• Home
  • Raw
  • Download

Lines Matching full:payload

31 static int tpm2_key_encode(struct trusted_key_payload *payload,  in tpm2_key_encode()  argument
84 work1 = payload->blob; in tpm2_key_encode()
85 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob), in tpm2_key_encode()
94 return work1 - payload->blob; in tpm2_key_encode()
109 static int tpm2_key_decode(struct trusted_key_payload *payload, in tpm2_key_decode() argument
119 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob, in tpm2_key_decode()
120 payload->blob_len); in tpm2_key_decode()
232 * tpm2_seal_trusted() - seal the payload of a trusted key
235 * @payload: the key data in clear and encrypted form
241 struct trusted_key_payload *payload, in tpm2_seal_trusted() argument
282 tpm_buf_append_u16(&buf, 4 + options->blobauth_len + payload->key_len); in tpm2_seal_trusted()
288 tpm_buf_append_u16(&buf, payload->key_len); in tpm2_seal_trusted()
289 tpm_buf_append(&buf, payload->key, payload->key_len); in tpm2_seal_trusted()
299 flags |= payload->migratable ? 0 : (TPM2_OA_FIXED_TPM | in tpm2_seal_trusted()
338 blob_len = tpm2_key_encode(payload, options, in tpm2_seal_trusted()
354 payload->blob_len = blob_len; in tpm2_seal_trusted()
364 * @payload: the key data in clear and encrypted form
369 * -E2BIG on wrong payload size.
374 struct trusted_key_payload *payload, in tpm2_load_cmd() argument
386 rc = tpm2_key_decode(payload, options, &blob); in tpm2_load_cmd()
389 blob = payload->blob; in tpm2_load_cmd()
390 payload->old_format = 1; in tpm2_load_cmd()
398 if (payload->blob_len < 4) in tpm2_load_cmd()
404 if (private_len + 2 + 2 > (payload->blob_len)) in tpm2_load_cmd()
408 if (private_len + 2 + public_len + 2 > payload->blob_len) in tpm2_load_cmd()
417 payload->migratable = 0; in tpm2_load_cmd()
419 payload->migratable = 1; in tpm2_load_cmd()
422 if (blob_len > payload->blob_len) in tpm2_load_cmd()
449 if (blob != payload->blob) in tpm2_load_cmd()
463 * @payload: the key data in clear and encrypted form
472 struct trusted_key_payload *payload, in tpm2_unseal_cmd() argument
512 if (payload->old_format) { in tpm2_unseal_cmd()
514 memcpy(payload->key, data, data_len - 1); in tpm2_unseal_cmd()
515 payload->key_len = data_len - 1; in tpm2_unseal_cmd()
516 payload->migratable = data[data_len - 1]; in tpm2_unseal_cmd()
522 memcpy(payload->key, data, data_len); in tpm2_unseal_cmd()
523 payload->key_len = data_len; in tpm2_unseal_cmd()
533 * tpm2_unseal_trusted() - unseal the payload of a trusted key
536 * @payload: the key data in clear and encrypted form
542 struct trusted_key_payload *payload, in tpm2_unseal_trusted() argument
552 rc = tpm2_load_cmd(chip, payload, options, &blob_handle); in tpm2_unseal_trusted()
556 rc = tpm2_unseal_cmd(chip, payload, options, blob_handle); in tpm2_unseal_trusted()