/linux-6.6.21/security/keys/ |
D | keyring.c | 76 static int keyring_instantiate(struct key *keyring, 78 static void keyring_revoke(struct key *keyring); 79 static void keyring_destroy(struct key *keyring); 80 static void keyring_describe(const struct key *keyring, struct seq_file *m); 81 static long keyring_read(const struct key *keyring, 107 static void keyring_publish_name(struct key *keyring) in keyring_publish_name() argument 111 if (keyring->description && in keyring_publish_name() 112 keyring->description[0] && in keyring_publish_name() 113 keyring->description[0] != '.') { in keyring_publish_name() 115 list_add_tail(&keyring->name_link, &ns->keyring_name_list); in keyring_publish_name() [all …]
|
D | process_keys.c | 223 struct key *keyring; in install_thread_keyring_to_cred() local 228 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred() 232 if (IS_ERR(keyring)) in install_thread_keyring_to_cred() 233 return PTR_ERR(keyring); in install_thread_keyring_to_cred() 235 new->thread_keyring = keyring; in install_thread_keyring_to_cred() 270 struct key *keyring; in install_process_keyring_to_cred() local 275 keyring = keyring_alloc("_pid", new->uid, new->gid, new, in install_process_keyring_to_cred() 279 if (IS_ERR(keyring)) in install_process_keyring_to_cred() 280 return PTR_ERR(keyring); in install_process_keyring_to_cred() 282 new->process_keyring = keyring; in install_process_keyring_to_cred() [all …]
|
D | key.c | 427 struct key *keyring, in __key_instantiate_and_link() argument 434 key_check(keyring); in __key_instantiate_and_link() 456 if (keyring) { in __key_instantiate_and_link() 457 if (test_bit(KEY_FLAG_KEEP, &keyring->flags)) in __key_instantiate_and_link() 460 __key_link(keyring, key, _edit); in __key_instantiate_and_link() 499 struct key *keyring, in key_instantiate_and_link() argument 518 if (keyring) { in key_instantiate_and_link() 519 ret = __key_link_lock(keyring, &key->index_key); in key_instantiate_and_link() 523 ret = __key_link_begin(keyring, &key->index_key, &edit); in key_instantiate_and_link() 527 if (keyring->restrict_link && keyring->restrict_link->check) { in key_instantiate_and_link() [all …]
|
D | internal.h | 95 extern int __key_link_lock(struct key *keyring, 99 extern int __key_link_begin(struct key *keyring, 102 extern int __key_link_check_live_key(struct key *keyring, struct key *key); 103 extern void __key_link(struct key *keyring, struct key *key, 105 extern void __key_link_end(struct key *keyring, 112 extern struct key *keyring_search_instkey(struct key *keyring, 115 extern int iterate_over_keyring(const struct key *keyring, 174 extern void keyring_gc(struct key *keyring, time64_t limit); 175 extern void keyring_restriction_gc(struct key *keyring,
|
D | request_key.c | 82 struct key *keyring = info->data; in umh_keys_init() local 84 return install_session_keyring_to_cred(cred, keyring); in umh_keys_init() 92 struct key *keyring = info->data; in umh_keys_cleanup() local 93 key_put(keyring); in umh_keys_cleanup() 124 struct key *key = rka->target_key, *keyring, *session, *user_session; in call_sbin_request_key() local 140 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, in call_sbin_request_key() 144 if (IS_ERR(keyring)) { in call_sbin_request_key() 145 ret = PTR_ERR(keyring); in call_sbin_request_key() 150 ret = key_link(keyring, authkey); in call_sbin_request_key() 196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, in call_sbin_request_key() [all …]
|
/linux-6.6.21/security/integrity/ |
