Home
last modified time | relevance | path

Searched refs:keyctl (Results 1 – 25 of 40) sorted by relevance

12

/linux/Documentation/security/keys/ !
H A Dtrusted-encrypted.rst268 keyctl add trusted name "new keylen [options]" ring
269 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring
270 keyctl update key "update [options]"
271 keyctl print keyid
295 "keyctl print" returns an ascii hex copy of the sealed key, which is in standard
305 keyctl add trusted name "new keylen" ring
306 keyctl add trusted name "load hex_blob" ring
307 keyctl print keyid
309 "keyctl print" returns an ASCII hex copy of the sealed key, which is in format
318 keyctl add trusted name "new keylen" ring
[all …]
H A Decryptfs.rst29 commands 'keyctl print' or 'keyctl pipe' does not contain the overall
42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
43 keyctl add encrypted name "load hex_blob" ring
44 keyctl update keyid "update key-type:master-key-name"
58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u
61 $ keyctl print 19184530
67 $ keyctl pipe 19184530 > ecryptfs.blob
H A Dcore.rst357 request_key and keyctl. The latter provides a number of functions for
443 The keyctl syscall functions are:
447 key_serial_t keyctl(KEYCTL_GET_KEYRING_ID, key_serial_t id,
460 key_serial_t keyctl(KEYCTL_JOIN_SESSION_KEYRING, const char *name);
478 long keyctl(KEYCTL_UPDATE, key_serial_t key, const void *payload,
492 long keyctl(KEYCTL_REVOKE, key_serial_t key);
501 long keyctl(KEYCTL_CHOWN, key_serial_t key, uid_t uid, gid_t gid);
514 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm);
525 long keyctl(KEYCTL_DESCRIBE, key_serial_t key, char *buffer,
554 long keyctl(KEYCTL_CLEAR, key_serial_t keyring);
[all …]
/linux/tools/testing/selftests/bpf/ !
H A Dverify_sig_setup.sh55 key_id=$(cat ${tmp_dir}/signing_key.der | keyctl padd asymmetric ebpf_testing_key @s)
56 keyring_id=$(keyctl newring ebpf_testing_keyring @s)
57 keyctl link $key_id $keyring_id
63 keyctl unlink $(keyctl search @s asymmetric ebpf_testing_key) @s
64 keyctl unlink $(keyctl search @s keyring ebpf_testing_keyring) @s
/linux/tools/testing/selftests/dm-verity/ !
H A Dtest-dm-verity-keyring.sh135 for cmd in openssl veritysetup keyctl losetup dmsetup dd awk; do
261 keyctl restrict_keyring "$keyring_id" || \
369 keyctl show "$keyring_id" 2>/dev/null || true
388 keys=$(keyctl list "$keyring_id" 2>/dev/null)
398keyctl list "$keyring_id" 2>/dev/null | awk '{print $1}' | grep -E '^[0-9]+$' | while read -r key_…
400 keyctl describe "$key_id" 2>/dev/null | sed 's/^/ /'
459 if key_id=$(keyctl padd asymmetric "$name" "$keyring_id" \
482 if keyctl padd asymmetric "dm-verity-test" "$keyring_id" \
729 if keyctl padd asymmetric "dm-verity-test" "$keyring_id" \
/linux/Documentation/translations/zh_CN/security/ !
H A Ddigsig.rst89 以下是keyctl实用工具的示例输出::
91 $ keyctl show
101 $ keyctl list 128198054
/linux/Documentation/crypto/ !
H A Dasymmetric-keys.rst64 keyctl search @s asymmetric id:5acc2142
75 keyctl search @s asymmetric tpm:5acc2142
379 root_id=`keyctl add keyring root-certs "" @s`
380 keyctl padd asymmetric "" $root_id < root1.cert
381 keyctl padd asymmetric "" $root_id < root2.cert
384 chain_id=`keyctl add keyring chain "" @s`
385 keyctl restrict_keyring $chain_id asymmetric key_or_keyring:$root_id:chain
389 keyctl padd asymmetric "" $chain_id < intermediateA.cert
390 keyctl padd asymmetric "" $chain_id < intermediateB.cert
391 keyctl padd asymmetric "" $chain_id < end-entity.cert
[all …]
/linux/Documentation/security/ !
H A Ddigsig.rst87 Here is example output of the keyctl utility::
89 $ keyctl show
99 $ keyctl list 128198054
/linux/security/keys/ !
H A DMakefile13 keyctl.o \
H A Dcompat.c17 COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, in COMPAT_SYSCALL_DEFINE5() argument
/linux/drivers/platform/cznic/ !
H A DMakefile6 turris-omnia-mcu-$(CONFIG_TURRIS_OMNIA_MCU_KEYCTL) += turris-omnia-mcu-keyctl.o
H A DKconfig88 key (if available on the MCU). This is exposed via the keyctl()
/linux/kernel/ !
H A Dsys_ni.c165 COND_SYSCALL(keyctl);
166 COND_SYSCALL_COMPAT(keyctl);
/linux/Documentation/translations/zh_CN/core-api/ !
H A Dwatch_queue.rst271 keyctl(KEYCTL_WATCH_KEY, KEY_SPEC_SESSION_KEYRING, fds[1], 0x01);
/linux/Documentation/filesystems/ !
H A Decryptfs.rst63 keyctl clear @u
H A Dafs.rst204 and cell, e.g.: "afs@<cellname>". This can be viewed with the keyctl program or
207 [root@andromeda ~]# keyctl show
/linux/Documentation/ABI/testing/ !
H A Devm17 keyring using keyctl, and EVM is then enabled by
/linux/Documentation/admin-guide/ !
H A Dmodule-signing.rst207 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file]
211 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
/linux/Documentation/networking/ !
H A Ddns_resolver.rst113 "keyctl read/print/pipe".
/linux/tools/perf/arch/mips/entry/syscalls/ !
H A Dsyscall_n64.tbl252 241 n64 keyctl sys_keyctl
/linux/scripts/ !
H A Dsyscall.tbl263 219 common keyctl sys_keyctl compat_sys_keyctl
/linux/tools/perf/arch/arm64/entry/syscalls/ !
H A Dsyscall_64.tbl263 219 common keyctl sys_keyctl compat_sys_keyctl
/linux/arch/arm64/tools/ !
H A Dsyscall_64.tbl263 219 common keyctl sys_keyctl compat_sys_keyctl
/linux/tools/perf/arch/s390/entry/syscalls/ !
H A Dsyscall.tbl234 280 common keyctl sys_keyctl
/linux/tools/scripts/ !
H A Dsyscall.tbl263 219 common keyctl sys_keyctl compat_sys_keyctl

12