Home
last modified time | relevance | path

Searched refs:keyring (Results 1 – 37 of 37) sorted by relevance

/linux-4.1.27/security/keys/
Dkeyring.c78 static int keyring_instantiate(struct key *keyring,
80 static void keyring_revoke(struct key *keyring);
81 static void keyring_destroy(struct key *keyring);
82 static void keyring_describe(const struct key *keyring, struct seq_file *m);
83 static long keyring_read(const struct key *keyring,
109 static void keyring_publish_name(struct key *keyring) in keyring_publish_name() argument
113 if (keyring->description) { in keyring_publish_name()
114 bucket = keyring_hash(keyring->description); in keyring_publish_name()
121 list_add_tail(&keyring->type_data.link, in keyring_publish_name()
148 static int keyring_instantiate(struct key *keyring, in keyring_instantiate() argument
[all …]
Dprocess_keys.c133 struct key *keyring; in install_thread_keyring_to_cred() local
135 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred()
138 if (IS_ERR(keyring)) in install_thread_keyring_to_cred()
139 return PTR_ERR(keyring); in install_thread_keyring_to_cred()
141 new->thread_keyring = keyring; in install_thread_keyring_to_cred()
176 struct key *keyring; in install_process_keyring_to_cred() local
181 keyring = keyring_alloc("_pid", new->uid, new->gid, new, in install_process_keyring_to_cred()
184 if (IS_ERR(keyring)) in install_process_keyring_to_cred()
185 return PTR_ERR(keyring); in install_process_keyring_to_cred()
187 new->process_keyring = keyring; in install_process_keyring_to_cred()
[all …]
Dkey.c404 struct key *keyring, in __key_instantiate_and_link() argument
411 key_check(keyring); in __key_instantiate_and_link()
432 if (keyring) in __key_instantiate_and_link()
474 struct key *keyring, in key_instantiate_and_link() argument
492 if (keyring) { in key_instantiate_and_link()
493 ret = __key_link_begin(keyring, &key->index_key, &edit); in key_instantiate_and_link()
498 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link()
500 if (keyring) in key_instantiate_and_link()
501 __key_link_end(keyring, &key->index_key, edit); in key_instantiate_and_link()
535 struct key *keyring, in key_reject_and_link() argument
[all …]
Dinternal.h91 extern int __key_link_begin(struct key *keyring,
94 extern int __key_link_check_live_key(struct key *keyring, struct key *key);
96 extern void __key_link_end(struct key *keyring,
103 extern struct key *keyring_search_instkey(struct key *keyring,
106 extern int iterate_over_keyring(const struct key *keyring,
167 extern void keyring_gc(struct key *keyring, time_t limit);
Drequest_key.c58 struct key *keyring = info->data; in umh_keys_init() local
60 return install_session_keyring_to_cred(cred, keyring); in umh_keys_init()
68 struct key *keyring = info->data; in umh_keys_cleanup() local
69 key_put(keyring); in umh_keys_cleanup()
100 struct key *key = cons->key, *authkey = cons->authkey, *keyring, in call_sbin_request_key() local
117 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, in call_sbin_request_key()
121 if (IS_ERR(keyring)) { in call_sbin_request_key()
122 ret = PTR_ERR(keyring); in call_sbin_request_key()
127 ret = key_link(keyring, authkey); in call_sbin_request_key()
175 ret = call_usermodehelper_keys(argv[0], argv, envp, keyring, in call_sbin_request_key()
[all …]
DKconfig16 Furthermore, a special type of key is available that acts as keyring:
32 A particular keyring may be accessed by either the user whose keyring
DMakefile11 keyring.o \
/linux-4.1.27/security/integrity/
Ddigsig.c24 static struct key *keyring[INTEGRITY_KEYRING_MAX]; variable
42 if (!keyring[id]) { in integrity_digsig_verify()
43 keyring[id] = in integrity_digsig_verify()
45 if (IS_ERR(keyring[id])) { in integrity_digsig_verify()
46 int err = PTR_ERR(keyring[id]); in integrity_digsig_verify()
48 keyring[id] = NULL; in integrity_digsig_verify()
56 return digsig_verify(keyring[id], sig + 1, siglen - 1, in integrity_digsig_verify()
59 return asymmetric_verify(keyring[id], sig, siglen, in integrity_digsig_verify()
71 keyring[id] = keyring_alloc(keyring_name[id], KUIDT_INIT(0), in integrity_init_keyring()
77 if (!IS_ERR(keyring[id])) in integrity_init_keyring()
[all …]
Ddigsig_asymmetric.c26 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument
35 if (keyring) { in request_asymmetric_key()
38 kref = keyring_search(make_key_ref(keyring, 1), in request_asymmetric_key()
67 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
86 key = request_asymmetric_key(keyring, __be32_to_cpu(hdr->keyid)); in asymmetric_verify()
Dintegrity.h156 int asymmetric_verify(struct key *keyring, const char *sig,
159 static inline int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
DKconfig28 to "lock" certain keyring to prevent adding new keys.
