函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\linux\string.h Create Date:2022-07-27 06:38:06
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:memzero_explicit - Fill a region of memory (e

函数原型:static inline void memzero_explicit(void *s, size_t count)

返回类型:void

参数:

类型参数名称
void *s
size_tcount
249  memset(s, 0, count)
250  This version is i.e. to prevent dead stores elimination on @ptr* where gcc and llvm may behave differently when otherwise using* normal barrier(): while gcc behavior gets along with a normal* barrier(), llvm needs an explicit input variable to be assumed(s)
调用者
名称描述
blake2s_final
blake2s256_hmac
xchacha_init
__chacha20poly1305_encrypt
chacha20poly1305_encrypt
__chacha20poly1305_decrypt
chacha20poly1305_decrypt
chacha20poly1305_crypt_sg_inplace
curve25519_generic
curve25519_generic
sha256_transform
key_gc_unused_keysGarbage collect a list of unreferenced, detached keys
SYSCALL_DEFINE5Extract the description of a new key from userspace and either add it as a* new key to the specified keyring or update a matching key in that keyring.* If the description is NULL or an empty string, the key type is asked to* generate one from the payload.
keyctl_instantiate_key_commonInstantiate a key with the specified payload and link the key into the* destination keyring if one is given.* The caller must have the appropriate instantiation permit set for this to* work (see keyctl_assume_authority). No other permissions are required.
kdf_ctrImplementation of the KDF in counter mode according to SP800-108 section 5
datablob_hmac_append
datablob_hmac_verifyverify HMAC before decrypting encrypted key
encrypted_key_decrypt
encrypted_readrypted_read - format and copy the encrypted data to userspace* The resulting datablob format is:* * On success, return to userspace the encrypted key datablob size.
fscrypt_init_hkdfCompute HKDF-Extract using the given master key as the input keying material,* and prepare an HMAC transform object keyed by the resulting pseudorandom key.* Afterwards, the keyed HMAC transform object can be used for HKDF-Expand many
fscrypt_hkdf_expandHKDF-Expand (RFC 5869 section 2
wipe_master_key_secret
move_master_key_secret
fscrypt_ioctl_add_keyAdd a master encryption key to the filesystem, causing all files which were* encrypted with it to appear "unlocked" (decrypted) when accessed.* When adding a key for use by v1 encryption policies, this ioctl is
setup_per_mode_key
fscrypt_setup_v2_file_key
put_crypt_info
ahash_request_zero
shash_desc_zero
skcipher_request_zero
crypto_des_verify_keyrypto_des_verify_key - Check whether a DES key is weak*@tfm: the crypto algo*@key: the key buffer* Returns -EINVAL if the key is weak and the crypto TFM does not permit weak* keys
des3_ede_verify_keyRFC2451:* For DES-EDE3, there is no known need to reject weak or* complementation keys