| /linux/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 268 keyctl add trusted name "new keylen [options]" ring 269 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring 270 keyctl update key "update [options]" 271 keyctl print keyid 295 "keyctl print" returns an ascii hex copy of the sealed key, which is in standard 305 keyctl add trusted name "new keylen" ring 306 keyctl add trusted name "load hex_blob" ring 307 keyctl print keyid 309 "keyctl print" returns an ASCII hex copy of the sealed key, which is in format 318 keyctl add trusted name "new keylen" ring [all …]
|
| H A D | ecryptfs.rst | 29 commands 'keyctl print' or 'keyctl pipe' does not contain the overall 42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 43 keyctl add encrypted name "load hex_blob" ring 44 keyctl update keyid "update key-type:master-key-name" 58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u 61 $ keyctl print 19184530 67 $ keyctl pipe 19184530 > ecryptfs.blob
|
| H A D | core.rst | 357 request_key and keyctl. The latter provides a number of functions for 443 The keyctl syscall functions are: 447 key_serial_t keyctl(KEYCTL_GET_KEYRING_ID, key_serial_t id, 460 key_serial_t keyctl(KEYCTL_JOIN_SESSION_KEYRING, const char *name); 478 long keyctl(KEYCTL_UPDATE, key_serial_t key, const void *payload, 492 long keyctl(KEYCTL_REVOKE, key_serial_t key); 501 long keyctl(KEYCTL_CHOWN, key_serial_t key, uid_t uid, gid_t gid); 514 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm); 525 long keyctl(KEYCTL_DESCRIBE, key_serial_t key, char *buffer, 554 long keyctl(KEYCTL_CLEAR, key_serial_t keyring); [all …]
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | verify_sig_setup.sh | 55 key_id=$(cat ${tmp_dir}/signing_key.der | keyctl padd asymmetric ebpf_testing_key @s) 56 keyring_id=$(keyctl newring ebpf_testing_keyring @s) 57 keyctl link $key_id $keyring_id 63 keyctl unlink $(keyctl search @s asymmetric ebpf_testing_key) @s 64 keyctl unlink $(keyctl search @s keyring ebpf_testing_keyring) @s
|
| /linux/tools/testing/selftests/dm-verity/ |
| H A D | test-dm-verity-keyring.sh | 135 for cmd in openssl veritysetup keyctl losetup dmsetup dd awk; do 261 keyctl restrict_keyring "$keyring_id" || \ 369 keyctl show "$keyring_id" 2>/dev/null || true 388 keys=$(keyctl list "$keyring_id" 2>/dev/null) 398 …keyctl list "$keyring_id" 2>/dev/null | awk '{print $1}' | grep -E '^[0-9]+$' | while read -r key_… 400 keyctl describe "$key_id" 2>/dev/null | sed 's/^/ /' 459 if key_id=$(keyctl padd asymmetric "$name" "$keyring_id" \ 482 if keyctl padd asymmetric "dm-verity-test" "$keyring_id" \ 729 if keyctl padd asymmetric "dm-verity-test" "$keyring_id" \
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | digsig.rst | 89 以下是keyctl实用工具的示例输出:: 91 $ keyctl show 101 $ keyctl list 128198054
|
| /linux/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 64 keyctl search @s asymmetric id:5acc2142 75 keyctl search @s asymmetric tpm:5acc2142 379 root_id=`keyctl add keyring root-certs "" @s` 380 keyctl padd asymmetric "" $root_id < root1.cert 381 keyctl padd asymmetric "" $root_id < root2.cert 384 chain_id=`keyctl add keyring chain "" @s` 385 keyctl restrict_keyring $chain_id asymmetric key_or_keyring:$root_id:chain 389 keyctl padd asymmetric "" $chain_id < intermediateA.cert 390 keyctl padd asymmetric "" $chain_id < intermediateB.cert 391 keyctl padd asymmetric "" $chain_id < end-entity.cert [all …]
|
| /linux/Documentation/security/ |
| H A D | digsig.rst | 87 Here is example output of the keyctl utility:: 89 $ keyctl show 99 $ keyctl list 128198054
|
| /linux/security/keys/ |
| H A D | Makefile | 13 keyctl.o \
|
| H A D | compat.c | 17 COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, in COMPAT_SYSCALL_DEFINE5() argument
|
| /linux/drivers/platform/cznic/ |
| H A D | Makefile | 6 turris-omnia-mcu-$(CONFIG_TURRIS_OMNIA_MCU_KEYCTL) += turris-omnia-mcu-keyctl.o
|
| H A D | Kconfig | 88 key (if available on the MCU). This is exposed via the keyctl()
|
| /linux/kernel/ |
| H A D | sys_ni.c | 165 COND_SYSCALL(keyctl); 166 COND_SYSCALL_COMPAT(keyctl);
|
| /linux/Documentation/translations/zh_CN/core-api/ |
| H A D | watch_queue.rst | 271 keyctl(KEYCTL_WATCH_KEY, KEY_SPEC_SESSION_KEYRING, fds[1], 0x01);
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 63 keyctl clear @u
|
| H A D | afs.rst | 204 and cell, e.g.: "afs@<cellname>". This can be viewed with the keyctl program or 207 [root@andromeda ~]# keyctl show
|
| /linux/Documentation/ABI/testing/ |
| H A D | evm | 17 keyring using keyctl, and EVM is then enabled by
|
| /linux/Documentation/admin-guide/ |
| H A D | module-signing.rst | 207 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file] 211 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
|
| /linux/Documentation/networking/ |
| H A D | dns_resolver.rst | 113 "keyctl read/print/pipe".
|
| /linux/tools/perf/arch/mips/entry/syscalls/ |
| H A D | syscall_n64.tbl | 252 241 n64 keyctl sys_keyctl
|
| /linux/scripts/ |
| H A D | syscall.tbl | 263 219 common keyctl sys_keyctl compat_sys_keyctl
|
| /linux/tools/perf/arch/arm64/entry/syscalls/ |
| H A D | syscall_64.tbl | 263 219 common keyctl sys_keyctl compat_sys_keyctl
|
| /linux/arch/arm64/tools/ |
| H A D | syscall_64.tbl | 263 219 common keyctl sys_keyctl compat_sys_keyctl
|
| /linux/tools/perf/arch/s390/entry/syscalls/ |
| H A D | syscall.tbl | 234 280 common keyctl sys_keyctl
|
| /linux/tools/scripts/ |
| H A D | syscall.tbl | 263 219 common keyctl sys_keyctl compat_sys_keyctl
|