Searched refs:description (Results 1 - 15 of 15) sorted by relevance

/security/keys/
H A Dkeyring.c113 if (keyring->description) {
114 bucket = keyring_hash(keyring->description);
169 * Hash a key type and description.
175 const char *description = index_key->description; local
192 memcpy(&piece, description, n);
193 description += n;
260 chunk |= ((u8*)index_key->description)[--offset];
285 memcmp(key->index_key.description, index_key->description,
492 keyring_alloc(const char *description, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags, struct key *dest) argument
889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument
[all...]
H A Dkeyctl.c49 * Extract the description of a new key from userspace and either add it as a
52 * If the description is NULL or an empty string, the key type is asked to
67 char type[32], *description; local
81 description = NULL;
83 description = strndup_user(_description, KEY_MAX_DESC_SIZE);
84 if (IS_ERR(description)) {
85 ret = PTR_ERR(description);
88 if (!*description) {
89 kfree(description);
90 description
173 char type[32], *description, *callout_info; local
640 char type[32], *description; local
[all...]
H A Drequest_key_auth.c75 seq_puts(m, key->description);
244 char description[16]; local
247 .index_key.description = description,
250 .match_data.raw_data = description,
257 sprintf(description, "%x", target_id);
H A Drequest_key.c343 ctx->index_key.type->name, ctx->index_key.description);
356 key = key_alloc(ctx->index_key.type, ctx->index_key.description,
480 * @description: The searchable description of the key.
505 const char *description,
514 .index_key.description = description,
517 .match_data.raw_data = description,
527 ctx.index_key.type->name, ctx.index_key.description,
604 * @description
504 request_key_and_link(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument
615 request_key(struct key_type *type, const char *description, const char *callout_info) argument
652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument
713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
[all...]
H A Dpersistent.c59 persistent = keyring_alloc(index_key->description,
86 index_key.description = buf;
H A Dkey.c198 * @desc: The key description to allow the key to be searched out.
254 * its description */
274 /* allocate and initialise the key and its description */
281 key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL);
282 if (!key->description)
319 kfree(key->description);
754 * @description: The searchable description for the key.
760 * Search the destination keyring for a key of the same description and if one
777 const char *description,
775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument
[all...]
H A Dbig_key.c31 * big_key defined keys take an arbitrary string as the description and an
157 seq_puts(m, key->description);
H A Duser_defined.c24 * user defined keys take an arbitrary string as the description and an
173 seq_puts(m, key->description);
206 /* Vet the description for a "logon" key */
211 /* require a "qualified" description string */
216 /* also reject description with ':' as first char */
H A Dproc.c195 .index_key.description = key->description,
H A Dprocess_keys.c305 * The search criteria are the type and the match function. The description is
307 * the search. Typically the match function will compare the description
308 * parameter to the key's description.
675 ctx.index_key.description = key->description;
676 ctx.index_key.desc_len = strlen(key->description);
H A Dgc.c157 kfree(key->description);
H A Dinternal.h147 const char *description,
/security/
H A DKconfig98 See Documentation/intel_txt.txt for a description of how to enable
/security/keys/encrypted-keys/
H A Dencrypted.c103 * valid_ecryptfs_desc - verify the description of a new/loaded encrypted key
105 * The description of a encrypted key with format 'ecryptfs' must contain
114 pr_err("encrypted_key: key description must be %d hexadecimal "
121 pr_err("encrypted_key: key description must contain "
134 * desc:= master-key description
137 * only the master key description is permitted to change, not the key-type.
807 ret = encrypted_init(epayload, key->description, format, master_desc,
830 * encrypted_update - update the master key description
832 * Change the master key description for an existing encrypted key.
834 * master key description
[all...]
/security/smack/
H A Dsmack_lsm.c3871 ad.a.u.key_struct.key_desc = keyp->description;

Completed in 127 milliseconds