/linux-4.4.14/Documentation/security/ |
D | keys-request-key.txt | 10 request_key*(): 12 struct key *request_key(const struct key_type *type, 39 Or by userspace invoking the request_key system call: 41 key_serial_t request_key(const char *type, 51 The request_key*_with_auxdata() calls are like the in-kernel request_key*() 76 (1) Process A calls request_key() [the userspace syscall calls the kernel 79 (2) request_key() searches the process's subscribed keyrings to see if there's 84 (3) request_key() sees that A doesn't have the desired key yet, so it creates 93 (4) request_key() then forks and executes /sbin/request-key with a new session 116 (10) The program then exits 0 and request_key() deletes key V and returns key [all …]
|
D | keys.txt | 372 request_key and keyctl. The latter provides a number of functions for 388 KEY_SPEC_REQKEY_AUTH_KEY -7 assumed request_key() 438 key_serial_t request_key(const char *type, const char *description, 725 request_key() system call. 884 struct key *request_key(const struct key_type *type, 912 This is identical to request_key(), except that the auxiliary data is 913 passed to the key_type->request_key() op if it exists, and the callout_info 932 which are asynchronous equivalents of request_key() and 1042 This can be used with a function such as request_key() to find a specific 1044 with keyring_search(). Note that it is not possible to use request_key() to [all …]
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | masterkey_trusted.c | 37 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
|
D | encrypted.c | 312 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key()
|
/linux-4.4.14/security/keys/ |
D | Makefile | 15 request_key.o \
|
D | request_key.c | 231 if (key->type->request_key) in construct_key() 232 actor = key->type->request_key; in construct_key() 619 struct key *request_key(struct key_type *type, in request_key() function 640 EXPORT_SYMBOL(request_key);
|
D | keyctl.c | 158 SYSCALL_DEFINE4(request_key, const char __user *, _type, in SYSCALL_DEFINE4() argument
|
/linux-4.4.14/include/linux/ |
D | key-type.h | 149 request_key_actor_t request_key; member
|
D | key.h | 242 extern struct key *request_key(struct key_type *type,
|
/linux-4.4.14/security/integrity/ |
D | digsig_asymmetric.c | 45 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
|
D | digsig.c | 44 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_digsig_verify()
|
/linux-4.4.14/net/dns_resolver/ |
D | dns_query.c | 123 rkey = request_key(&key_type_dns_resolver, desc, options); in dns_query()
|
/linux-4.4.14/fs/cifs/ |
D | cifs_spnego.c | 166 spnego_key = request_key(&cifs_spnego_key_type, description, ""); in cifs_get_spnego_key()
|
D | cifsacl.c | 216 sidkey = request_key(&cifs_idmap_key_type, desc, ""); in id_to_sid() 284 sidkey = request_key(&cifs_idmap_key_type, sidstr, ""); in sid_to_id()
|
D | connect.c | 2392 key = request_key(&key_type_logon, desc, ""); in cifs_set_cifscreds() 2403 key = request_key(&key_type_logon, desc, ""); in cifs_set_cifscreds()
|
/linux-4.4.14/Documentation/networking/ |
D | dns_resolver.txt | 125 When dns_query() is invoked, it calls request_key() to search the local 129 Upcalls to userspace are made through the request_key() upcall vector, and are
|
D | rxrpc.txt | 400 extracted from the calling process's keyrings with request_key() and 517 This issues a request_key() to get the key representing the security 681 (2) Avoid having RxRPC call request_key() at the point of issue of a call or
|
/linux-4.4.14/lib/ |
D | digsig.c | 218 key = request_key(&key_type_user, name, NULL); in digsig_verify()
|
/linux-4.4.14/fs/f2fs/ |
D | crypto_key.c | 194 keyring_key = request_key(&key_type_logon, full_key_descriptor, NULL); in _f2fs_get_encryption_info()
|
/linux-4.4.14/security/integrity/evm/ |
D | evm_crypto.c | 245 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL); in evm_init_key()
|
/linux-4.4.14/fs/ext4/ |
D | crypto_key.c | 203 keyring_key = request_key(&key_type_logon, full_key_descriptor, NULL); in _ext4_get_encryption_info()
|
/linux-4.4.14/fs/nfs/ |
D | nfs4idmap.c | 280 rkey = request_key(&key_type_id_resolver, desc, ""); in nfs_idmap_request_key() 408 .request_key = nfs_idmap_legacy_upcall,
|
/linux-4.4.14/fs/afs/ |
D | security.c | 30 key = request_key(&key_type_rxrpc, cell->anonymous_key->description, in afs_request_key()
|
/linux-4.4.14/fs/fscache/ |
D | object-list.c | 325 key = request_key(&key_type_user, "fscache:objlist", NULL); in fscache_objlist_config()
|
/linux-4.4.14/arch/parisc/kernel/ |
D | syscall_table.S | 363 ENTRY_SAME(request_key) /* 265 */
|
/linux-4.4.14/arch/powerpc/include/asm/ |
D | systbl.h | 277 SYSCALL(request_key)
|
/linux-4.4.14/fs/ecryptfs/ |
D | ecryptfs_kernel.h | 96 return request_key(&key_type_encrypted, sig, NULL); in ecryptfs_get_encrypted_key()
|
D | keystore.c | 1633 (*auth_tok_key) = request_key(&key_type_user, sig, NULL); in ecryptfs_keyring_auth_tok_for_sig()
|
/linux-4.4.14/arch/s390/kernel/ |
D | compat_wrapper.c | 139 COMPAT_SYSCALL_WRAP4(request_key, const char __user *, tp, const char __user *, dsc, const char __u…
|
/linux-4.4.14/net/rxrpc/ |
D | ar-key.c | 909 key = request_key(&key_type_rxrpc, description, NULL); in rxrpc_request_key() 946 key = request_key(&key_type_keyring, description, NULL); in rxrpc_server_keyring()
|
/linux-4.4.14/net/ceph/ |
D | ceph_common.c | 299 ukey = request_key(&key_type_ceph, name, NULL); in get_secret()
|
/linux-4.4.14/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 258 249 common request_key sys_request_key
|
D | syscall_32.tbl | 296 287 i386 request_key sys_request_key
|