Home
last modified time | relevance | path

Searched refs:keyring (Results 1 – 12 of 12) sorted by relevance

/security/keys/
Dkeyring.c78 static int keyring_instantiate(struct key *keyring,
80 static void keyring_revoke(struct key *keyring);
81 static void keyring_destroy(struct key *keyring);
82 static void keyring_describe(const struct key *keyring, struct seq_file *m);
83 static long keyring_read(const struct key *keyring,
109 static void keyring_publish_name(struct key *keyring) in keyring_publish_name() argument
113 if (keyring->description) { in keyring_publish_name()
114 bucket = keyring_hash(keyring->description); in keyring_publish_name()
121 list_add_tail(&keyring->type_data.link, in keyring_publish_name()
148 static int keyring_instantiate(struct key *keyring, in keyring_instantiate() argument
[all …]
Dprocess_keys.c139 struct key *keyring; in install_thread_keyring_to_cred() local
144 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred()
147 if (IS_ERR(keyring)) in install_thread_keyring_to_cred()
148 return PTR_ERR(keyring); in install_thread_keyring_to_cred()
150 new->thread_keyring = keyring; in install_thread_keyring_to_cred()
185 struct key *keyring; in install_process_keyring_to_cred() local
190 keyring = keyring_alloc("_pid", new->uid, new->gid, new, in install_process_keyring_to_cred()
193 if (IS_ERR(keyring)) in install_process_keyring_to_cred()
194 return PTR_ERR(keyring); in install_process_keyring_to_cred()
196 new->process_keyring = keyring; in install_process_keyring_to_cred()
[all …]
Dkey.c408 struct key *keyring, in __key_instantiate_and_link() argument
415 key_check(keyring); in __key_instantiate_and_link()
436 if (keyring) in __key_instantiate_and_link()
478 struct key *keyring, in key_instantiate_and_link() argument
496 if (keyring) { in key_instantiate_and_link()
497 ret = __key_link_begin(keyring, &key->index_key, &edit); in key_instantiate_and_link()
502 ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit); in key_instantiate_and_link()
504 if (keyring) in key_instantiate_and_link()
505 __key_link_end(keyring, &key->index_key, edit); in key_instantiate_and_link()
539 struct key *keyring, in key_reject_and_link() argument
[all …]
Dinternal.h91 extern int __key_link_begin(struct key *keyring,
94 extern int __key_link_check_live_key(struct key *keyring, struct key *key);
96 extern void __key_link_end(struct key *keyring,
103 extern struct key *keyring_search_instkey(struct key *keyring,
106 extern int iterate_over_keyring(const struct key *keyring,
167 extern void keyring_gc(struct key *keyring, time_t limit);
Drequest_key.c58 struct key *keyring = info->data; in umh_keys_init() local
60 return install_session_keyring_to_cred(cred, keyring); in umh_keys_init()
68 struct key *keyring = info->data; in umh_keys_cleanup() local
69 key_put(keyring); in umh_keys_cleanup()
100 struct key *key = cons->key, *authkey = cons->authkey, *keyring, in call_sbin_request_key() local
117 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, in call_sbin_request_key()
121 if (IS_ERR(keyring)) { in call_sbin_request_key()
122 ret = PTR_ERR(keyring); in call_sbin_request_key()
127 ret = key_link(keyring, authkey); in call_sbin_request_key()
175 ret = call_usermodehelper_keys(argv[0], argv, envp, keyring, in call_sbin_request_key()
[all …]
DMakefile11 keyring.o \
DKconfig16 Furthermore, a special type of key is available that acts as keyring:
36 A particular keyring may be accessed by either the user whose keyring
/security/integrity/
Ddigsig.c24 static struct key *keyring[INTEGRITY_KEYRING_MAX]; variable
42 if (!keyring[id]) { in integrity_digsig_verify()
43 keyring[id] = in integrity_digsig_verify()
45 if (IS_ERR(keyring[id])) { in integrity_digsig_verify()
46 int err = PTR_ERR(keyring[id]); in integrity_digsig_verify()
48 keyring[id] = NULL; in integrity_digsig_verify()
56 return digsig_verify(keyring[id], sig + 1, siglen - 1, in integrity_digsig_verify()
59 return asymmetric_verify(keyring[id], sig, siglen, in integrity_digsig_verify()
71 keyring[id] = keyring_alloc(keyring_name[id], KUIDT_INIT(0), in integrity_init_keyring()
77 if (!IS_ERR(keyring[id])) in integrity_init_keyring()
[all …]
Ddigsig_asymmetric.c26 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument
35 if (keyring) { in request_asymmetric_key()
38 kref = keyring_search(make_key_ref(keyring, 1), in request_asymmetric_key()
67 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
86 key = request_asymmetric_key(keyring, __be32_to_cpu(hdr->keyid)); in asymmetric_verify()
Dintegrity.h150 int asymmetric_verify(struct key *keyring, const char *sig,
153 static inline int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
DKconfig28 to "lock" certain keyring to prevent adding new keys.
/security/integrity/ima/
DKconfig126 bool "Require all keys on the .ima keyring be signed"
133 keyring be signed by a key on the system trusted keyring.