D | digsig.c | 22 static struct key *keyring[INTEGRITY_KEYRING_MAX]; variable 47 if (!keyring[id]) { in integrity_keyring_from_id() 48 keyring[id] = in integrity_keyring_from_id() 50 if (IS_ERR(keyring[id])) { in integrity_keyring_from_id() 51 int err = PTR_ERR(keyring[id]); in integrity_keyring_from_id() 53 keyring[id] = NULL; in integrity_keyring_from_id() 58 return keyring[id]; in integrity_keyring_from_id() 64 struct key *keyring; in integrity_digsig_verify() local 69 keyring = integrity_keyring_from_id(id); in integrity_digsig_verify() 70 if (IS_ERR(keyring)) in integrity_digsig_verify() [all …]
|
D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 53 keyring. 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 66 bool "Provide a keyring to which Machine Owner Keys may be added" 72 If set, provide a keyring to which Machine Owner Keys (MOK) may 73 be added. This keyring shall contain just MOK keys. Unlike keys 74 in the platform keyring, keys contained in the .machine keyring will 82 The .machine keyring can be configured to enforce CA restriction 84 and all Machine Owner Keys (MOK) are added to the machine keyring. [all …]
|
D | digsig_asymmetric.c | 22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument 43 if (keyring) { in request_asymmetric_key() 47 kref = keyring_search(make_key_ref(keyring, 1), in request_asymmetric_key() 58 if (keyring) in request_asymmetric_key() 60 name, keyring->description, in request_asymmetric_key() 82 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument 102 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()
|
/linux-6.6.21/include/keys/ |
D | system_keyring.h | 22 extern int restrict_link_by_builtin_trusted(struct key *keyring, 30 extern __init int load_module_cert(struct key *keyring); 36 static inline __init int load_module_cert(struct key *keyring) in load_module_cert() argument 45 struct key *keyring, 49 int restrict_link_by_digsig_builtin_and_secondary(struct key *keyring, 68 extern void __init set_machine_trusted_keys(struct key *keyring); 71 static inline void __init set_machine_trusted_keys(struct key *keyring) in set_machine_trusted_keys() argument 126 extern void __init set_platform_trusted_keys(struct key *keyring); 128 static inline void set_platform_trusted_keys(struct key *keyring) in set_platform_trusted_keys() argument
|
/linux-6.6.21/crypto/asymmetric_keys/ |
D | selftest.c | 181 struct key *keyring; in fips_signature_selftest() local 186 keyring = keyring_alloc(".certs_selftest", in fips_signature_selftest() 193 if (IS_ERR(keyring)) in fips_signature_selftest() 195 PTR_ERR(keyring)); in fips_signature_selftest() 198 sizeof(certs_selftest_keys) - 1, keyring); in fips_signature_selftest() 216 ret = pkcs7_validate_trust(pkcs7, keyring); in fips_signature_selftest() 223 key_put(keyring); in fips_signature_selftest()
|
/linux-6.6.21/Documentation/security/ |
D | digsig.rst | 63 * @keyring: keyring to search key in 75 int digsig_verify(struct key *keyring, const char *sig, int siglen, 82 to generate signatures, to load keys into the kernel keyring. 84 When the key is added to the kernel keyring, the keyid defines the name 91 -3 --alswrv 0 0 keyring: _ses 92 603976250 --alswrv 0 -1 \_ keyring: _uid.0 95 170323636 --alswrv 0 0 \_ keyring: _module 96 548221616 --alswrv 0 0 \_ keyring: _ima 97 128198054 --alswrv 0 0 \_ keyring: _evm 100 1 key in keyring:
|
/linux-6.6.21/certs/ |
D | Kconfig | 48 Provide a system keyring to which trusted keys can be added. Keys in 49 the keyring are considered to be trusted. Keys may be added at will 52 keys already in the keyring. 54 Keys in this keyring are used by module signature checking. 57 string "Additional X.509 keys for default system keyring" 62 system keyring. Any certificate used for module signing is implicitly 65 NOTE: If you previously provided keys for the system keyring in the 75 system keyring without recompiling the kernel. 86 bool "Provide a keyring to which extra trustable keys may be added" 89 If set, provide a keyring to which extra keys may be added, provided [all …]
