/linux-6.6.21/security/keys/ |
D | internal.h | 113 key_serial_t target_id); 219 extern struct key *key_get_instantiation_authkey(key_serial_t target_id); 244 extern long keyctl_get_keyring_ID(key_serial_t, int); 246 extern long keyctl_update_key(key_serial_t, const void __user *, size_t); 247 extern long keyctl_revoke_key(key_serial_t); 248 extern long keyctl_keyring_clear(key_serial_t); 249 extern long keyctl_keyring_link(key_serial_t, key_serial_t); 250 extern long keyctl_keyring_move(key_serial_t, key_serial_t, key_serial_t, unsigned int); 251 extern long keyctl_keyring_unlink(key_serial_t, key_serial_t); 252 extern long keyctl_describe_key(key_serial_t, char __user *, size_t); [all …]
|
D | keyctl.c | 78 key_serial_t, ringid) in SYSCALL_DEFINE5() argument 170 key_serial_t, destringid) in SYSCALL_DEFINE4() argument 258 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() 325 long keyctl_update_key(key_serial_t id, in keyctl_update_key() 379 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() 420 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() 467 long keyctl_keyring_clear(key_serial_t ringid) in keyctl_keyring_clear() 515 long keyctl_keyring_link(key_serial_t id, key_serial_t ringid) in keyctl_keyring_link() 552 long keyctl_keyring_unlink(key_serial_t id, key_serial_t ringid) in keyctl_keyring_unlink() 595 long keyctl_keyring_move(key_serial_t id, key_serial_t from_ringid, in keyctl_keyring_move() [all …]
|
D | proc.c | 78 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() 115 key_serial_t pos = *_pos; in proc_keys_start() 129 static inline key_serial_t key_node_serial(struct rb_node *n) in key_node_serial()
|
D | keyctl_pkey.c | 78 static int keyctl_pkey_params_get(key_serial_t id, in keyctl_pkey_params_get() 169 long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query()
|
D | persistent.c | 129 long keyctl_get_persistent(uid_t _uid, key_serial_t destid) in keyctl_get_persistent()
|
D | keyring.c | 455 key_serial_t *buffer; 489 if (buflen & (sizeof(key_serial_t) - 1)) in keyring_read() 494 ctx.buffer = (key_serial_t *)buffer; in keyring_read() 506 ret = keyring->keys.nr_leaves_on_tree * sizeof(key_serial_t); in keyring_read()
|
D | request_key_auth.c | 246 struct key *key_get_instantiation_authkey(key_serial_t target_id) in key_get_instantiation_authkey()
|
D | dh.c | 18 static ssize_t dh_data_from_key(key_serial_t keyid, const void **data) in dh_data_from_key()
|
D | request_key.c | 123 key_serial_t prkey, sskey; in call_sbin_request_key()
|
D | process_keys.c | 611 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key()
|
D | key.c | 658 struct key *key_lookup(key_serial_t id) in key_lookup()
|
/linux-6.6.21/include/net/ |
D | handshake.h | 21 key_serial_t peerid); 29 key_serial_t ta_keyring; 30 key_serial_t ta_my_cert; 31 key_serial_t ta_my_privkey; 33 key_serial_t ta_my_peerids[5];
|
/linux-6.6.21/include/linux/ |
D | key.h | 28 typedef int32_t key_serial_t; typedef 197 key_serial_t serial; /* key serial number */ 445 extern struct key *key_lookup(key_serial_t id); 447 static inline key_serial_t key_serial(const struct key *key) in key_serial() 454 extern key_ref_t lookup_user_key(key_serial_t id, unsigned long flags,
|
D | lsm_audit.h | 90 key_serial_t key;
|
/linux-6.6.21/net/handshake/ |
D | tlshd.c | 29 key_serial_t peerid); 36 key_serial_t th_keyring; 37 key_serial_t th_certificate; 38 key_serial_t th_privkey; 41 key_serial_t th_peerid[5];
|
/linux-6.6.21/Documentation/security/keys/ |
D | core.rst | 39 * Each key is issued a serial number of type key_serial_t that is unique for 382 key_serial_t add_key(const char *type, const char *desc, 384 key_serial_t keyring); 423 key_serial_t request_key(const char *type, const char *description, 425 key_serial_t dest_keyring); 447 key_serial_t keyctl(KEYCTL_GET_KEYRING_ID, key_serial_t id, 460 key_serial_t keyctl(KEYCTL_JOIN_SESSION_KEYRING, const char *name); 478 long keyctl(KEYCTL_UPDATE, key_serial_t key, const void *payload, 492 long keyctl(KEYCTL_REVOKE, key_serial_t key); 501 long keyctl(KEYCTL_CHOWN, key_serial_t key, uid_t uid, gid_t gid); [all …]
|
D | request-key.rst | 40 key_serial_t request_key(const char *type, 43 key_serial_t dest_keyring);
|
/linux-6.6.21/Documentation/networking/ |
D | tls-handshake.rst | 58 key_serial_t ta_keyring; 59 key_serial_t ta_my_cert; 60 key_serial_t ta_my_privkey; 62 key_serial_t ta_my_peerids[5]; 172 key_serial_t peerid);
|
/linux-6.6.21/arch/s390/kernel/ |
D | cert_store.c | 318 key_serial_t *key_array; in invalidate_keyring_keys() 323 num_keys = keyring_payload_len / sizeof(key_serial_t); in invalidate_keyring_keys() 324 key_array = kcalloc(num_keys, sizeof(key_serial_t), GFP_KERNEL); in invalidate_keyring_keys()
|
/linux-6.6.21/include/linux/sunrpc/ |
D | xprt.h | 143 key_serial_t cert_serial; 144 key_serial_t privkey_serial;
|
/linux-6.6.21/drivers/nvdimm/ |
D | security.c | 91 key_serial_t id, int subclass) in nvdimm_lookup_user_key() 121 key_serial_t id, int subclass, struct key **key) in nvdimm_get_user_key_payload()
|
/linux-6.6.21/Documentation/admin-guide/nfs/ |
D | nfs-idmapper.rst | 70 description. The serialized key is first converted into a key_serial_t, and
|
/linux-6.6.21/crypto/asymmetric_keys/ |
D | asymmetric_type.c | 531 key_serial_t serial; in asymmetric_lookup_restriction()
|
/linux-6.6.21/crypto/ |
D | af_alg.c | 275 static struct key *lookup_key(key_serial_t serial) in lookup_key() 292 key_serial_t serial; in alg_setkey_by_key_serial()
|
/linux-6.6.21/Documentation/crypto/ |
D | userspace-if.rst | 385 - ALG_SET_KEY_BY_KEY_SERIAL -- Setting the key via keyring key_serial_t. 390 The passed in key_serial_t must have the KEY_(POS|USR|GRP|OTH)_SEARCH
|