Searched refs:keyctl (Results 1 – 24 of 24) sorted by relevance
27 keyctl add trusted name "new keylen [options]" ring28 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring29 keyctl update key "update [options]"30 keyctl print keyid52 "keyctl print" returns an ascii hex copy of the sealed key, which is in standard72 keyctl add encrypted name "new [format] key-type:master-key-name keylen"74 keyctl add encrypted name "load hex_blob" ring75 keyctl update keyid "update key-type:master-key-name"87 $ keyctl add trusted kmk "new 32" @u90 $ keyctl show[all …]
29 commands 'keyctl print' or 'keyctl pipe' does not contain the overall42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring43 keyctl add encrypted name "load hex_blob" ring44 keyctl update keyid "update key-type:master-key-name"58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u61 $ keyctl print 1918453067 $ keyctl pipe 19184530 > ecryptfs.blob
357 request_key and keyctl. The latter provides a number of functions for439 The keyctl syscall functions are:443 key_serial_t keyctl(KEYCTL_GET_KEYRING_ID, key_serial_t id,456 key_serial_t keyctl(KEYCTL_JOIN_SESSION_KEYRING, const char *name);474 long keyctl(KEYCTL_UPDATE, key_serial_t key, const void *payload,488 long keyctl(KEYCTL_REVOKE, key_serial_t key);497 long keyctl(KEYCTL_CHOWN, key_serial_t key, uid_t uid, gid_t gid);510 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm);521 long keyctl(KEYCTL_DESCRIBE, key_serial_t key, char *buffer,550 long keyctl(KEYCTL_CLEAR, key_serial_t keyring);[all …]
64 keyctl search @s asymmetric id:5acc214275 keyctl search @s asymmetric tpm:5acc2142368 root_id=`keyctl add keyring root-certs "" @s`369 keyctl padd asymmetric "" $root_id < root1.cert370 keyctl padd asymmetric "" $root_id < root2.cert373 chain_id=`keyctl add keyring chain "" @s`374 keyctl restrict_keyring $chain_id asymmetric key_or_keyring:$root_id:chain378 keyctl padd asymmetric "" $chain_id < intermediateA.cert379 keyctl padd asymmetric "" $chain_id < intermediateB.cert380 keyctl padd asymmetric "" $chain_id < end-entity.cert[all …]
87 Here is example output of the keyctl utility::89 $ keyctl show99 $ keyctl list 128198054
13 keyctl.o \
59 COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, in COMPAT_SYSCALL_DEFINE5() argument
1637 SYSCALL_DEFINE5(keyctl, int, option, unsigned long, arg2, unsigned long, arg3, in SYSCALL_DEFINE5() argument
253 COND_SYSCALL(keyctl);254 COND_SYSCALL_COMPAT(keyctl);
57 keyctl clear @u
210 and cell, eg: "afs@<cellname>". This can be viewed with the keyctl program or213 [root@andromeda ~]# keyctl show
16 keyring using keyctl, and EVM is then enabled by
200 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file]204 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
115 "keyctl read/print/pipe".
279 COMPAT_SYS(keyctl)
364 ENTRY_COMP(keyctl)
261 250 common keyctl __x64_sys_keyctl
302 288 i386 keyctl sys_keyctl __ia32_compat_sys_keyctl
386 keyctl add user fscache:objlist <restrictions> @s408 keyctl add user fscache:objlist KB @s
328 311 common keyctl sys_keyctl
289 280 common keyctl sys_keyctl compat_sys_keyctl
8139 F: include/linux/keyctl.h8140 F: include/uapi/linux/keyctl.h