Searched refs:keyctl (Results 1 – 25 of 39) sorted by relevance
12
19 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl01.c" ]24 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl02.c" ]29 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl03.c" ]34 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl04.c" ]39 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl05.c" ]44 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl06.c" ]49 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl07.c" ]54 sources = [ "//third_party/ltp/testcases/kernel/syscalls/keyctl/keyctl08.c" ]
49 keyctl add trusted name "new keylen [options]" ring50 keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring51 keyctl update key "update [options]"52 keyctl print keyid76 "keyctl print" returns an ascii hex copy of the sealed key, which is in standard96 keyctl add encrypted name "new [format] key-type:master-key-name keylen"98 keyctl add encrypted name "load hex_blob" ring99 keyctl update keyid "update key-type:master-key-name"117 $ keyctl add trusted kmk "new 32" @u120 $ keyctl show[all …]
29 commands 'keyctl print' or 'keyctl pipe' does not contain the overall42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring43 keyctl add encrypted name "load hex_blob" ring44 keyctl update keyid "update key-type:master-key-name"58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u61 $ keyctl print 1918453067 $ keyctl pipe 19184530 > ecryptfs.blob
357 request_key and keyctl. The latter provides a number of functions for443 The keyctl syscall functions are:447 key_serial_t keyctl(KEYCTL_GET_KEYRING_ID, key_serial_t id,460 key_serial_t keyctl(KEYCTL_JOIN_SESSION_KEYRING, const char *name);478 long keyctl(KEYCTL_UPDATE, key_serial_t key, const void *payload,492 long keyctl(KEYCTL_REVOKE, key_serial_t key);501 long keyctl(KEYCTL_CHOWN, key_serial_t key, uid_t uid, gid_t gid);514 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm);525 long keyctl(KEYCTL_DESCRIBE, key_serial_t key, char *buffer,554 long keyctl(KEYCTL_CLEAR, key_serial_t keyring);[all …]
268 "keyctl:keyctl01",269 "keyctl:keyctl02",270 "keyctl:keyctl03",271 "keyctl:keyctl04",272 "keyctl:keyctl05",273 "keyctl:keyctl06",274 "keyctl:keyctl07",275 "keyctl:keyctl08",
64 keyctl search @s asymmetric id:5acc214275 keyctl search @s asymmetric tpm:5acc2142379 root_id=`keyctl add keyring root-certs "" @s`380 keyctl padd asymmetric "" $root_id < root1.cert381 keyctl padd asymmetric "" $root_id < root2.cert384 chain_id=`keyctl add keyring chain "" @s`385 keyctl restrict_keyring $chain_id asymmetric key_or_keyring:$root_id:chain389 keyctl padd asymmetric "" $chain_id < intermediateA.cert390 keyctl padd asymmetric "" $chain_id < intermediateB.cert391 keyctl padd asymmetric "" $chain_id < end-entity.cert[all …]
87 Here is example output of the keyctl utility::89 $ keyctl show99 $ keyctl list 128198054
13 keyctl.o \
17 COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, in COMPAT_SYSCALL_DEFINE5() argument
264 COND_SYSCALL(keyctl);265 COND_SYSCALL_COMPAT(keyctl);
63 keyctl clear @u
204 and cell, eg: "afs@<cellname>". This can be viewed with the keyctl program or207 [root@andromeda ~]# keyctl show
16 keyring using keyctl, and EVM is then enabled by
200 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file]204 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
115 "keyctl read/print/pipe".
217 sb_notify() syscalls and the KEYCTL_WATCH_KEY keyctl() function.
252 241 n64 keyctl sys_keyctl
256 245 n32 keyctl compat_sys_keyctl
261 249 common keyctl sys_keyctl
498 keyctl add user fscache:objlist <restrictions> @s524 keyctl add user fscache:objlist KB @s
280 258 common keyctl sys_keyctl
261 250 common keyctl sys_keyctl
328 311 common keyctl sys_keyctl
298 288 common keyctl sys_keyctl