Home
last modified time | relevance | path

Searched refs:ukey (Results 1 – 10 of 10) sorted by relevance

/openbmc/phosphor-networkd/src/
H A Dsystem_queries.cpp58 auto ukey = std::make_tuple(std::string(ifname), cmd); in optionalIFReq() local
69 if (unsupported.find(ukey) == unsupported.end()) in optionalIFReq()
71 unsupported.emplace(std::move(ukey)); in optionalIFReq()
79 unsupported.erase(ukey); in optionalIFReq()
/openbmc/linux/security/keys/encrypted-keys/
H A Dencrypted.c311 struct key *ukey; in request_user_key() local
313 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key()
314 if (IS_ERR(ukey)) in request_user_key()
317 down_read(&ukey->sem); in request_user_key()
318 upayload = user_key_payload_locked(ukey); in request_user_key()
321 up_read(&ukey->sem); in request_user_key()
322 key_put(ukey); in request_user_key()
323 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key()
329 return ukey; in request_user_key()
/openbmc/linux/net/tipc/
H A Dcrypto.h168 int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey,
176 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
H A Dcrypto.c259 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey,
334 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info) in tipc_aead_key_validate() argument
339 if (unlikely(!crypto_has_alg(ukey->alg_name, 0, 0))) { in tipc_aead_key_validate()
345 if (strcmp(ukey->alg_name, "gcm(aes)")) { in tipc_aead_key_validate()
351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate()
514 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, in tipc_aead_init() argument
532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init()
543 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0); in tipc_aead_init()
557 err |= crypto_aead_setkey(tfm, ukey->key, keylen); in tipc_aead_init()
592 bin2hex(tmp->hint, ukey->key + keylen - TIPC_AEAD_HINT_LEN, in tipc_aead_init()
[all …]
H A Dnode.c2968 struct tipc_aead_key *ukey; in __tipc_nl_node_set_key() local
2993 rc = tipc_nl_retrieve_key(attrs, &ukey); in __tipc_nl_node_set_key()
2999 rc = tipc_aead_key_validate(ukey, info); in __tipc_nl_node_set_key()
3024 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key()
/openbmc/linux/net/ceph/
H A Dceph_common.c357 struct key *ukey; in get_secret() local
362 ukey = request_key(&key_type_ceph, name, NULL); in get_secret()
363 if (IS_ERR(ukey)) { in get_secret()
366 key_err = PTR_ERR(ukey); in get_secret()
388 ckey = ukey->payload.data[0]; in get_secret()
395 key_put(ukey); in get_secret()
/openbmc/linux/kernel/bpf/
H A Dsyscall.c1418 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument
1421 return vmemdup_user(ukey, key_size); in __bpf_copy_key()
1423 if (ukey) in __bpf_copy_key()
1429 static void *___bpf_copy_key(bpfptr_t ukey, u64 key_size) in ___bpf_copy_key() argument
1432 return kvmemdup_bpfptr(ukey, key_size); in ___bpf_copy_key()
1434 if (!bpfptr_is_null(ukey)) in ___bpf_copy_key()
1445 void __user *ukey = u64_to_user_ptr(attr->key); in map_lookup_elem() local
1475 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem()
1520 bpfptr_t ukey = make_bpfptr(attr->key, uattr.is_kernel); in map_update_elem() local
1548 key = ___bpf_copy_key(ukey, map->key_size); in map_update_elem()
[all …]
/openbmc/linux/crypto/
H A Daf_alg.c208 static int alg_setkey(struct sock *sk, sockptr_t ukey, unsigned int keylen) in alg_setkey() argument
220 if (copy_from_sockptr(key, ukey, keylen)) in alg_setkey()
/openbmc/linux/arch/arm64/kernel/
H A Dptrace.c1265 static struct ptrauth_key pac_key_from_user(__uint128_t ukey) in pac_key_from_user() argument
1268 .lo = (unsigned long)ukey, in pac_key_from_user()
1269 .hi = (unsigned long)(ukey >> 64), in pac_key_from_user()
/openbmc/linux/drivers/s390/crypto/
H A Dpkey_api.c1323 static void *_copy_key_from_user(void __user *ukey, size_t keylen) in _copy_key_from_user() argument
1325 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user()
1328 return memdup_user(ukey, keylen); in _copy_key_from_user()