Home
last modified time | relevance | path

Searched refs:request_key (Results 1 – 33 of 33) sorted by relevance

/linux-4.4.14/Documentation/security/
Dkeys-request-key.txt10 request_key*():
12 struct key *request_key(const struct key_type *type,
39 Or by userspace invoking the request_key system call:
41 key_serial_t request_key(const char *type,
51 The request_key*_with_auxdata() calls are like the in-kernel request_key*()
76 (1) Process A calls request_key() [the userspace syscall calls the kernel
79 (2) request_key() searches the process's subscribed keyrings to see if there's
84 (3) request_key() sees that A doesn't have the desired key yet, so it creates
93 (4) request_key() then forks and executes /sbin/request-key with a new session
116 (10) The program then exits 0 and request_key() deletes key V and returns key
[all …]
Dkeys.txt372 request_key and keyctl. The latter provides a number of functions for
388 KEY_SPEC_REQKEY_AUTH_KEY -7 assumed request_key()
438 key_serial_t request_key(const char *type, const char *description,
725 request_key() system call.
884 struct key *request_key(const struct key_type *type,
912 This is identical to request_key(), except that the auxiliary data is
913 passed to the key_type->request_key() op if it exists, and the callout_info
932 which are asynchronous equivalents of request_key() and
1042 This can be used with a function such as request_key() to find a specific
1044 with keyring_search(). Note that it is not possible to use request_key() to
[all …]
/linux-4.4.14/security/keys/encrypted-keys/
Dmasterkey_trusted.c37 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
Dencrypted.c312 ukey = request_key(&key_type_user, master_desc, NULL); in request_user_key()
/linux-4.4.14/security/keys/
DMakefile15 request_key.o \
Drequest_key.c231 if (key->type->request_key) in construct_key()
232 actor = key->type->request_key; in construct_key()
619 struct key *request_key(struct key_type *type, in request_key() function
640 EXPORT_SYMBOL(request_key);
Dkeyctl.c158 SYSCALL_DEFINE4(request_key, const char __user *, _type, in SYSCALL_DEFINE4() argument
/linux-4.4.14/include/linux/
Dkey-type.h149 request_key_actor_t request_key; member
Dkey.h242 extern struct key *request_key(struct key_type *type,
/linux-4.4.14/security/integrity/
Ddigsig_asymmetric.c45 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
Ddigsig.c44 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_digsig_verify()
/linux-4.4.14/net/dns_resolver/
Ddns_query.c123 rkey = request_key(&key_type_dns_resolver, desc, options); in dns_query()
/linux-4.4.14/fs/cifs/
Dcifs_spnego.c166 spnego_key = request_key(&cifs_spnego_key_type, description, ""); in cifs_get_spnego_key()
Dcifsacl.c216 sidkey = request_key(&cifs_idmap_key_type, desc, ""); in id_to_sid()
284 sidkey = request_key(&cifs_idmap_key_type, sidstr, ""); in sid_to_id()
Dconnect.c2392 key = request_key(&key_type_logon, desc, ""); in cifs_set_cifscreds()
2403 key = request_key(&key_type_logon, desc, ""); in cifs_set_cifscreds()
/linux-4.4.14/Documentation/networking/
Ddns_resolver.txt125 When dns_query() is invoked, it calls request_key() to search the local
129 Upcalls to userspace are made through the request_key() upcall vector, and are
Drxrpc.txt400 extracted from the calling process's keyrings with request_key() and
517 This issues a request_key() to get the key representing the security
681 (2) Avoid having RxRPC call request_key() at the point of issue of a call or
/linux-4.4.14/lib/
Ddigsig.c218 key = request_key(&key_type_user, name, NULL); in digsig_verify()
/linux-4.4.14/fs/f2fs/
Dcrypto_key.c194 keyring_key = request_key(&key_type_logon, full_key_descriptor, NULL); in _f2fs_get_encryption_info()
/linux-4.4.14/security/integrity/evm/
Devm_crypto.c245 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL); in evm_init_key()
/linux-4.4.14/fs/ext4/
Dcrypto_key.c203 keyring_key = request_key(&key_type_logon, full_key_descriptor, NULL); in _ext4_get_encryption_info()
/linux-4.4.14/fs/nfs/
Dnfs4idmap.c280 rkey = request_key(&key_type_id_resolver, desc, ""); in nfs_idmap_request_key()
408 .request_key = nfs_idmap_legacy_upcall,
/linux-4.4.14/fs/afs/
Dsecurity.c30 key = request_key(&key_type_rxrpc, cell->anonymous_key->description, in afs_request_key()
/linux-4.4.14/fs/fscache/
Dobject-list.c325 key = request_key(&key_type_user, "fscache:objlist", NULL); in fscache_objlist_config()
/linux-4.4.14/arch/parisc/kernel/
Dsyscall_table.S363 ENTRY_SAME(request_key) /* 265 */
/linux-4.4.14/arch/powerpc/include/asm/
Dsystbl.h277 SYSCALL(request_key)
/linux-4.4.14/fs/ecryptfs/
Decryptfs_kernel.h96 return request_key(&key_type_encrypted, sig, NULL); in ecryptfs_get_encrypted_key()
Dkeystore.c1633 (*auth_tok_key) = request_key(&key_type_user, sig, NULL); in ecryptfs_keyring_auth_tok_for_sig()
/linux-4.4.14/arch/s390/kernel/
Dcompat_wrapper.c139 COMPAT_SYSCALL_WRAP4(request_key, const char __user *, tp, const char __user *, dsc, const char __u…
/linux-4.4.14/net/rxrpc/
Dar-key.c909 key = request_key(&key_type_rxrpc, description, NULL); in rxrpc_request_key()
946 key = request_key(&key_type_keyring, description, NULL); in rxrpc_server_keyring()
/linux-4.4.14/net/ceph/
Dceph_common.c299 ukey = request_key(&key_type_ceph, name, NULL); in get_secret()
/linux-4.4.14/arch/x86/entry/syscalls/
Dsyscall_64.tbl258 249 common request_key sys_request_key
Dsyscall_32.tbl296 287 i386 request_key sys_request_key