Lines Matching defs:keyring

3  * Filesystem-level keyring for fscrypt
10 * filesystem-level keyring, including the ioctls:
74 * that concurrent keyring lookups can no longer find it.
78 /* Clear the keyring so the quota gets released right away. */
95 * fscrypt_master_key struct by removing it from the keyring and
206 struct fscrypt_keyring *keyring;
211 keyring = kzalloc(sizeof(*keyring), GFP_KERNEL);
212 if (!keyring)
214 spin_lock_init(&keyring->lock);
220 smp_store_release(&sb->s_master_keys, keyring);
226 * with the keyring that contains them.
236 struct fscrypt_keyring *keyring = sb->s_master_keys;
239 if (!keyring)
242 for (i = 0; i < ARRAY_SIZE(keyring->key_hashtable); i++) {
243 struct hlist_head *bucket = &keyring->key_hashtable[i];
250 * evicted, every key remaining in the keyring should
252 * the keyring due to the single active ref associated
262 kfree_sensitive(keyring);
267 fscrypt_mk_hash_bucket(struct fscrypt_keyring *keyring,
277 return &keyring->key_hashtable[i % ARRAY_SIZE(keyring->key_hashtable)];
291 struct fscrypt_keyring *keyring;
301 keyring = smp_load_acquire(&sb->s_master_keys);
302 if (keyring == NULL)
303 return NULL; /* No keyring yet, so no keys yet. */
305 bucket = fscrypt_mk_hash_bucket(keyring, mk_spec);
340 struct key *keyring;
344 keyring = keyring_alloc(description, GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
348 if (IS_ERR(keyring))
349 return PTR_ERR(keyring);
351 mk->mk_users = keyring;
367 * We need to mark the keyring reference as "possessed" so that we
432 struct fscrypt_keyring *keyring = sb->s_master_keys;
460 spin_lock(&keyring->lock);
462 fscrypt_mk_hash_bucket(keyring, mk_spec));
463 spin_unlock(&keyring->lock);
638 * Retrieve the raw key from the Linux keyring key specified by 'key_id', and
648 * The ability to specify the key via Linux keyring key is intended for cases
1014 * keyring. Otherwise it remains in the keyring in the "incompletely removed"