/linux-4.1.27/Documentation/
Ddigsig.txt55 * @keyring: keyring to search key in
67 int digsig_verify(struct key *keyring, const char *sig, int siglen,
73 to generate signatures, to load keys into the kernel keyring.
75 When the key is added to the kernel keyring, the keyid defines the name
82 -3 --alswrv 0 0 keyring: _ses
83 603976250 --alswrv 0 -1 \_ keyring: _uid.0
86 170323636 --alswrv 0 0 \_ keyring: _module
87 548221616 --alswrv 0 0 \_ keyring: _ima
88 128198054 --alswrv 0 0 \_ keyring: _evm
91 1 key in keyring:
Dmodule-signing.txt147 in a keyring called ".system_keyring" that can be seen by:
151 223c7853 I------ 1 perm 1f030000 0 0 keyring .system_keyring: 1
158 and will be added to the keyring.
Dkernel-parameters.txt571 the system trusted keyring to be used for certificate
/linux-4.1.27/Documentation/security/
Dkeys-request-key.txt47 does not need to link the key to a keyring to prevent it from being immediately
60 The userspace interface links the key to a keyring associated with the process
94 keyring that contains a link to auth key V.
102 Kerberos TGT key). It just requests the appropriate key, and the keyring
103 search notes that the session keyring has auth key V in its bottom level.
152 A search of any particular keyring proceeds in the following fashion:
155 firstly calls key_permission(SEARCH) on the keyring it's starting with,
158 (2) It considers all the non-keyring keys within that keyring and, if any key
164 (3) It then considers all the keyring-type keys in the keyring it's currently
165 searching. It calls key_permission(SEARCH) on each keyring, and if this
[all …]
Dkeys.txt10 other keys. Processes each have three standard keyring subscriptions that a
79 actual "key". In the case of a keyring, this is a list of keys to which
80 the keyring links; in the case of a user-defined key, it's an arbitrary
128 (+) "keyring"
152 (*) Each process subscribes to three keyrings: a thread-specific keyring, a
153 process-specific keyring, and a session-specific keyring.
155 The thread-specific keyring is discarded from the child when any sort of
156 clone, fork, vfork or execve occurs. A new keyring is created only when
159 The process-specific keyring is replaced with an empty one in the child on
161 shared. execve also discards the process's process keyring and creates a
[all …]
Dkeys-trusted-encrypted.txt79 -3 --alswrv 500 500 keyring: _ses
80 97833714 --alswrv 500 -1 \_ keyring: _uid.500
Dkeys-ecryptfs.txt16 kernel key of the 'user' type, inserted in the user's session specific keyring
Dcredentials.txt213 Per-process keyring
214 Per-session keyring
321 (2) Whilst the keyring subscriptions of a set of credentials may not be
/linux-4.1.27/fs/cifs/
Dcifs_spnego.c191 struct key *keyring; in init_cifs_spnego() local
206 keyring = keyring_alloc(".cifs_spnego", in init_cifs_spnego()
211 if (IS_ERR(keyring)) { in init_cifs_spnego()
212 ret = PTR_ERR(keyring); in init_cifs_spnego()
224 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in init_cifs_spnego()
225 cred->thread_keyring = keyring; in init_cifs_spnego()
229 cifs_dbg(FYI, "cifs spnego keyring: %d\n", key_serial(keyring)); in init_cifs_spnego()
233 key_put(keyring); in init_cifs_spnego()
Dcifsacl.c344 struct key *keyring; in init_cifs_idmap() local
360 keyring = keyring_alloc(".cifs_idmap", in init_cifs_idmap()
365 if (IS_ERR(keyring)) { in init_cifs_idmap()
366 ret = PTR_ERR(keyring); in init_cifs_idmap()
376 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in init_cifs_idmap()
377 cred->thread_keyring = keyring; in init_cifs_idmap()
381 cifs_dbg(FYI, "cifs idmap keyring: %d\n", key_serial(keyring)); in init_cifs_idmap()
385 key_put(keyring); in init_cifs_idmap()
/linux-4.1.27/net/dns_resolver/
Ddns_key.c265 struct key *keyring; in init_dns_resolver() local
278 keyring = keyring_alloc(".dns_resolver", in init_dns_resolver()
283 if (IS_ERR(keyring)) { in init_dns_resolver()
284 ret = PTR_ERR(keyring); in init_dns_resolver()
294 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in init_dns_resolver()
295 cred->thread_keyring = keyring; in init_dns_resolver()
299 kdebug("DNS resolver keyring: %d\n", key_serial(keyring)); in init_dns_resolver()
303 key_put(keyring); in init_dns_resolver()
/linux-4.1.27/include/linux/
Dkey-type.h166 struct key *keyring,
171 struct key *keyring,
177 struct key *keyring, in key_negate_and_link() argument
180 return key_reject_and_link(key, timeout, ENOKEY, keyring, instkey); in key_negate_and_link()
Dkey.h272 extern key_ref_t key_create_or_update(key_ref_t keyring,
284 extern int key_link(struct key *keyring,
287 extern int key_unlink(struct key *keyring,
296 extern int keyring_clear(struct key *keyring);
298 extern key_ref_t keyring_search(key_ref_t keyring,
302 extern int keyring_add_key(struct key *keyring,
Ddigsig.h51 int digsig_verify(struct key *keyring, const char *sig, int siglen,
56 static inline int digsig_verify(struct key *keyring, const char *sig, in digsig_verify() argument
/linux-4.1.27/security/integrity/ima/
DKconfig126 bool "Require all keys on the .ima keyring be signed"
132 keyring be signed by a key on the system trusted keyring.
