Lines Matching defs:key

21 #include <linux/sed-opal-key.h>
24 #include <linux/key.h>
25 #include <linux/key-type.h>
36 static struct key *sed_opal_keyring;
279 * Allocate/update a SED Opal key and add it to the SED Opal keyring.
294 pr_err("Error adding SED key (%ld)\n", PTR_ERR(kr));
302 * Read a SED Opal key from the SED Opal keyring.
308 struct key *key;
319 key = key_ref_to_ptr(kref);
320 down_read(&key->sem);
321 ret = key_validate(key);
323 if (buflen > key->datalen)
324 buflen = key->datalen;
326 ret = key->type->read(key, (char *)buffer, buflen);
328 up_read(&key->sem);
335 static int opal_get_key(struct opal_dev *dev, struct opal_key *key)
339 switch (key->key_type) {
341 /* the key is ready to use */
344 /* the key is in the keyring */
345 ret = read_sed_opal_key(OPAL_AUTH_KEY, key->key, OPAL_KEY_MAX);
351 key->key_len = ret;
352 key->key_type = OPAL_INCLUDED;
363 if (key->key_type != OPAL_INCLUDED || key->key_len == 0) {
1345 pr_debug("Error building gen key command\n");
1695 const char *key,
1701 if (key == NULL && auth != OPAL_ANYBODY_UID)
1720 add_token_bytestring(&err, dev, key, key_len);
1750 const u8 *key = dev->prev_data;
1752 if (!key) {
1757 okey->key,
1762 key, dev->prev_d_len);
1763 kfree(key);
1772 struct opal_key *key = data;
1776 key->key, key->key_len);
1785 okey->key,
1796 u8 *key = session->opal_key.key;
1820 add_token_bytestring(&err, dev, key, keylen);
1976 static int generic_pw_cmd(u8 *key, size_t key_len, u8 *cpin_uid,
1988 add_token_bytestring(&err, dev, key, key_len);
2011 if (generic_pw_cmd(usr->opal_key.key, usr->opal_key.key_len,
2023 struct opal_key *key = data;
2027 if (generic_pw_cmd(key->key, key->key_len, cpin_uid, dev)) {
2598 { start_admin1LSP_opal_session, &rev->key },
2603 ret = opal_get_key(dev, &rev->key);
2642 { start_admin1LSP_opal_session, &opal_mbr->key },
2645 { start_admin1LSP_opal_session, &opal_mbr->key },
2655 ret = opal_get_key(dev, &opal_mbr->key);
2673 { start_admin1LSP_opal_session, &mbr_done->key },
2683 ret = opal_get_key(dev, &mbr_done->key);
2698 { start_admin1LSP_opal_session, &info->key },
2707 ret = opal_get_key(dev, &info->key);
2838 static int __opal_set_mbr_done(struct opal_dev *dev, struct opal_key *key)
2842 { start_admin1LSP_opal_session, key },
2861 * volume key is not required, as it requires root privileges anyway,
2863 * Requiring the volume key to lock the device is a peculiarity of the
2864 * OPAL specification. Given we might already have saved the key if
2866 * that key to lock the device if no key was provided here, the
2870 * to the common behaviour and do not ask for the volume key when
2880 memcpy(lk_unlk->session.opal_key.key,
2881 iter->unlk.session.opal_key.key,
2936 { start_SIDASP_opal_session, &opal_lr_act->key },
2946 ret = opal_get_key(dev, &opal_lr_act->key);
3026 /* update keyring and key store with new password */
3028 opal_pw->new_user_pw.opal_key.key,
3031 pr_warn("error updating SED key: %d\n", ret);
3034 opal_pw->new_user_pw.opal_key.key,
3111 { start_admin1LSP_opal_session, &rw_tbl->key },
3127 { start_admin1LSP_opal_session, &rw_tbl->key },
3144 ret = opal_get_key(dev, &rw_tbl->key);
3302 struct key *kr;