/linux/Documentation/security/keys/ |
H A D | request-key.rst | 10 ``request_key*()``:: 12 struct key *request_key(const struct key_type *type, 38 Or by userspace invoking the request_key system call:: 40 key_serial_t request_key(const char *type, 50 The request_key_tag() call is like the in-kernel request_key(), except that it 78 1) Process A calls request_key() [the userspace syscall calls the kernel 81 2) request_key() searches the process's subscribed keyrings to see if there's 86 3) request_key() sees that A doesn't have the desired key yet, so it creates 95 4) request_key() then forks and executes /sbin/request-key with a new session 118 10) The program then exits 0 and request_key() delete [all...] |
/linux/include/linux/gpio/ |
H A D | driver.h | 169 * @request_key: 173 struct lock_class_key *request_key; member 618 struct lock_class_key *request_key); 646 static struct lock_class_key request_key; \ 648 &request_key); \ 652 static struct lock_class_key request_key; \ 654 &request_key); \ 665 struct lock_class_key *request_key);
|
/linux/drivers/gpio/ |
H A D | gpiolib-devres.c | 339 * @request_key: lockdep class for IRQ request 352 struct lock_class_key *request_key) in devm_gpiochip_add_data_with_key() argument 356 ret = gpiochip_add_data_with_key(gc, data, lock_key, request_key); in devm_gpiochip_add_data_with_key()
|
H A D | gpiolib.c | 112 struct lock_class_key *request_key); 1033 struct lock_class_key *request_key) in gpiochip_add_data_with_key() argument 1199 ret = gpiochip_add_irqchip(gc, lock_key, request_key); in gpiochip_add_data_with_key() 1636 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); in gpiochip_hierarchy_irq_domain_alloc() 1832 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); in gpiochip_irq_map() 2063 * @request_key: lockdep class for IRQ request 2070 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument 2100 gc->irq.request_key = request_key; in gpiochip_add_irqchip() 2217 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument [all...] |
/linux/security/keys/ |
H A D | request_key.c | 120 static char const request_key[] = "/sbin/request-key"; in call_sbin_request_key() local 185 argv[i++] = (char *)request_key; in call_sbin_request_key() 196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, in call_sbin_request_key() 244 if (key->type->request_key) in construct_key() 245 actor = key->type->request_key; in construct_key() 344 * that /sbin/request-key can itself use request_key() to add in construct_get_dest_keyring() 367 * race between two thread calling request_key().
|
H A D | Makefile | 16 request_key.o \
|
H A D | Kconfig | 25 bool "Enable temporary caching of the last request_key() result" 28 This option causes the result of the last successful request_key()
|
/linux/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
|
/linux/tools/perf/trace/strace/groups/ |
H A D | string | 52 request_key
|
/linux/include/linux/ |
H A D | key-type.h | 134 /* handle request_key() for this type instead of invoking 142 request_key_actor_t request_key; member
|
H A D | key.h | 340 * request_key - Request a key and wait for construction 347 static inline struct key *request_key(struct key_type *type, in request_key() function 362 * As for request_key() except that it does not add the returned key to a
|
/linux/security/integrity/ |
H A D | digsig_asymmetric.c | 54 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
|
H A D | digsig.c | 49 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id()
|
/linux/drivers/md/ |
H A D | dm-verity-verify-sig.c | 38 key = request_key(&key_type_user, in verity_verify_get_sig_from_key()
|
/linux/net/rxrpc/ |
H A D | server_key.c | 135 key = request_key(&key_type_keyring, description, NULL); in rxrpc_server_keyring()
|
/linux/Documentation/networking/ |
H A D | dns_resolver.rst | 124 When dns_query() is invoked, it calls request_key() to search the local 128 Upcalls to userspace are made through the request_key() upcall vector, and are
|
/linux/fs/smb/client/ |
H A D | cifs_spnego.c | 168 spnego_key = request_key(&cifs_spnego_key_type, description, ""); in cifs_get_spnego_key()
|
/linux/lib/ |
H A D | digsig.c | 227 key = request_key(&key_type_user, name, NULL); in digsig_verify()
|
/linux/fs/crypto/ |
H A D | keysetup_v1.c | 98 key = request_key(&key_type_logon, description, NULL); in find_and_lock_process_key()
|
/linux/fs/nfs/ |
H A D | nfs4idmap.c | 252 * Assemble the description to pass to request_key() 291 rkey = request_key(&key_type_id_resolver, desc, ""); in nfs_idmap_request_key() 420 .request_key = nfs_idmap_legacy_upcall,
|
/linux/kernel/ |
H A D | sys_ni.c | 164 COND_SYSCALL(request_key);
|
H A D | crash_dump_dm_crypt.c | 148 key = request_key(&key_type_logon, dm_key->key_desc, NULL); in read_key_from_user_keying()
|
/linux/security/integrity/evm/ |
H A D | evm_crypto.c | 432 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL); in evm_init_key()
|
/linux/fs/ubifs/ |
H A D | auth.c | 278 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL); in ubifs_init_authentication()
|
/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 47 security specification [2]. A key is initially acquired via the request_key()
|