|
D | system_keyring.c | 187 void __init set_machine_trusted_keys(struct key *keyring) in set_machine_trusted_keys() argument 189 machine_trusted_keys = keyring; in set_machine_trusted_keys() 265 __init int load_module_cert(struct key *keyring) in load_module_cert() argument 273 module_cert_size, keyring); in load_module_cert() 424 void __init set_platform_trusted_keys(struct key *keyring) in set_platform_trusted_keys() argument 426 platform_trusted_keys = keyring; in set_platform_trusted_keys()
|
/linux-6.6.21/fs/crypto/ |
D | keyring.c | 190 struct fscrypt_keyring *keyring; in allocate_filesystem_keyring() local 195 keyring = kzalloc(sizeof(*keyring), GFP_KERNEL); in allocate_filesystem_keyring() 196 if (!keyring) in allocate_filesystem_keyring() 198 spin_lock_init(&keyring->lock); in allocate_filesystem_keyring() 204 smp_store_release(&sb->s_master_keys, keyring); in allocate_filesystem_keyring() 220 struct fscrypt_keyring *keyring = sb->s_master_keys; in fscrypt_destroy_keyring() local 223 if (!keyring) in fscrypt_destroy_keyring() 226 for (i = 0; i < ARRAY_SIZE(keyring->key_hashtable); i++) { in fscrypt_destroy_keyring() 227 struct hlist_head *bucket = &keyring->key_hashtable[i]; in fscrypt_destroy_keyring() 247 kfree_sensitive(keyring); in fscrypt_destroy_keyring() [all …]
|
/linux-6.6.21/fs/smb/client/ |
D | cifs_spnego.c | 181 struct key *keyring; in init_cifs_spnego() local 196 keyring = keyring_alloc(".cifs_spnego", in init_cifs_spnego() 201 if (IS_ERR(keyring)) { in init_cifs_spnego() 202 ret = PTR_ERR(keyring); in init_cifs_spnego() 214 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in init_cifs_spnego() 215 cred->thread_keyring = keyring; in init_cifs_spnego() 219 cifs_dbg(FYI, "cifs spnego keyring: %d\n", key_serial(keyring)); in init_cifs_spnego() 223 key_put(keyring); in init_cifs_spnego()
|
/linux-6.6.21/Documentation/security/keys/ |
D | core.rst | 10 other keys. Processes each have three standard keyring subscriptions that a 68 actual "key". In the case of a keyring, this is a list of keys to which 69 the keyring links; in the case of a user-defined key, it's an arbitrary 116 (+) "keyring" 140 * Each process subscribes to three keyrings: a thread-specific keyring, a 141 process-specific keyring, and a session-specific keyring. 143 The thread-specific keyring is discarded from the child when any sort of 144 clone, fork, vfork or execve occurs. A new keyring is created only when 147 The process-specific keyring is replaced with an empty one in the child on 149 shared. execve also discards the process's process keyring and creates a [all …]
|
D | request-key.rst | 46 does not need to link the key to a keyring to prevent it from being immediately 63 The userspace interface links the key to a keyring associated with the process 96 keyring that contains a link to auth key V. 104 Kerberos TGT key). It just requests the appropriate key, and the keyring 105 search notes that the session keyring has auth key V in its bottom level. 152 A search of any particular keyring proceeds in the following fashion: 155 firstly calls key_permission(SEARCH) on the keyring it's starting with, 158 2) It considers all the non-keyring keys within that keyring and, if any key 164 3) It then considers all the keyring-type keys in the keyring it's currently 165 searching. It calls key_permission(SEARCH) on each keyring, and if this [all …]
|
/linux-6.6.21/security/integrity/ima/ |
D | ima_asymmetric_keys.c | 29 void ima_post_key_create_or_update(struct key *keyring, struct key *key, in ima_post_key_create_or_update() argument 43 queued = ima_queue_key(keyring, payload, payload_len); in ima_post_key_create_or_update() 64 keyring->description, KEY_CHECK, 0, in ima_post_key_create_or_update() 65 keyring->description, false, NULL, 0); in ima_post_key_create_or_update()