135 bool "Load X509 certificate onto the '.ima' trusted keyring"
140 loaded on the .ima trusted keyring. These public keys are
142 .system keyring. This option enables X509 certificate
143 loading from the kernel onto the '.ima' trusted keyring.
/linux-4.1.27/lib/
Ddigsig.c189 int digsig_verify(struct key *keyring, const char *sig, int siglen, in digsig_verify() argument
207 if (keyring) { in digsig_verify()
210 kref = keyring_search(make_key_ref(keyring, 1UL), in digsig_verify()
/linux-4.1.27/Documentation/ABI/testing/
Devm12 The key is loaded onto the root's keyring using keyctl. Until
14 loaded onto the keyring (echo 1 > <securityfs>/evm), EVM
/linux-4.1.27/fs/nfs/
Dnfs4idmap.c190 struct key *keyring; in nfs_idmap_init_keyring() local
200 keyring = keyring_alloc(".id_resolver", in nfs_idmap_init_keyring()
205 if (IS_ERR(keyring)) { in nfs_idmap_init_keyring()
206 ret = PTR_ERR(keyring); in nfs_idmap_init_keyring()
218 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in nfs_idmap_init_keyring()
219 cred->thread_keyring = keyring; in nfs_idmap_init_keyring()
227 key_put(keyring); in nfs_idmap_init_keyring()
/linux-4.1.27/Documentation/filesystems/
Decryptfs.txt22 - David Howells' userspace keyring headers and libraries (version
55 the user session keyring:
Dafs.txt199 -3 --alswrv 0 0 keyring: _ses.3268
200 2 --alswrv 0 0 \_ keyring: _uid.0
/linux-4.1.27/include/crypto/
Dpublic_key.h103 extern struct key *x509_request_asymmetric_key(struct key *keyring,
/linux-4.1.27/crypto/asymmetric_keys/
Dx509_public_key.c75 struct key *x509_request_asymmetric_key(struct key *keyring, in x509_request_asymmetric_key() argument
100 key = keyring_search(make_key_ref(keyring, 1), in x509_request_asymmetric_key()
/linux-4.1.27/Documentation/networking/
Drxrpc.txt272 (*) The server application has to provide the server socket with a keyring of
275 in the keyring and then sends a challenge packet to the client and
408 Similar to above but specifies a keyring of server secret keys to use (key
409 type "keyring"). See the "Security" section.
472 add_key("rxrpc_s", "52:2", secret_key, 8, keyring);
474 A keyring is passed to the server socket by naming it in a sockopt. The server
475 socket then looks the server secret keys up in this keyring when secure
576 (2) Security is set up if desired by giving the socket a keyring with server
579 keyring = add_key("keyring", "AFSkeys", NULL, 0,
584 add_key("rxrpc_s", "52:2", secret_key, 8, keyring);
[all …]
Ddns_resolver.txt105 The kernel maintains an internal keyring in which it caches looked up keys.
107 the use of KEYCTL_KEYRING_CLEAR on the keyring ID.
/linux-4.1.27/init/
DKconfig1753 Provide a system keyring to which trusted keys can be added. Keys in
1754 the keyring are considered to be trusted. Keys may be added at will
1757 keys already in the keyring.
1759 Keys in this keyring are used by module signature checking.
/linux-4.1.27/Documentation/filesystems/caching/
Dfscache.txt378 The data shown may be filtered by attaching the a key to an appropriate keyring