Lines Matching refs:ret
182 int ret = -EINVAL; in datablob_parse() local
190 return ret; in datablob_parse()
198 return ret; in datablob_parse()
239 ret = 0; in datablob_parse()
252 ret = 0; in datablob_parse()
261 ret = 0; in datablob_parse()
269 return ret; in datablob_parse()
349 int ret; in calc_hmac() local
357 ret = crypto_shash_setkey(hmacalg, key, keylen); in calc_hmac()
358 if (!ret) in calc_hmac()
359 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hmac()
361 return ret; in calc_hmac()
367 int ret; in calc_hash() local
375 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hash()
377 return ret; in calc_hash()
388 int ret; in get_derived_key() local
406 ret = calc_hash(derived_key, derived_buf, derived_buf_len); in get_derived_key()
408 return ret; in get_derived_key()
415 int ret; in init_blkcipher_desc() local
425 ret = crypto_blkcipher_setkey(desc->tfm, key, key_len); in init_blkcipher_desc()
426 if (ret < 0) { in init_blkcipher_desc()
427 pr_err("encrypted_key: failed to setkey (%d)\n", ret); in init_blkcipher_desc()
429 return ret; in init_blkcipher_desc()
454 int ret = PTR_ERR(mkey); in request_master_key() local
456 if (ret == -ENOTSUPP) in request_master_key()
481 int ret; in derived_key_encrypt() local
486 ret = init_blkcipher_desc(&desc, derived_key, derived_keylen, in derived_key_encrypt()
488 if (ret < 0) in derived_key_encrypt()
501 ret = crypto_blkcipher_encrypt(&desc, sg_out, sg_in, encrypted_datalen); in derived_key_encrypt()
503 if (ret < 0) in derived_key_encrypt()
504 pr_err("encrypted_key: failed to encrypt (%d)\n", ret); in derived_key_encrypt()
508 return ret; in derived_key_encrypt()
516 int ret; in datablob_hmac_append() local
518 ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen); in datablob_hmac_append()
519 if (ret < 0) in datablob_hmac_append()
523 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append()
525 if (!ret) in datablob_hmac_append()
528 return ret; in datablob_hmac_append()
538 int ret; in datablob_hmac_verify() local
542 ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen); in datablob_hmac_verify()
543 if (ret < 0) in datablob_hmac_verify()
553 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify()
554 if (ret < 0) in datablob_hmac_verify()
556 ret = memcmp(digest, epayload->format + epayload->datablob_len, in datablob_hmac_verify()
558 if (ret) { in datablob_hmac_verify()
559 ret = -EINVAL; in datablob_hmac_verify()
566 return ret; in datablob_hmac_verify()
578 int ret; in derived_key_decrypt() local
581 ret = init_blkcipher_desc(&desc, derived_key, derived_keylen, in derived_key_decrypt()
583 if (ret < 0) in derived_key_decrypt()
595 ret = crypto_blkcipher_decrypt(&desc, sg_out, sg_in, encrypted_datalen); in derived_key_decrypt()
597 if (ret < 0) in derived_key_decrypt()
601 return ret; in derived_key_decrypt()
617 int ret; in encrypted_key_alloc() local
619 ret = kstrtol(datalen, 10, &dlen); in encrypted_key_alloc()
620 if (ret < 0 || dlen < MIN_DATA_SIZE || dlen > MAX_DATA_SIZE) in encrypted_key_alloc()
642 ret = key_payload_reserve(key, payload_datalen + datablob_len in encrypted_key_alloc()
644 if (ret < 0) in encrypted_key_alloc()
645 return ERR_PTR(ret); in encrypted_key_alloc()
669 int ret; in encrypted_key_decrypt() local
677 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt()
678 if (ret < 0) in encrypted_key_decrypt()
680 ret = hex2bin(epayload->encrypted_data, hex_encoded_data, in encrypted_key_decrypt()
682 if (ret < 0) in encrypted_key_decrypt()
686 ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2), in encrypted_key_decrypt()
688 if (ret < 0) in encrypted_key_decrypt()
695 ret = datablob_hmac_verify(epayload, format, master_key, master_keylen); in encrypted_key_decrypt()
696 if (ret < 0) { in encrypted_key_decrypt()
697 pr_err("encrypted_key: bad hmac (%d)\n", ret); in encrypted_key_decrypt()
701 ret = get_derived_key(derived_key, ENC_KEY, master_key, master_keylen); in encrypted_key_decrypt()
702 if (ret < 0) in encrypted_key_decrypt()
705 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
706 if (ret < 0) in encrypted_key_decrypt()
707 pr_err("encrypted_key: failed to decrypt key (%d)\n", ret); in encrypted_key_decrypt()
711 return ret; in encrypted_key_decrypt()
753 int ret = 0; in encrypted_init() local
756 ret = valid_ecryptfs_desc(key_desc); in encrypted_init()
757 if (ret < 0) in encrypted_init()
758 return ret; in encrypted_init()
771 ret = encrypted_key_decrypt(epayload, format, hex_encoded_iv); in encrypted_init()
772 return ret; in encrypted_init()
793 int ret; in encrypted_instantiate() local
803 ret = datablob_parse(datablob, &format, &master_desc, in encrypted_instantiate()
805 if (ret < 0) in encrypted_instantiate()
811 ret = PTR_ERR(epayload); in encrypted_instantiate()
814 ret = encrypted_init(epayload, key->description, format, master_desc, in encrypted_instantiate()
816 if (ret < 0) { in encrypted_instantiate()
824 return ret; in encrypted_instantiate()
853 int ret = 0; in encrypted_update() local
866 ret = datablob_parse(buf, &format, &new_master_desc, NULL, NULL); in encrypted_update()
867 if (ret < 0) in encrypted_update()
870 ret = valid_master_desc(new_master_desc, epayload->master_desc); in encrypted_update()
871 if (ret < 0) in encrypted_update()
877 ret = PTR_ERR(new_epayload); in encrypted_update()
892 return ret; in encrypted_update()
913 int ret; in encrypted_read() local
929 ret = get_derived_key(derived_key, ENC_KEY, master_key, master_keylen); in encrypted_read()
930 if (ret < 0) in encrypted_read()
933 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
934 if (ret < 0) in encrypted_read()
937 ret = datablob_hmac_append(epayload, master_key, master_keylen); in encrypted_read()
938 if (ret < 0) in encrypted_read()
943 ret = -ENOMEM; in encrypted_read()
951 ret = -EFAULT; in encrypted_read()
958 return ret; in encrypted_read()
998 int ret; in encrypted_shash_alloc() local
1011 ret = PTR_ERR(hashalg); in encrypted_shash_alloc()
1019 return ret; in encrypted_shash_alloc()
1024 int ret; in init_encrypted() local
1026 ret = encrypted_shash_alloc(); in init_encrypted()
1027 if (ret < 0) in init_encrypted()
1028 return ret; in init_encrypted()
1029 ret = aes_get_sizes(); in init_encrypted()
1030 if (ret < 0) in init_encrypted()
1032 ret = register_key_type(&key_type_encrypted); in init_encrypted()
1033 if (ret < 0) in init_encrypted()
1038 return ret; in init_encrypted()