Lines Matching refs:keyrings
26 tokens, keyrings, etc.. These are represented in the kernel by struct key.
140 * Each process subscribes to three keyrings: a thread-specific keyring, a
161 * Each user ID resident in the system holds two special keyrings: a user
172 limits the total number of keys and keyrings, the other limits the total
179 Process-specific and thread-specific keyrings are not counted towards a
186 manipulate keys and keyrings.
192 userspace to request a key that can't be found in a process's keyrings.
222 This permits keyrings to be searched and keys to be found. Searches can
223 only recurse into nested keyrings that have search permission set.
257 The default keyrings associated with users will be labeled with the default
262 Note, however, that the default keyrings associated with the root user are
266 The keyrings associated with new threads are each labeled with the context of
267 their associated thread, and both session and process keyrings are handled
362 values available for referring to special keys and keyrings that relate to the
420 * Search the process's keyrings for a key, potentially calling out to
427 This function searches all the process's keyrings in the order thread,
560 This function can also be used to clear special kernel keyrings if they
576 The link procedure checks the nesting of the keyrings, returning ELOOP if
594 keyrings are the same, nothing is done.
601 successful and write permission on both keyrings. Any errors that can
628 error EACCES will result. Only keyrings that the process has search
629 permission on will be recursed into, and only keys and keyrings for which
763 authorisation key associated with the specified key in its keyrings
767 requester's keyrings using the requester's security label, UID, GID and
826 keys from all keyrings and deletes the key when its reference count
913 One application of restricted keyrings is to verify X.509 certificate
1126 keyrings. There are three functions for dealing with these::
1323 keyring in a process's keyrings. A keyring thus found can then be searched
1325 search a specific keyring, so using keyrings in this way is of limited utility.
1798 <key> is the key being constructed, and the three keyrings are the process
1799 keyrings from the process that caused the search to be issued. These are
1802 1 There may be an authentication token in one of the keyrings that is
1814 cache the key in one of the keyrings (probably the session ring) before
1817 keyrings.
1843 from those keyrings that point to them and deleted as soon as possible by a