| /Linux-v5.4/include/linux/gpio/ |
| D | driver.h | 157 struct lock_class_key *request_key; member 460 struct lock_class_key *request_key); 488 static struct lock_class_key request_key; \ 490 &request_key); \ 596 struct lock_class_key *request_key); 616 static struct lock_class_key request_key; in gpiochip_irqchip_add() local 620 &lock_key, &request_key); in gpiochip_irqchip_add() 631 static struct lock_class_key request_key; in gpiochip_irqchip_add_nested() local 635 &lock_key, &request_key); in gpiochip_irqchip_add_nested()
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | request-key.rst | 10 ``request_key*()``:: 12 struct key *request_key(const struct key_type *type, 38 Or by userspace invoking the request_key system call:: 40 key_serial_t request_key(const char *type, 50 The request_key_tag() call is like the in-kernel request_key(), except that it 78 1) Process A calls request_key() [the userspace syscall calls the kernel 81 2) request_key() searches the process's subscribed keyrings to see if there's 86 3) request_key() sees that A doesn't have the desired key yet, so it creates 95 4) request_key() then forks and executes /sbin/request-key with a new session 118 10) The program then exits 0 and request_key() deletes key V and returns key [all …]
|
| D | core.rst | 357 request_key and keyctl. The latter provides a number of functions for 373 KEY_SPEC_REQKEY_AUTH_KEY -7 assumed request_key() 423 key_serial_t request_key(const char *type, const char *description, 735 request_key() system call. 1085 struct key *request_key(const struct key_type *type, 1112 This is identical to request_key(), except that a domain tag may be 1128 passed to the key_type->request_key() op if it exists, and the 1261 This can be used with a function such as request_key() to find a specific 1263 with keyring_search(). Note that it is not possible to use request_key() to 1570 * ``int (*request_key)(struct key_construction *cons, const char *op, void *aux);`` [all …]
|
| /Linux-v5.4/security/keys/encrypted-keys/ |
| D | masterkey_trusted.c | 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL); in request_trusted_key()
|
| /Linux-v5.4/security/keys/ |
| D | request_key.c | 117 static char const request_key[] = "/sbin/request-key"; in call_sbin_request_key() local 182 argv[i++] = (char *)request_key; in call_sbin_request_key() 193 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, in call_sbin_request_key() 241 if (key->type->request_key) in construct_key() 242 actor = key->type->request_key; in construct_key()
|
| D | Makefile | 16 request_key.o \
|
| D | Kconfig | 29 bool "Enable temporary caching of the last request_key() result" 32 This option causes the result of the last successful request_key()
|
| /Linux-v5.4/tools/perf/trace/strace/groups/ |
| D | string | 52 request_key
|
| /Linux-v5.4/drivers/md/ |
| D | dm-verity-verify-sig.c | 38 key = request_key(&key_type_user, in verity_verify_get_sig_from_key()
|
| /Linux-v5.4/include/linux/ |
| D | key-type.h | 140 request_key_actor_t request_key; member
|
| D | key.h | 319 static inline struct key *request_key(struct key_type *type, in request_key() function
|
| /Linux-v5.4/security/integrity/ |
| D | digsig_asymmetric.c | 56 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
|
| D | digsig.c | 49 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id()
|
| /Linux-v5.4/Documentation/networking/ |
| D | dns_resolver.txt | 125 When dns_query() is invoked, it calls request_key() to search the local 129 Upcalls to userspace are made through the request_key() upcall vector, and are
|
| /Linux-v5.4/fs/cifs/ |
| D | cifs_spnego.c | 173 spnego_key = request_key(&cifs_spnego_key_type, description, ""); in cifs_get_spnego_key()
|
| /Linux-v5.4/lib/ |
| D | digsig.c | 227 key = request_key(&key_type_user, name, NULL); in digsig_verify()
|
| /Linux-v5.4/drivers/gpio/ |
| D | gpiolib.c | 87 struct lock_class_key *request_key); 1261 struct lock_class_key *request_key) in gpiochip_add_data_with_key() argument 1418 ret = gpiochip_add_irqchip(chip, lock_key, request_key); in gpiochip_add_data_with_key() 2049 irq_set_lockdep_class(irq, chip->irq.lock_key, chip->irq.request_key); in gpiochip_irq_map() 2229 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument 2266 gpiochip->irq.request_key = request_key; in gpiochip_add_irqchip() 2398 struct lock_class_key *request_key) in gpiochip_irqchip_add_key() argument 2439 gpiochip->irq.request_key = request_key; in gpiochip_irqchip_add_key() 2460 struct lock_class_key *request_key) in gpiochip_add_irqchip() argument
|
| /Linux-v5.4/kernel/ |
| D | sys_ni.c | 263 COND_SYSCALL(request_key);
|
| /Linux-v5.4/fs/crypto/ |
| D | keysetup_v1.c | 107 key = request_key(&key_type_logon, description, NULL); in find_and_lock_process_key()
|
| /Linux-v5.4/fs/nfs/ |
| D | nfs4idmap.c | 290 rkey = request_key(&key_type_id_resolver, desc, ""); in nfs_idmap_request_key() 419 .request_key = nfs_idmap_legacy_upcall,
|
| /Linux-v5.4/security/integrity/evm/ |
| D | evm_crypto.c | 359 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL); in evm_init_key()
|
| /Linux-v5.4/fs/fscache/ |
| D | object-list.c | 320 key = request_key(&key_type_user, "fscache:objlist", NULL); in fscache_objlist_config()
|
| /Linux-v5.4/fs/ubifs/ |
| D | auth.c | 303 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL); in ubifs_init_authentication()
|
| /Linux-v5.4/Documentation/driver-api/nvdimm/ |
| D | security.rst | 47 security specification [2]. A key is initially acquired via the request_key()
|
| /Linux-v5.4/drivers/nvdimm/ |
| D | security.c | 58 key = request_key(&key_type_encrypted, desc, ""); in nvdimm_request_key()
|