• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/keys/

Lines Matching refs:cred

48 	const struct cred *cred;
53 cred = current_cred();
54 user = cred->user;
76 cred, KEY_ALLOC_IN_QUOTA,
92 cred, KEY_ALLOC_IN_QUOTA, NULL);
127 int install_thread_keyring_to_cred(struct cred *new)
145 struct cred *new;
168 int install_process_keyring_to_cred(struct cred *new)
200 struct cred *new;
219 int install_session_keyring_to_cred(struct cred *cred, struct key *keyring)
229 if (cred->tgcred->session_keyring)
232 keyring = keyring_alloc("_ses", cred->uid, cred->gid,
233 cred, flags, NULL);
241 spin_lock_irq(&cred->tgcred->lock);
242 old = cred->tgcred->session_keyring;
243 rcu_assign_pointer(cred->tgcred->session_keyring, keyring);
244 spin_unlock_irq(&cred->tgcred->lock);
262 struct cred *new;
285 BUG_ON(!tsk->cred);
286 if (tsk->cred->thread_keyring) {
287 down_write(&tsk->cred->thread_keyring->sem);
288 tsk->cred->thread_keyring->uid = tsk->cred->fsuid;
289 up_write(&tsk->cred->thread_keyring->sem);
301 BUG_ON(!tsk->cred);
302 if (tsk->cred->thread_keyring) {
303 down_write(&tsk->cred->thread_keyring->sem);
304 tsk->cred->thread_keyring->gid = tsk->cred->fsgid;
305 up_write(&tsk->cred->thread_keyring->sem);
321 const struct cred *cred)
337 if (cred->thread_keyring) {
339 make_key_ref(cred->thread_keyring, 1),
340 cred, type, description, match);
358 if (cred->tgcred->process_keyring) {
360 make_key_ref(cred->tgcred->process_keyring, 1),
361 cred, type, description, match);
379 if (cred->tgcred->session_keyring) {
383 cred->tgcred->session_keyring),
385 cred, type, description, match);
404 else if (cred->user->session_keyring) {
406 make_key_ref(cred->user->session_keyring, 1),
407 cred, type, description, match);
442 const struct cred *cred)
449 key_ref = search_my_process_keyrings(type, description, match, cred);
458 if (cred->request_key_auth &&
459 cred == current_cred() &&
463 down_read(&cred->request_key_auth->sem);
465 if (key_validate(cred->request_key_auth) == 0) {
466 rka = cred->request_key_auth->payload.data;
469 match, rka->cred);
471 up_read(&cred->request_key_auth->sem);
478 up_read(&cred->request_key_auth->sem);
515 const struct cred *cred;
521 cred = get_current_cred();
526 if (!cred->thread_keyring) {
538 key = cred->thread_keyring;
544 if (!cred->tgcred->process_keyring) {
556 key = cred->tgcred->process_keyring;
562 if (!cred->tgcred->session_keyring) {
569 cred->user->session_keyring);
577 key = rcu_dereference(cred->tgcred->session_keyring);
584 if (!cred->user->uid_keyring) {
590 key = cred->user->uid_keyring;
596 if (!cred->user->session_keyring) {
602 key = cred->user->session_keyring;
613 key = cred->request_key_auth;
622 if (!cred->request_key_auth)
625 down_read(&cred->request_key_auth->sem);
626 if (cred->request_key_auth->flags & KEY_FLAG_REVOKED) {
630 rka = cred->request_key_auth->payload.data;
634 up_read(&cred->request_key_auth->sem);
656 cred);
696 ret = key_task_permission(key_ref, cred, perm);
701 put_cred(cred);
712 put_cred(cred);
726 const struct cred *old;
727 struct cred *new;
799 const struct cred *old;
800 struct cred *new;