/security/keys/ |
H A D | keyring.c | 113 if (keyring->description) { 114 bucket = keyring_hash(keyring->description); 169 * Hash a key type and description. 175 const char *description = index_key->description; local 192 memcpy(&piece, description, n); 193 description += n; 260 chunk |= ((u8*)index_key->description)[--offset]; 285 memcmp(key->index_key.description, index_key->description, 492 keyring_alloc(const char *description, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags, struct key *dest) argument 889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument [all...] |
H A D | keyctl.c | 49 * Extract the description of a new key from userspace and either add it as a 52 * If the description is NULL or an empty string, the key type is asked to 67 char type[32], *description; local 81 description = NULL; 83 description = strndup_user(_description, KEY_MAX_DESC_SIZE); 84 if (IS_ERR(description)) { 85 ret = PTR_ERR(description); 88 if (!*description) { 89 kfree(description); 90 description 173 char type[32], *description, *callout_info; local 640 char type[32], *description; local [all...] |
H A D | request_key_auth.c | 75 seq_puts(m, key->description); 244 char description[16]; local 247 .index_key.description = description, 250 .match_data.raw_data = description, 257 sprintf(description, "%x", target_id);
|
H A D | request_key.c | 343 ctx->index_key.type->name, ctx->index_key.description); 356 key = key_alloc(ctx->index_key.type, ctx->index_key.description, 480 * @description: The searchable description of the key. 505 const char *description, 514 .index_key.description = description, 517 .match_data.raw_data = description, 527 ctx.index_key.type->name, ctx.index_key.description, 604 * @description 504 request_key_and_link(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument 615 request_key(struct key_type *type, const char *description, const char *callout_info) argument 652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument 688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument 713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument [all...] |
H A D | persistent.c | 59 persistent = keyring_alloc(index_key->description, 86 index_key.description = buf;
|
H A D | key.c | 198 * @desc: The key description to allow the key to be searched out. 254 * its description */ 274 /* allocate and initialise the key and its description */ 281 key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL); 282 if (!key->description) 319 kfree(key->description); 754 * @description: The searchable description for the key. 760 * Search the destination keyring for a key of the same description and if one 777 const char *description, 775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument [all...] |
H A D | big_key.c | 31 * big_key defined keys take an arbitrary string as the description and an 157 seq_puts(m, key->description);
|
H A D | user_defined.c | 24 * user defined keys take an arbitrary string as the description and an 173 seq_puts(m, key->description); 206 /* Vet the description for a "logon" key */ 211 /* require a "qualified" description string */ 216 /* also reject description with ':' as first char */
|
H A D | proc.c | 195 .index_key.description = key->description,
|
H A D | process_keys.c | 305 * The search criteria are the type and the match function. The description is 307 * the search. Typically the match function will compare the description 308 * parameter to the key's description. 675 ctx.index_key.description = key->description; 676 ctx.index_key.desc_len = strlen(key->description);
|
H A D | gc.c | 157 kfree(key->description);
|
H A D | internal.h | 147 const char *description,
|
/security/ |
H A D | Kconfig | 98 See Documentation/intel_txt.txt for a description of how to enable
|
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 103 * valid_ecryptfs_desc - verify the description of a new/loaded encrypted key 105 * The description of a encrypted key with format 'ecryptfs' must contain 114 pr_err("encrypted_key: key description must be %d hexadecimal " 121 pr_err("encrypted_key: key description must contain " 134 * desc:= master-key description 137 * only the master key description is permitted to change, not the key-type. 807 ret = encrypted_init(epayload, key->description, format, master_desc, 830 * encrypted_update - update the master key description 832 * Change the master key description for an existing encrypted key. 834 * master key description [all...] |
/security/smack/ |
H A D | smack_lsm.c | 3871 ad.a.u.key_struct.key_desc = keyp->description;
|