Home
last modified time | relevance | path

Searched refs:ukp (Results 1 – 6 of 6) sorted by relevance

/kernel/linux/linux-5.10/drivers/md/
Ddm-verity-verify-sig.c35 const struct user_key_payload *ukp; in verity_verify_get_sig_from_key() local
45 ukp = user_key_payload_locked(key); in verity_verify_get_sig_from_key()
46 if (!ukp) { in verity_verify_get_sig_from_key()
51 sig_opts->sig = kmalloc(ukp->datalen, GFP_KERNEL); in verity_verify_get_sig_from_key()
56 sig_opts->sig_size = ukp->datalen; in verity_verify_get_sig_from_key()
58 memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); in verity_verify_get_sig_from_key()
Ddm-crypt.c2425 const struct user_key_payload *ukp; in set_key_user() local
2427 ukp = user_key_payload_locked(key); in set_key_user()
2428 if (!ukp) in set_key_user()
2431 if (cc->key_size != ukp->datalen) in set_key_user()
2434 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user()
/kernel/linux/linux-5.10/lib/
Ddigsig.c81 const struct user_key_payload *ukp; in digsig_verify_rsa() local
85 ukp = user_key_payload_locked(key); in digsig_verify_rsa()
87 if (!ukp) { in digsig_verify_rsa()
93 if (ukp->datalen < sizeof(*pkh)) in digsig_verify_rsa()
96 pkh = (struct pubkey_hdr *)ukp->data; in digsig_verify_rsa()
108 endp = ukp->data + ukp->datalen; in digsig_verify_rsa()
/kernel/linux/linux-5.10/fs/crypto/
Dkeysetup_v1.c99 const struct user_key_payload *ukp; in find_and_lock_process_key() local
113 ukp = user_key_payload_locked(key); in find_and_lock_process_key()
115 if (!ukp) /* was the key revoked before we acquired its semaphore? */ in find_and_lock_process_key()
118 payload = (const struct fscrypt_key *)ukp->data; in find_and_lock_process_key()
120 if (ukp->datalen != sizeof(struct fscrypt_key) || in find_and_lock_process_key()
/kernel/linux/linux-5.10/fs/ubifs/
Dauth.c260 const struct user_key_payload *ukp; in ubifs_init_authentication() local
296 ukp = user_key_payload_locked(keyring_key); in ubifs_init_authentication()
297 if (!ukp) { in ubifs_init_authentication()
334 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication()
/kernel/linux/linux-5.10/fs/ecryptfs/
Decryptfs_kernel.h115 struct user_key_payload *ukp; in ecryptfs_get_key_payload_data() local
121 ukp = user_key_payload_locked(key); in ecryptfs_get_key_payload_data()
122 if (!ukp) in ecryptfs_get_key_payload_data()
125 return (struct ecryptfs_auth_tok *)ukp->data; in ecryptfs_get_key_payload_data()