/linux-master/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 33 tkey = request_key(&key_type_trusted, trusted_desc, NULL);
|
/linux-master/security/keys/ |
H A D | Makefile | 16 request_key.o \
|
H A D | request_key.c | 120 static char const request_key[] = "/sbin/request-key"; local 185 argv[i++] = (char *)request_key; 196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, 244 if (key->type->request_key) 245 actor = key->type->request_key; 344 * that /sbin/request-key can itself use request_key() to add 367 * race between two thread calling request_key().
|
/linux-master/include/linux/gpio/ |
H A D | driver.h | 168 * @request_key: 172 struct lock_class_key *request_key; member in struct:gpio_irq_chip 593 struct lock_class_key *request_key); 621 static struct lock_class_key request_key; \ 623 &request_key); \ 627 static struct lock_class_key request_key; \ 629 &request_key); \ 644 struct lock_class_key *request_key);
|
/linux-master/drivers/md/ |
H A D | dm-verity-verify-sig.c | 38 key = request_key(&key_type_user,
|
/linux-master/include/linux/ |
H A D | key-type.h | 134 /* handle request_key() for this type instead of invoking 142 request_key_actor_t request_key; member in struct:key_type
|
H A D | key.h | 339 * request_key - Request a key and wait for construction 346 static inline struct key *request_key(struct key_type *type, function 361 * As for request_key() except that it does not add the returned key to a
|
/linux-master/security/integrity/ |
H A D | digsig_asymmetric.c | 54 key = request_key(&key_type_asymmetric, name, NULL);
|
H A D | digsig.c | 49 request_key(&key_type_keyring, keyring_name[id], NULL);
|
/linux-master/drivers/gpio/ |
H A D | gpiolib-devres.c | 406 * @request_key: lockdep class for IRQ request 419 struct lock_class_key *request_key) 423 ret = gpiochip_add_data_with_key(gc, data, lock_key, request_key); 417 devm_gpiochip_add_data_with_key(struct device *dev, struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
|
H A D | gpiolib.c | 94 struct lock_class_key *request_key); 861 struct lock_class_key *request_key) 1031 ret = gpiochip_add_irqchip(gc, lock_key, request_key); 1473 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); 1663 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); 1881 * @request_key: lockdep class for IRQ request 1885 struct lock_class_key *request_key) 1915 gc->irq.request_key = request_key; 2029 struct lock_class_key *request_key) 859 gpiochip_add_data_with_key(struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument 1883 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument 2027 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument [all...] |
/linux-master/net/rxrpc/ |
H A D | server_key.c | 135 key = request_key(&key_type_keyring, description, NULL);
|
/linux-master/fs/smb/client/ |
H A D | cifs_spnego.c | 161 spnego_key = request_key(&cifs_spnego_key_type, description, ""); 211 * instruct request_key() to use this special keyring as a cache for
|
H A D | cifsacl.c | 296 sidkey = request_key(&cifs_idmap_key_type, desc, ""); 402 sidkey = request_key(&cifs_idmap_key_type, sidstr, ""); 491 /* instruct request_key() to use this special keyring as a cache for
|
/linux-master/fs/bcachefs/ |
H A D | checksum.c | 518 keyring_key = request_key(&key_type_user, key_description, NULL); 542 key_id = request_key("user", key_description, NULL, 547 key_id = request_key("user", key_description, NULL, 552 key_id = request_key("user", key_description, NULL, 605 key_id = request_key("user", key_description.buf, NULL, KEY_SPEC_USER_KEYRING);
|
/linux-master/lib/ |
H A D | digsig.c | 227 key = request_key(&key_type_user, name, NULL);
|
/linux-master/fs/crypto/ |
H A D | keysetup_v1.c | 107 key = request_key(&key_type_logon, description, NULL);
|
/linux-master/kernel/ |
H A D | sys_ni.c | 166 COND_SYSCALL(request_key); variable
|
/linux-master/fs/ubifs/ |
H A D | auth.c | 278 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
|
/linux-master/security/integrity/evm/ |
H A D | evm_crypto.c | 421 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL);
|
/linux-master/fs/nfs/ |
H A D | nfs4idmap.c | 252 * Assemble the description to pass to request_key() 291 rkey = request_key(&key_type_id_resolver, desc, ""); 420 .request_key = nfs_idmap_legacy_upcall,
|
/linux-master/drivers/nvdimm/ |
H A D | security.c | 58 key = request_key(&key_type_encrypted, desc, ""); 61 dev_dbg(dev, "request_key() found no key\n"); 63 dev_dbg(dev, "request_key() upcall failed\n"); 195 * from request_key() to the hardware for verification. Failure
|
/linux-master/arch/s390/kernel/ |
H A D | cert_store.c | 365 cs_keyring = request_key(&key_type_keyring, CERT_STORE_KEYRING_NAME, NULL);
|
/linux-master/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 94 return request_key(&key_type_encrypted, sig, NULL);
|
/linux-master/net/ceph/ |
H A D | ceph_common.c | 362 ukey = request_key(&key_type_ceph, name, NULL); 364 /* request_key errors don't map nicely to mount(2)
|