/linux-master/include/keys/ |
H A D | big_key-type.h | 2 /* Big capacity key type. 11 #include <linux/key-type.h> 17 extern void big_key_revoke(struct key *key); 18 extern void big_key_destroy(struct key *key); 19 extern void big_key_describe(const struct key *big_key, struct seq_file *m); 20 extern long big_key_read(const struct key *key, char *buffer, size_t buflen); 21 extern int big_key_update(struct key *ke [all...] |
H A D | user-type.h | 2 /* user-type.h: User-defined key type 11 #include <linux/key.h> 18 * the payload for a key of type "user" or "logon" 19 * - once filled in and attached to a key: 21 * - the payload must be read with RCU procedures or with the key semaphore 23 * - the payload may only be replaced with the key semaphore write-locked 24 * - the key's data length is the size of the actual data, not including the 40 extern int user_update(struct key *key, struct key_preparsed_payload *prep); 41 extern void user_revoke(struct key *ke 46 user_key_payload_rcu(const struct key *key) argument 51 user_key_payload_locked(const struct key *key) argument [all...] |
H A D | request_key_auth-type.h | 2 /* request_key authorisation token key type 11 #include <linux/key.h> 18 struct key *target_key; 19 struct key *dest_keyring; 27 static inline struct request_key_auth *get_request_key_auth(const struct key *key) argument 29 return key->payload.data[0];
|
H A D | ceph-type.h | 5 #include <linux/key.h>
|
H A D | keyring-type.h | 2 /* Keyring key type 11 #include <linux/key.h>
|
H A D | system_keyring.h | 11 #include <linux/key.h> 22 extern int restrict_link_by_builtin_trusted(struct key *keyring, 25 struct key *restriction_key); 26 extern __init int load_module_cert(struct key *keyring); 31 static inline __init int load_module_cert(struct key *keyring) 40 struct key *keyring, 43 struct key *restriction_key); 50 struct key *dest_keyring, 53 struct key *restrict_key); 54 extern void __init set_machine_trusted_keys(struct key *keyrin [all...] |
H A D | asymmetric-subtype.h | 2 /* Asymmetric public-key cryptography key subtype 29 /* Describe a key of this subtype for /proc/keys */ 30 void (*describe)(const struct key *key, struct seq_file *m); 32 /* Destroy a key of this subtype */ 42 /* Verify the signature on a key of this subtype (optional) */ 43 int (*verify_signature)(const struct key *key, 48 * asymmetric_key_subtype - Get the subtype from an asymmetric key 55 asymmetric_key_subtype(const struct key *key) argument [all...] |
H A D | asymmetric-type.h | 2 /* Asymmetric Public-key cryptography key type interface 13 #include <linux/key-type.h> 19 * The key payload is four words. The asymmetric-type key uses them as 23 asym_crypto, /* The data representing the key */ 26 asym_auth /* The key's authorisation (signature, parent key ID) */ 30 * Identifiers for an asymmetric key ID. We have three ways of looking up a 31 * key derive 70 asymmetric_key_ids(const struct key *key) argument 76 asymmetric_key_public_key(const struct key *key) argument [all...] |
/linux-master/arch/x86/include/uapi/asm/ |
H A D | mman.h | 8 #define arch_calc_vm_prot_bits(prot, key) ( \ 9 ((key) & 0x1 ? VM_PKEY_BIT0 : 0) | \ 10 ((key) & 0x2 ? VM_PKEY_BIT1 : 0) | \ 11 ((key) & 0x4 ? VM_PKEY_BIT2 : 0) | \ 12 ((key) & 0x8 ? VM_PKEY_BIT3 : 0))
|
/linux-master/include/linux/ |
H A D | key-type.h | 2 /* Definitions for key type implementations 11 #include <linux/key.h> 20 * Pre-parsed payload, used by key add, update and instantiate. 24 * def_datalen from the key type. Then if the preparse() op is provided by the 25 * key type, that will be called. Then the struct will be passed to the 33 char *description; /* Proposed key description (or NULL) */ 38 time64_t expiry; /* Expiry time of key */ 41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux); 51 bool (*cmp)(const struct key *key, 182 key_negate_and_link(struct key *key, unsigned timeout, struct key *keyring, struct key *authkey) argument [all...] |
