• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/security/keys/

Lines Matching defs:keyring

23 /* session keyring create vs join semaphore */
36 /* the root user's UID keyring */
51 /* the root user's default session keyring */
77 /* concoct a default session keyring */
87 /* and a UID specific keyring, pointed to by the default session
88 * keyring */
120 * install a fresh thread keyring, discarding the old one
124 struct key *keyring, *old;
130 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
132 if (IS_ERR(keyring)) {
133 ret = PTR_ERR(keyring);
139 tsk->thread_keyring = keyring;
152 * make sure a process keyring is installed
156 struct key *keyring;
165 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
167 if (IS_ERR(keyring)) {
168 ret = PTR_ERR(keyring);
172 /* attach keyring */
175 tsk->signal->process_keyring = keyring;
176 keyring = NULL;
180 key_put(keyring);
191 * install a session keyring, discarding the old one
192 * - if a keyring is not supplied, an empty one is invented
195 struct key *keyring)
203 /* create an empty session keyring */
204 if (!keyring) {
211 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
213 if (IS_ERR(keyring))
214 return PTR_ERR(keyring);
217 atomic_inc(&keyring->usage);
220 /* install the keyring */
223 rcu_assign_pointer(tsk->signal->session_keyring, keyring);
246 /* no process keyring yet */
249 /* same session keyring */
268 /* no thread keyring yet */
308 /* newly exec'd tasks don't get a thread keyring */
316 /* discard the process keyring from a newly exec'd task */
331 * - we might want to make this invent a new session keyring
345 /* update the ownership of the thread keyring */
360 /* update the ownership of the thread keyring */
398 /* search the thread keyring first */
419 /* search the process keyring second */
440 /* search the session keyring */
465 /* or search the user-session keyring */
597 /* always install a session keyring upon access if one
692 * join the named keyring as the session keyring if possible, or attempt to
694 * - if the name is NULL, an empty anonymous keyring is installed instead
695 * - named session keyring joining is done with a semaphore held
700 struct key *keyring;
703 /* if no name is provided, install an anonymous keyring */
715 /* allow the user to join or create a named keyring */
718 /* look for an existing keyring of this name */
719 keyring = find_keyring_by_name(name, 0);
720 if (PTR_ERR(keyring) == -ENOKEY) {
722 keyring = keyring_alloc(name, tsk->uid, tsk->gid, tsk,
724 if (IS_ERR(keyring)) {
725 ret = PTR_ERR(keyring);
729 else if (IS_ERR(keyring)) {
730 ret = PTR_ERR(keyring);
734 /* we've got a keyring - now to install it */
735 ret = install_session_keyring(tsk, keyring);
739 ret = keyring->serial;
740 key_put(keyring);