| /security/keys/ |
| A D | request_key.c | 575 const char *description, in request_key_and_link() argument 586 .index_key.description = description, in request_key_and_link() 587 .index_key.desc_len = strlen(description), in request_key_and_link() 590 .match_data.raw_data = description, in request_key_and_link() 707 const char *description, in request_key_tag() argument 747 const char *description, in request_key_with_auxdata() argument 783 const char *description, in request_key_rcu() argument 789 .index_key.description = description, in request_key_rcu() 790 .index_key.desc_len = strlen(description), in request_key_rcu() 793 .match_data.raw_data = description, in request_key_rcu() [all …]
|
| A D | keyring.c | 111 if (keyring->description && in keyring_publish_name() 112 keyring->description[0] && in keyring_publish_name() 167 const char *description = index_key->description; in hash_key_type_and_desc() local 187 memcpy(&piece, description, n); in hash_key_type_and_desc() 188 description += n; in hash_key_type_and_desc() 317 memcmp(key->index_key.description, index_key->description, in keyring_compare_object() 414 if (keyring->description) { in keyring_destroy() 439 if (keyring->description) in keyring_describe() 687 if (ctx->index_key.description) in search_nested_keyrings() 942 const char *description, in keyring_search() argument [all …]
|
| A D | request_key_auth.c | 73 seq_puts(m, key->description); in request_key_auth_describe() 248 char description[16]; in key_get_instantiation_authkey() local 251 .index_key.description = description, in key_get_instantiation_authkey() 254 .match_data.raw_data = description, in key_get_instantiation_authkey() 262 ctx.index_key.desc_len = sprintf(description, "%x", target_id); in key_get_instantiation_authkey()
|
| A D | key.c | 283 if (!key->index_key.description) in key_alloc() 329 kfree(key->description); in key_alloc() 510 prep.orig_description = key->description; in key_instantiate_and_link() 808 const char *description, in __key_create_or_update() argument 816 .description = description, in __key_create_or_update() 851 prep.orig_description = description; in __key_create_or_update() 862 if (!index_key.description) in __key_create_or_update() 863 index_key.description = prep.description; in __key_create_or_update() 865 if (!index_key.description) in __key_create_or_update() 1015 const char *description, in key_create_or_update() argument [all …]
|
| A D | keyctl.c | 81 char type[32], *description; in SYSCALL_DEFINE5() local 94 description = NULL; in SYSCALL_DEFINE5() 97 if (IS_ERR(description)) { in SYSCALL_DEFINE5() 98 ret = PTR_ERR(description); in SYSCALL_DEFINE5() 101 if (!*description) { in SYSCALL_DEFINE5() 102 kfree(description); in SYSCALL_DEFINE5() 103 description = NULL; in SYSCALL_DEFINE5() 149 kfree(description); in SYSCALL_DEFINE5() 186 if (IS_ERR(description)) { in SYSCALL_DEFINE4() 246 kfree(description); in SYSCALL_DEFINE4() [all …]
|
| A D | persistent.c | 57 persistent = keyring_alloc(index_key->description, in key_create_persistent() 85 index_key.description = buf; in key_get_persistent()
|
| A D | user_defined.c | 160 seq_puts(m, key->description); in user_describe()
|
| A D | big_key.c | 215 seq_puts(m, key->description); in big_key_describe()
|
| A D | gc.c | 164 kfree(key->description); in key_gc_unused_keys()
|
| A D | internal.h | 151 const char *description,
|
| A D | process_keys.c | 193 .index_key.description = buf, in get_user_session_keyring_rcu()
|
| /security/integrity/ima/ |
| A D | ima_asymmetric_keys.c | 64 keyring->description, KEY_CHECK, 0, in ima_post_key_create_or_update() 65 keyring->description, false, NULL, 0); in ima_post_key_create_or_update()
|
| A D | ima_queue_keys.c | 78 entry->keyring_name = kstrdup(keyring->description, in ima_alloc_key_entry() 94 keyring->description, in ima_alloc_key_entry()
|
| A D | ima_main.c | 968 char *description) in ima_post_load_data() argument
|
| /security/integrity/ |
| A D | digsig_asymmetric.c | 60 name, keyring->description, in request_asymmetric_key()
|
| A D | digsig.c | 186 key_ref_to_ptr(key)->description); in integrity_add_key()
|
| /security/keys/encrypted-keys/ |
| A D | encrypted.c | 845 ret = encrypted_init(epayload, key->description, format, master_desc, in encrypted_instantiate()
|
| /security/ |
| A D | Kconfig | 166 See Documentation/arch/x86/intel_txt.rst for a description of how to enable
|
| A D | security.c | 3437 char *description) in security_kernel_post_load_data() argument 3439 return call_int_hook(kernel_post_load_data, buf, size, id, description); in security_kernel_post_load_data()
|
| /security/smack/ |
| A D | smack_lsm.c | 4553 ad.a.u.key_struct.key_desc = keyp->description; in smack_key_permission() 4618 ad.a.u.key_struct.key_desc = key->description; in smack_watch_key()
|