|
D | ima_queue_keys.c | 67 static struct ima_key_entry *ima_alloc_key_entry(struct key *keyring, in ima_alloc_key_entry() argument 78 entry->keyring_name = kstrdup(keyring->description, in ima_alloc_key_entry() 94 keyring->description, in ima_alloc_key_entry() 104 bool ima_queue_key(struct key *keyring, const void *payload, in ima_queue_key() argument 110 entry = ima_alloc_key_entry(keyring, payload, payload_len); in ima_queue_key()
|
/linux-6.6.21/scripts/ |
D | extract-sys-certs.pl | 21 my $keyring = $ARGV[1]; 154 open FD, ">$keyring" || die $keyring; 157 die "$keyring" if (!defined($len)); 158 die "Short write on $keyring\n" if ($len != $size); 159 close(FD) || die $keyring;
|
/linux-6.6.21/net/dns_resolver/ |
D | dns_key.c | 338 struct key *keyring; in init_dns_resolver() local 351 keyring = keyring_alloc(".dns_resolver", in init_dns_resolver() 356 if (IS_ERR(keyring)) { in init_dns_resolver() 357 ret = PTR_ERR(keyring); in init_dns_resolver() 367 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags); in init_dns_resolver() 368 cred->thread_keyring = keyring; in init_dns_resolver() 372 kdebug("DNS resolver keyring: %d\n", key_serial(keyring)); in init_dns_resolver() 376 key_put(keyring); in init_dns_resolver()
|
/linux-6.6.21/include/linux/ |
D | key.h | 389 extern key_ref_t key_create(key_ref_t keyring, 397 extern key_ref_t key_create_or_update(key_ref_t keyring, 409 extern int key_link(struct key *keyring, 417 extern int key_unlink(struct key *keyring, 427 extern int restrict_link_reject(struct key *keyring, 432 extern int keyring_clear(struct key *keyring); 434 extern key_ref_t keyring_search(key_ref_t keyring, 439 extern int keyring_add_key(struct key *keyring, 442 extern int keyring_restrict(key_ref_t keyring, const char *type,
|
D | key-type.h | 174 struct key *keyring, 179 struct key *keyring, 185 struct key *keyring, in key_negate_and_link() argument 188 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); in key_negate_and_link()
|
/linux-6.6.21/Documentation/crypto/ |
D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 343 The kernel builtin trusted keyring will be searched for the signing key. 344 If the builtin trusted keyring is not configured, all links will be 354 signing key. If the secondary trusted keyring is not configured, this 359 3) Restrict using a separate key or keyring 362 - "key_or_keyring:<key or keyring serial number>[:chain]" 368 serial number for a keyring. 371 within the destination keyring will also be searched for signing keys. 373 certificate in order (starting closest to the root) to a keyring. For 374 instance, one keyring can be populated with links to a set of root [all …]
|
/linux-6.6.21/arch/s390/kernel/ |
D | cert_store.c | 314 static int invalidate_keyring_keys(struct key *keyring) in invalidate_keyring_keys() argument 322 keyring_payload_len = key_type_keyring.read(keyring, NULL, 0); in invalidate_keyring_keys() 328 rc = key_type_keyring.read(keyring, (char *)key_array, keyring_payload_len); in invalidate_keyring_keys() 340 rc = key_unlink(keyring, current_key); in invalidate_keyring_keys() 454 struct key *keyring) in create_key_from_vce() argument 465 make_key_ref(keyring, true), CERT_STORE_KEY_TYPE_NAME, in create_key_from_vce() 572 struct key *keyring) in create_key_from_sevcb() argument 593 rc = create_key_from_vce(vcssb, vce, keyring); in create_key_from_sevcb() 609 static int add_certificates_to_keyring(struct vcssb *vcssb, struct key *keyring) in add_certificates_to_keyring() argument 618 rc = create_key_from_sevcb(vcssb, index, keyring); in add_certificates_to_keyring() [all …]
|