Lines Matching refs:payload

31 static int tpm2_key_encode(struct trusted_key_payload *payload,
79 work1 = payload->blob;
80 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob),
85 return work1 - payload->blob;
96 static int tpm2_key_decode(struct trusted_key_payload *payload,
106 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob,
107 payload->blob_len);
219 * tpm2_seal_trusted() - seal the payload of a trusted key
222 * @payload: the key data in clear and encrypted form
228 struct trusted_key_payload *payload,
269 tpm_buf_append_u16(&buf, 4 + options->blobauth_len + payload->key_len);
275 tpm_buf_append_u16(&buf, payload->key_len);
276 tpm_buf_append(&buf, payload->key, payload->key_len);
286 flags |= payload->migratable ? 0 : (TPM2_OA_FIXED_TPM |
325 blob_len = tpm2_key_encode(payload, options,
341 payload->blob_len = blob_len;
351 * @payload: the key data in clear and encrypted form
356 * -E2BIG on wrong payload size.
361 struct trusted_key_payload *payload,
373 rc = tpm2_key_decode(payload, options, &blob);
376 blob = payload->blob;
377 payload->old_format = 1;
385 if (payload->blob_len < 4)
391 if (private_len + 2 + 2 > (payload->blob_len))
395 if (private_len + 2 + public_len + 2 > payload->blob_len)
404 payload->migratable = 0;
406 payload->migratable = 1;
409 if (blob_len > payload->blob_len)
436 if (blob != payload->blob)
450 * @payload: the key data in clear and encrypted form
459 struct trusted_key_payload *payload,
499 if (payload->old_format) {
501 memcpy(payload->key, data, data_len - 1);
502 payload->key_len = data_len - 1;
503 payload->migratable = data[data_len - 1];
509 memcpy(payload->key, data, data_len);
510 payload->key_len = data_len;
520 * tpm2_unseal_trusted() - unseal the payload of a trusted key
523 * @payload: the key data in clear and encrypted form
529 struct trusted_key_payload *payload,
539 rc = tpm2_load_cmd(chip, payload, options, &blob_handle);
543 rc = tpm2_unseal_cmd(chip, payload, options, blob_handle);