H A D | jump_label_ratelimit.h | 10 struct static_key key; member in struct:static_key_deferred 16 struct static_key_true key; member in struct:static_key_true_deferred 22 struct static_key_false key; member in struct:static_key_false_deferred 28 __static_key_slow_dec_deferred(&(x)->key, &(x)->work, (x)->timeout) 30 __static_key_slow_dec_deferred(&(x)->key.key, &(x)->work, (x)->timeout) 36 __static_key_slow_dec_deferred(struct static_key *key, 39 extern void __static_key_deferred_flush(void *key, struct delayed_work *work); 41 jump_label_rate_limit(struct static_key_deferred *key, unsigned long rl); 47 .key 65 struct static_key key; member in struct:static_key_deferred 68 struct static_key_true key; member in struct:static_key_true_deferred 71 struct static_key_false key; member in struct:static_key_false_deferred 80 static_key_slow_dec_deferred(struct static_key_deferred *key) argument 85 static_key_deferred_flush(void *key) argument 90 jump_label_rate_limit(struct static_key_deferred *key, unsigned long rl) argument [all...] |
/linux-master/security/keys/ |
H A D | permission.c | 13 * key_task_permission - Check a key can be used 14 * @key_ref: The key to check. 18 * Check to see whether permission is granted to use a key in the desired way, 29 struct key *key; local 51 key = key_ref_to_ptr(key_ref); 54 if (uid_eq(key->uid, cred->fsuid)) { 55 kperm = key->perm >> 16; 61 if (gid_valid(key->gid) && key 102 key_validate(const struct key *key) argument [all...] |
H A D | gc.c | 14 * Delay between key revocation/expiry in seconds 34 #define KEY_GC_KEY_EXPIRED 0 /* A key expired and needs unlinking */ 40 * Any key whose type gets unregistered will be re-typed to this if it can't be 79 * Some key's cleanup time was met after it expired, so we need to get the 125 struct key *key = local 126 list_entry(keys->next, struct key, graveyard_link); 127 short state = key->state; 129 list_del(&key->graveyard_link); 131 kdebug("- %u", key 186 struct key *key; local [all...] |
/linux-master/drivers/net/wireless/silabs/wfx/ |
H A D | key.c | 11 #include "key.h" 29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation"); 34 struct ieee80211_key_conf *key, u8 *peer_addr) 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); 37 msg->key_length = key->keylen; 38 memcpy(msg->key_data, key->key, key->keylen); 44 struct ieee80211_key_conf *key) 46 WARN(key 33 fill_wep_pair(struct wfx_hif_wep_pairwise_key *msg, struct ieee80211_key_conf *key, u8 *peer_addr) argument 43 fill_wep_group(struct wfx_hif_wep_group_key *msg, struct ieee80211_key_conf *key) argument 53 fill_tkip_pair(struct wfx_hif_tkip_pairwise_key *msg, struct ieee80211_key_conf *key, u8 *peer_addr) argument 69 fill_tkip_group(struct wfx_hif_tkip_group_key *msg, struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq, enum nl80211_iftype iftype) argument 90 fill_ccmp_pair(struct wfx_hif_aes_pairwise_key *msg, struct ieee80211_key_conf *key, u8 *peer_addr) argument 99 fill_ccmp_group(struct wfx_hif_aes_group_key *msg, struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq) argument 110 fill_sms4_pair(struct wfx_hif_wapi_pairwise_key *msg, struct ieee80211_key_conf *key, u8 *peer_addr) argument 125 fill_sms4_group(struct wfx_hif_wapi_group_key *msg, struct ieee80211_key_conf *key) argument 139 fill_aes_cmac_group(struct wfx_hif_igtk_group_key *msg, struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq) argument 150 wfx_add_key(struct wfx_vif *wvif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument 207 wfx_remove_key(struct wfx_vif *wvif, struct ieee80211_key_conf *key) argument 214 wfx_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
/linux-master/lib/ |
