函数逻辑报告 |
Source Code:include\linux\string.h |
Create Date:2022-07-27 06:38:06 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
首页 | 函数Tree |
注解内核,赢得工具 | 下载SCCT | English |
函数名称:memzero_explicit - Fill a region of memory (e
函数原型:static inline void memzero_explicit(void *s, size_t count)
返回类型:void
参数:
类型 | 参数 | 名称 |
---|---|---|
void * | s | |
size_t | count |
名称 | 描述 |
---|---|
blake2s_final | |
blake2s256_hmac | |
xchacha_init | |
__chacha20poly1305_encrypt | |
chacha20poly1305_encrypt | |
__chacha20poly1305_decrypt | |
chacha20poly1305_decrypt | |
chacha20poly1305_crypt_sg_inplace | |
curve25519_generic | |
curve25519_generic | |
sha256_transform | |
key_gc_unused_keys | Garbage collect a list of unreferenced, detached keys |
SYSCALL_DEFINE5 | Extract the description of a new key from userspace and either add it as a* new key to the specified keyring or update a matching key in that keyring.* If the description is NULL or an empty string, the key type is asked to* generate one from the payload. |
keyctl_instantiate_key_common | Instantiate a key with the specified payload and link the key into the* destination keyring if one is given.* The caller must have the appropriate instantiation permit set for this to* work (see keyctl_assume_authority). No other permissions are required. |
kdf_ctr | Implementation of the KDF in counter mode according to SP800-108 section 5 |
datablob_hmac_append | |
datablob_hmac_verify | verify HMAC before decrypting encrypted key |
encrypted_key_decrypt | |
encrypted_read | rypted_read - format and copy the encrypted data to userspace* The resulting datablob format is:* |
fscrypt_init_hkdf | Compute HKDF-Extract using the given master key as the input keying material,* and prepare an HMAC transform object keyed by the resulting pseudorandom key.* Afterwards, the keyed HMAC transform object can be used for HKDF-Expand many |
fscrypt_hkdf_expand | HKDF-Expand (RFC 5869 section 2 |
wipe_master_key_secret | |
move_master_key_secret | |
fscrypt_ioctl_add_key | Add a master encryption key to the filesystem, causing all files which were* encrypted with it to appear "unlocked" (decrypted) when accessed.* When adding a key for use by v1 encryption policies, this ioctl is |
setup_per_mode_key | |
fscrypt_setup_v2_file_key | |
put_crypt_info | |
ahash_request_zero | |
shash_desc_zero | |
skcipher_request_zero | |
crypto_des_verify_key | rypto_des_verify_key - Check whether a DES key is weak*@tfm: the crypto algo*@key: the key buffer* Returns -EINVAL if the key is weak and the crypto TFM does not permit weak* keys |
des3_ede_verify_key | RFC2451:* For DES-EDE3, there is no known need to reject weak or* complementation keys |
源代码转换工具 开放的插件接口 | X |
---|---|
支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |