keyslot()
1686 if (qcrypto_block_luks_store_key(block, keyslot, new_password, master_key, in qcrypto_block_luks_amend_add_keyslot()
/openbmc/linux/Documentation/filesystems/
H A Dfscrypt.rst595 ``SHA-512(SHA-512(master_key))``, but this particular scheme is not