/systemd-251/src/home/ |
D | homectl-pkcs11.c | 18 const void *decrypted_key, size_t decrypted_key_size) { in add_pkcs11_encrypted_key() argument 29 assert(decrypted_key_size > 0); in add_pkcs11_encrypted_key() 33 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in add_pkcs11_encrypted_key() 162 size_t decrypted_key_size, encrypted_key_size; in identity_add_pkcs11_key_data() local 177 r = rsa_pkey_to_suitable_key_size(pkey, &decrypted_key_size); in identity_add_pkcs11_key_data() 181 log_debug("Generating %zu bytes random key.", decrypted_key_size); in identity_add_pkcs11_key_data() 183 decrypted_key = malloc(decrypted_key_size); in identity_add_pkcs11_key_data() 187 r = genuine_random_bytes(decrypted_key, decrypted_key_size, RANDOM_BLOCK); in identity_add_pkcs11_key_data() 191 …r = rsa_encrypt_bytes(pkey, decrypted_key, decrypted_key_size, &encrypted_key, &encrypted_key_size… in identity_add_pkcs11_key_data() 205 decrypted_key, decrypted_key_size); in identity_add_pkcs11_key_data()
|
D | homework-pkcs11.c | 21 size_t decrypted_key_size; in pkcs11_callback() local 95 …object, data->encrypted_key->data, data->encrypted_key->size, &decrypted_key, &decrypted_key_size); in pkcs11_callback() 99 if (base64mem(decrypted_key, decrypted_key_size, &data->decrypted_password) < 0) in pkcs11_callback()
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-pkcs11.c | 21 size_t decrypted_key_size, encrypted_key_size; in enroll_pkcs11() local 43 r = rsa_pkey_to_suitable_key_size(pkey, &decrypted_key_size); in enroll_pkcs11() 47 log_debug("Generating %zu bytes random key.", decrypted_key_size); in enroll_pkcs11() 49 decrypted_key = malloc(decrypted_key_size); in enroll_pkcs11() 53 r = genuine_random_bytes(decrypted_key, decrypted_key_size, RANDOM_BLOCK); in enroll_pkcs11() 57 …r = rsa_encrypt_bytes(pkey, decrypted_key, decrypted_key_size, &encrypted_key, &encrypted_key_size… in enroll_pkcs11() 63 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in enroll_pkcs11()
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | luks2-pkcs11.c | 22 size_t decrypted_key_size; member 93 &data->decrypted_key_size); in luks2_pkcs11_callback() 133 *ret_decrypted_key_size = data.decrypted_key_size; in acquire_luks2_key_by_pin() 170 *ret_decrypted_key_size = data.decrypted_key_size; in acquire_luks2_key_systemd() 185 size_t decrypted_key_size, encrypted_key_size; in acquire_luks2_key() local 208 &decrypted_key, &decrypted_key_size); in acquire_luks2_key() 213 &decrypted_key, &decrypted_key_size); in acquire_luks2_key() 217 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in acquire_luks2_key()
|
D | luks2-fido2.c | 22 size_t cid_size, salt_size, decrypted_key_size; in acquire_luks2_key() local 54 &decrypted_key_size); in acquire_luks2_key() 61 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in acquire_luks2_key()
|
D | cryptsetup-token-systemd-tpm2.c | 60 size_t blob_size, policy_hash_size, decrypted_key_size; in cryptsetup_token_open() local 109 &decrypted_key_size); in cryptsetup_token_open() 114 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in cryptsetup_token_open()
|
/systemd-251/src/shared/ |
D | openssl-util.c | 48 size_t decrypted_key_size, in rsa_encrypt_bytes() argument 66 if (EVP_PKEY_encrypt(ctx, NULL, &l, decrypted_key, decrypted_key_size) <= 0) in rsa_encrypt_bytes() 73 if (EVP_PKEY_encrypt(ctx, b, &l, decrypted_key, decrypted_key_size) <= 0) in rsa_encrypt_bytes()
|
D | openssl-util.h | 39 int rsa_encrypt_bytes(EVP_PKEY *pkey, const void *decrypted_key, size_t decrypted_key_size, void **…
|
D | pkcs11-util.h | 59 size_t decrypted_key_size; member
|
D | pkcs11-util.c | 1246 &data->decrypted_key_size); in pkcs11_crypt_device_callback()
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup.c | 924 size_t discovered_salt_size, discovered_cid_size, decrypted_key_size, cid_size = 0; in attach_luks_or_plain_or_bitlk_by_fido2() local 1001 &decrypted_key, &decrypted_key_size, in attach_luks_or_plain_or_bitlk_by_fido2() 1035 … r = crypt_activate_by_volume_key(cd, name, decrypted_key, decrypted_key_size, flags); in attach_luks_or_plain_or_bitlk_by_fido2() 1041 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in attach_luks_or_plain_or_bitlk_by_fido2() 1099 size_t decrypted_key_size = 0, discovered_key_size = 0; in attach_luks_or_plain_or_bitlk_by_pkcs11() local 1147 &decrypted_key, &decrypted_key_size); in attach_luks_or_plain_or_bitlk_by_pkcs11() 1182 … r = crypt_activate_by_volume_key(cd, name, decrypted_key, decrypted_key_size, flags); in attach_luks_or_plain_or_bitlk_by_pkcs11() 1194 r = base64mem(decrypted_key, decrypted_key_size, &base64_encoded); in attach_luks_or_plain_or_bitlk_by_pkcs11() 1292 size_t decrypted_key_size; in attach_luks_or_plain_or_bitlk_by_tpm2() local 1319 &decrypted_key, &decrypted_key_size); in attach_luks_or_plain_or_bitlk_by_tpm2() [all …]
|
D | cryptsetup-pkcs11.c | 86 *ret_decrypted_key_size = data.decrypted_key_size; in decrypt_pkcs11_key()
|