Lines Matching full:if
69 own upcall mechanisms. If they do, then those should be substituted for the
81 2) request_key() searches the process's subscribed keyrings to see if there's
82 a suitable key there. If there is, it returns the key. If there isn't,
108 UID, GID, groups and security info of process A as if it was process A,
121 This also extends further. If key W (step 7 above) didn't exist, key W would
138 the key while it exists to fail with error ENOKEY if negated or the specified
139 error if rejected.
156 if this denies permission, it doesn't search further.
158 2) It considers all the non-keyring keys within that keyring and, if any key
160 if the key is allowed to be found. If it is, that key is returned; if
161 not, the search continues, and the error code is retained if of higher
165 searching. It calls key_permission(SEARCH) on each keyring, and if this
173 When request_key() is invoked, if CONFIG_KEYS_REQUEST_CACHE=y, a per-task
179 1) If extant, the process's thread keyring is searched.
181 2) If extant, the process's process keyring is searched.
185 4) If the process has assumed the authority associated with a request_key()
188 a) If extant, the calling process's thread keyring is searched.
190 b) If extant, the calling process's process keyring is searched.
195 returned. If CONFIG_KEYS_REQUEST_CACHE=y, then that key is placed in the
199 Only if all these fail does the whole thing fail with the highest priority