/security/keys/ |
D | request_key.c | 382 ctx->index_key.type->name, ctx->index_key.description); in construct_alloc_key() 395 key = key_alloc(ctx->index_key.type, ctx->index_key.description, in construct_alloc_key() 575 const char *description, in request_key_and_link() argument 586 .index_key.description = description, in request_key_and_link() 587 .index_key.desc_len = strlen(description), in request_key_and_link() 590 .match_data.raw_data = description, in request_key_and_link() 601 ctx.index_key.type->name, ctx.index_key.description, in request_key_and_link() 707 const char *description, in request_key_tag() argument 717 key = request_key_and_link(type, description, domain_tag, in request_key_tag() 747 const char *description, in request_key_with_auxdata() argument [all …]
|
D | keyring.c | 111 if (keyring->description && in keyring_publish_name() 112 keyring->description[0] && in keyring_publish_name() 113 keyring->description[0] != '.') { in keyring_publish_name() 167 const char *description = index_key->description; in hash_key_type_and_desc() local 187 memcpy(&piece, description, n); in hash_key_type_and_desc() 188 description += n; in hash_key_type_and_desc() 219 memcpy(index_key->desc, index_key->description, n); in key_set_index_key() 290 d = index_key->description + sizeof(index_key->desc); in keyring_get_key_chunk() 317 memcmp(key->index_key.description, index_key->description, in keyring_compare_object() 368 seg_a = *(unsigned char *)(a->description + i); in keyring_diff_objects() [all …]
|
D | request_key_auth.c | 73 seq_puts(m, key->description); in request_key_auth_describe() 248 char description[16]; in key_get_instantiation_authkey() local 251 .index_key.description = description, in key_get_instantiation_authkey() 254 .match_data.raw_data = description, in key_get_instantiation_authkey() 262 ctx.index_key.desc_len = sprintf(description, "%x", target_id); in key_get_instantiation_authkey()
|
D | keyctl.c | 81 char type[32], *description; in SYSCALL_DEFINE5() local 94 description = NULL; in SYSCALL_DEFINE5() 96 description = strndup_user(_description, KEY_MAX_DESC_SIZE); in SYSCALL_DEFINE5() 97 if (IS_ERR(description)) { in SYSCALL_DEFINE5() 98 ret = PTR_ERR(description); in SYSCALL_DEFINE5() 101 if (!*description) { in SYSCALL_DEFINE5() 102 kfree(description); in SYSCALL_DEFINE5() 103 description = NULL; in SYSCALL_DEFINE5() 104 } else if ((description[0] == '.') && in SYSCALL_DEFINE5() 134 key_ref = key_create_or_update(keyring_ref, type, description, in SYSCALL_DEFINE5() [all …]
|
D | key.c | 282 key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL); in key_alloc() 283 if (!key->index_key.description) in key_alloc() 328 kfree(key->description); in key_alloc() 507 prep.orig_description = key->description; in key_instantiate_and_link() 813 const char *description, in key_create_or_update() argument 820 .description = description, in key_create_or_update() 840 (!index_key.description && !index_key.type->preparse)) in key_create_or_update() 855 prep.orig_description = description; in key_create_or_update() 866 if (!index_key.description) in key_create_or_update() 867 index_key.description = prep.description; in key_create_or_update() [all …]
|
D | persistent.c | 57 persistent = keyring_alloc(index_key->description, in key_create_persistent() 85 index_key.description = buf; in key_get_persistent()
|
D | user_defined.c | 160 seq_puts(m, key->description); in user_describe()
|
D | big_key.c | 216 seq_puts(m, key->description); in big_key_describe()
|
D | gc.c | 172 kfree(key->description); in key_gc_unused_keys()
|
D | internal.h | 158 const char *description,
|
D | process_keys.c | 193 .index_key.description = buf, in get_user_session_keyring_rcu()
|
/security/integrity/ima/ |
D | ima_asymmetric_keys.c | 64 keyring->description, KEY_CHECK, 0, in ima_post_key_create_or_update() 65 keyring->description, false, NULL, 0); in ima_post_key_create_or_update()
|
D | ima_queue_keys.c | 78 entry->keyring_name = kstrdup(keyring->description, in ima_alloc_key_entry() 94 keyring->description, in ima_alloc_key_entry()
|
D | ima_main.c | 845 char *description) in ima_post_load_data() argument
|
/security/integrity/ |
D | digsig_asymmetric.c | 60 name, keyring->description, in request_asymmetric_key()
|
D | digsig.c | 169 key_ref_to_ptr(key)->description); in integrity_add_key()
|
/security/ |
D | security.c | 1806 char *description) in security_kernel_post_load_data() argument 1811 description); in security_kernel_post_load_data() 1814 return ima_post_load_data(buf, size, id, description); in security_kernel_post_load_data()
|
D | Kconfig | 113 See Documentation/x86/intel_txt.rst for a description of how to enable
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 812 ret = encrypted_init(epayload, key->description, format, master_desc, in encrypted_instantiate()
|
/security/smack/ |
D | smack_lsm.c | 4348 ad.a.u.key_struct.key_desc = keyp->description; in smack_key_permission() 4419 ad.a.u.key_struct.key_desc = key->description; in smack_watch_key()
|