/security/keys/ |
D | proc.c | 86 if (id < key->serial) { in find_ge_key() 87 if (!minkey || minkey->serial > key->serial) in find_ge_key() 90 } else if (id > key->serial) { in find_ge_key() 125 *_pos = key->serial; in proc_keys_start() 132 return key->serial; in key_node_serial() 225 key->serial, in proc_keys_show()
|
D | keyring.c | 465 key->type->name, key->serial, ctx->count, ctx->buflen); in keyring_read_iterator() 470 ret = put_user(key->serial, ctx->buffer); in keyring_read_iterator() 474 ctx->count += sizeof(key->serial); in keyring_read_iterator() 585 kenter("{%d}", key->serial); in keyring_search_iterator() 683 keyring->serial, in search_nested_keyrings() 714 kdebug("descend to %d", keyring->serial); in search_nested_keyrings() 852 kdebug("ascend to %d [%d]", keyring->serial, slot); in search_nested_keyrings() 1109 keyring->serial, index_key->type->name, index_key->description); in find_key_to_update() 1128 kleave(" = {%d}", key->serial); in find_key_to_update() 1197 kenter("{%d}", key->serial); in keyring_detect_cycle_iterator() [all …]
|
D | key.c | 141 get_random_bytes(&key->serial, sizeof(key->serial)); in key_alloc_serial() 143 key->serial >>= 1; /* negative numbers are not permitted */ in key_alloc_serial() 144 } while (key->serial < 3); in key_alloc_serial() 156 if (key->serial < xkey->serial) in key_alloc_serial() 158 else if (key->serial > xkey->serial) in key_alloc_serial() 175 key->serial++; in key_alloc_serial() 176 if (key->serial < 3) { in key_alloc_serial() 177 key->serial = 3; in key_alloc_serial() 186 if (key->serial < xkey->serial) in key_alloc_serial() 667 if (id < key->serial) in key_lookup() [all …]
|
D | request_key_auth.c | 139 kenter("{%d}", key->serial); in request_key_auth_revoke() 151 kenter("{%d}", key->serial); in request_key_auth_destroy() 172 kenter("%d,", target->serial); in request_key_auth_new() 215 sprintf(desc, "%x", target->serial); in request_key_auth_new() 231 kleave(" = {%d,%d}", authkey->serial, refcount_read(&authkey->usage)); in request_key_auth_new()
|
D | request_key.c | 61 kenter("%d{%d},%d", authkey->serial, key->serial, error); in complete_request_key() 127 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 134 sprintf(desc, "_req.%u", key->serial); in call_sbin_request_key() 156 sprintf(key_str, "%d", key->serial); in call_sbin_request_key() 160 cred->thread_keyring ? cred->thread_keyring->serial : 0); in call_sbin_request_key() 164 prkey = cred->process_keyring->serial; in call_sbin_request_key() 170 sskey = session->serial; in call_sbin_request_key() 231 kenter("%d,%p,%zu,%p", key->serial, callout_info, callout_len, aux); in construct_key()
|
D | gc.c | 131 kdebug("- %u", key->serial); in key_gc_unused_keys() 325 kdebug("unrefd key %d", key->serial); in key_garbage_collector() 356 kdebug("destroy key %d", key->serial); in key_garbage_collector()
|
D | process_keys.c | 843 long ret, serial; in join_session_keyring() local 856 serial = new->session_keyring->serial; in join_session_keyring() 859 ret = serial; in join_session_keyring() 894 ret = keyring->serial; in join_session_keyring()
|
D | keyctl.c | 136 ret = key_ref_to_ptr(key_ref)->serial; in SYSCALL_DEFINE5() 236 ret = key->serial; in SYSCALL_DEFINE4() 272 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_get_keyring_ID() 784 ret = key_ref_to_ptr(key_ref)->serial; in keyctl_keyring_search() 1124 if (rka->target_key->serial != id) in keyctl_instantiate_key_common() 1289 if (rka->target_key->serial != id) in keyctl_reject_key() 1470 ret = authkey->serial; in keyctl_assume_authority()
|
D | persistent.c | 117 ret = persistent->serial; in key_get_persistent()
|
/security/tomoyo/ |
D | common.c | 978 (unsigned int serial); 1956 unsigned int serial; member 2114 entry.serial = tomoyo_serial++; in tomoyo_supervisor() 2161 (unsigned int serial) in tomoyo_find_domain_by_qid() argument 2168 if (ptr->serial != serial) in tomoyo_find_domain_by_qid() 2242 snprintf(buf, len + 31, "Q%u-%hu\n%s", ptr->serial, in tomoyo_read_query() 2267 unsigned int serial; in tomoyo_write_answer() local 2277 if (sscanf(data, "A%u=%u", &serial, &answer) != 2) in tomoyo_write_answer() 2283 if (ptr->serial != serial) in tomoyo_write_answer()
|
/security/smack/ |
D | smack_lsm.c | 4283 ad.a.u.key_struct.key = keyp->serial; in smack_key_permission()
|