H A D | test_static_keys.c | 37 struct static_key *key; member in struct:test_key 41 #define test_key_func(key, branch) \ 42 static bool key ## _ ## branch(void) \ 44 return branch(&key); \ 47 static void invert_key(struct static_key *key) argument 49 if (static_key_enabled(key)) 50 static_key_disable(key); 52 static_key_enable(key); 61 if (previous != keys[i].key) { 62 invert_key(keys[i].key); [all...] |
/linux-master/drivers/macintosh/ |
H A D | via-pmu-event.h | 7 extern void via_pmu_event(int key, int down);
|
/linux-master/arch/csky/include/asm/ |
H A D | jump_label.h | 12 static __always_inline bool arch_static_branch(struct static_key *key, argument 22 : : "i"(&((char *)key)[branch]) : : label); 29 static __always_inline bool arch_static_branch_jump(struct static_key *key, argument 39 : : "i"(&((char *)key)[branch]) : : label);
|
/linux-master/arch/arm64/include/asm/ |
H A D | jump_label.h | 18 static __always_inline bool arch_static_branch(struct static_key * const key, argument 28 : : "i"(&((char *)key)[branch]) : : l_yes); 35 static __always_inline bool arch_static_branch_jump(struct static_key * const key, argument 45 : : "i"(&((char *)key)[branch]) : : l_yes);
|
/linux-master/arch/riscv/include/asm/ |
H A D | jump_label.h | 17 static __always_inline bool arch_static_branch(struct static_key * const key, argument 32 : : "i"(&((char *)key)[branch]) : : label); 39 static __always_inline bool arch_static_branch_jump(struct static_key * const key, argument 54 : : "i"(&((char *)key)[branch]) : : label);
|
/linux-master/fs/btrfs/ |
H A D | orphan.c | 14 struct btrfs_key key; local 17 key.objectid = BTRFS_ORPHAN_OBJECTID; 18 key.type = BTRFS_ORPHAN_ITEM_KEY; 19 key.offset = offset; 25 ret = btrfs_insert_empty_item(trans, root, path, &key, 0); 35 struct btrfs_key key; local 38 key.objectid = BTRFS_ORPHAN_OBJECTID; 39 key.type = BTRFS_ORPHAN_ITEM_KEY; 40 key.offset = offset; 46 ret = btrfs_search_slot(trans, root, &key, pat [all...] |
/linux-master/arch/xtensa/include/asm/ |
H A D | jump_label.h | 13 static __always_inline bool arch_static_branch(struct static_key *key, argument 21 : : "i" (&((char *)key)[branch]) : : l_yes); 28 static __always_inline bool arch_static_branch_jump(struct static_key *key, argument 49 : : "i" (&((char *)key)[branch]) : : l_yes); 61 jump_label_t key; member in struct:jump_entry
|
/linux-master/arch/sparc/include/asm/ |
H A D | jump_label.h | 11 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) argument 20 : : "i" (&((char *)key)[branch]) : : l_yes); 27 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) argument 36 : : "i" (&((char *)key)[branch]) : : l_yes); 48 jump_label_t key; member in struct:jump_entry
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_test_kern5.c | 18 __type(key, struct key_t); 27 void *key = ctx->key; local 29 if (key == (void *)0) 33 key_sum += *(__u32 *)(key + sizeof(struct key_t));
|
/linux-master/security/integrity/ |
H A D | digsig_asymmetric.c | 11 #include <linux/key-type.h> 20 * Request an asymmetric key. 22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) 24 struct key *key; local 29 pr_debug("key search: \"%s\"\n", name); 31 key = get_ima_blacklist_keyring(); 32 if (key) { 35 kref = keyring_search(make_key_ref(key, 88 struct key *key; local [all...] |
/linux-master/crypto/ |
H A D | rsa_helper.c | 3 * RSA key extract helper 19 struct rsa_key *key = context; local 23 /* invalid key provided */ 33 /* In FIPS mode only allow key size 2K and higher */ 35 pr_err("RSA: key size not allowed in FIPS mode\n"); 40 key->n = value; 41 key->n_sz = vlen; 49 struct rsa_key *key = context; local 51 /* invalid key provided */ 52 if (!value || !key 64 struct rsa_key *key = context; local 79 struct rsa_key *key = context; local 94 struct rsa_key *key = context; local 109 struct rsa_key *key = context; local 124 struct rsa_key *key = context; local 139 struct rsa_key *key = context; local 162 rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) argument 181 rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) argument [all...] |