| /linux/Documentation/security/keys/ |
| H A D | request-key.rst | 10 ``request_key*()``:: 12 struct key *request_key(const struct key_type *type, 38 Or by userspace invoking the request_key system call:: 40 key_serial_t request_key(const char *type, 50 The request_key_tag() call is like the in-kernel request_key(), except that it 78 1) Process A calls request_key() [the userspace syscall calls the kernel 81 2) request_key() searches the process's subscribed keyrings to see if there's 86 3) request_key() sees that A doesn't have the desired key yet, so it creates 95 4) request_key() then forks and executes /sbin/request-key with a new session 118 10) The program then exits 0 and request_key() deletes key V and returns key [all …]
|
| H A D | core.rst | 357 request_key and keyctl. The latter provides a number of functions for 373 KEY_SPEC_REQKEY_AUTH_KEY -7 assumed request_key() 423 key_serial_t request_key(const char *type, const char *description, 735 request_key() system call. 1146 struct key *request_key(const struct key_type *type, 1173 This is identical to request_key(), except that a domain tag may be 1189 passed to the key_type->request_key() op if it exists, and the 1322 This can be used with a function such as request_key() to find a specific 1324 with keyring_search(). Note that it is not possible to use request_key() to 1631 * ``int (*request_key)(struct key_construction *cons, const char *op, void *aux);`` [all …]
|
| /linux/drivers/gpio/ |
| H A D | gpiolib-devres.c | 352 struct lock_class_key *request_key) in devm_gpiochip_add_data_with_key() argument 356 ret = gpiochip_add_data_with_key(gc, data, lock_key, request_key); in devm_gpiochip_add_data_with_key()
|
| H A D | gpiolib.c | 113 struct lock_class_key *request_key); 1047 struct lock_class_key *request_key) in gpiochip_add_data_with_key() argument 1213 ret = gpiochip_add_irqchip(gc, lock_key, request_key); in gpiochip_add_data_with_key() 1656 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); in gpiochip_hierarchy_irq_domain_alloc() 1852 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); in gpiochip_irq_map() 2091 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument 2121 gc->irq.request_key = request_key; in gpiochip_add_irqchip() 2238 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument
|
| /linux/security/keys/ |
| H A D | request_key.c | 120 static char const request_key[] = "/sbin/request-key"; in call_sbin_request_key() local 185 argv[i++] = (char *)request_key; in call_sbin_request_key() 196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, in call_sbin_request_key() 244 if (key->type->request_key) in construct_key() 245 actor = key->type->request_key; in construct_key()
|
| H A D | Makefile | 16 request_key.o \
|
| /linux/security/keys/encrypted-keys/ |
| H A D | masterkey_trusted.c | 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
|
| /linux/tools/perf/trace/strace/groups/ |
| H A D | string | 52 request_key
|
| /linux/include/linux/ |
| H A D | key-type.h | 145 request_key_actor_t request_key; member
|
| H A D | key.h | 347 static inline struct key *request_key(struct key_type *type, in request_key() function
|
| /linux/security/integrity/ |
| H A D | digsig_asymmetric.c | 54 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
|
| H A D | digsig.c | 49 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id()
|
| /linux/drivers/md/ |
| H A D | dm-verity-verify-sig.c | 38 key = request_key(&key_type_user, in verity_verify_get_sig_from_key()
|
| /linux/net/rxrpc/ |
| H A D | server_key.c | 135 key = request_key(&key_type_keyring, description, NULL); in rxrpc_server_keyring()
|
| /linux/fs/smb/client/ |
| H A D | cifs_spnego.c | 161 spnego_key = request_key(&cifs_spnego_key_type, description, ""); in cifs_get_spnego_key()
|
| /linux/lib/ |
| H A D | digsig.c | 222 key = request_key(&key_type_user, name, NULL); in digsig_verify()
|
| /linux/fs/crypto/ |
| H A D | keysetup_v1.c | 98 key = request_key(&key_type_logon, description, NULL); in find_and_lock_process_key()
|
| /linux/fs/nfs/ |
| H A D | nfs4idmap.c | 291 rkey = request_key(&key_type_id_resolver, desc, ""); in nfs_idmap_request_key() 417 .request_key = nfs_idmap_legacy_upcall,
|
| /linux/kernel/ |
| H A D | sys_ni.c | 164 COND_SYSCALL(request_key);
|
| H A D | crash_dump_dm_crypt.c | 148 key = request_key(&key_type_logon, dm_key->key_desc, NULL); in read_key_from_user_keying()
|
| /linux/fs/ubifs/ |
| H A D | auth.c | 278 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL); in ubifs_init_authentication()
|
| /linux/security/integrity/evm/ |
| H A D | evm_crypto.c | 432 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL); in evm_init_key()
|
| /linux/Documentation/driver-api/nvdimm/ |
| H A D | security.rst | 47 security specification [2]. A key is initially acquired via the request_key()
|
| /linux/fs/ecryptfs/ |
| H A D | ecryptfs_kernel.h | 95 return request_key(&key_type_encrypted, sig, NULL); in ecryptfs_get_encrypted_key()
|
| /linux/drivers/nvdimm/ |
| H A D | security.c | 58 key = request_key(&key_type_encrypted, desc, ""); in nvdimm_request_key()
|