Lines Matching refs:that
46 The main difference between the access points is that the in-kernel interface
52 calls, except that they permit auxiliary data to be passed to the upcaller (the
53 default is NULL). This is only useful for those key types that define their
56 The two async in-kernel calls may return keys that are still in the process of
65 The following example assumes that the key types involved don't define their
84 (3) request_key() sees that A doesn't have the desired key yet, so it creates
89 (b) An authorisation key V that refers to key U and notes that process A
94 keyring that contains a link to auth key V.
103 search notes that the session keyring has auth key V in its bottom level.
113 (9) Upon instantiating key U, auth key V is automatically revoked so that it
135 authorisation key to negatively instantiate a key that's under construction.
136 This is a short duration placeholder that causes any attempt at re-requesting
141 processes for a key that will never be obtainable.
158 (2) It considers all the non-keyring keys within that keyring and, if any key
160 if the key is allowed to be found. If it is, that key is returned; if
166 grants permission, it recurses, executing steps (2) and (3) on that
195 error. Note that several errors may have come from LSM.