Searched refs:request_key (Results 1 - 25 of 31) sorted by last modified time

12

/linux-master/fs/bcachefs/
H A Dchecksum.c514 keyring_key = request_key(&key_type_user, key_description, NULL);
538 key_id = request_key("user", key_description, NULL,
543 key_id = request_key("user", key_description, NULL,
548 key_id = request_key("user", key_description, NULL,
601 key_id = request_key("user", key_description.buf, NULL, KEY_SPEC_USER_KEYRING);
/linux-master/arch/s390/kernel/
H A Dcert_store.c366 cs_keyring = request_key(&key_type_keyring, CERT_STORE_KEYRING_NAME, NULL);
/linux-master/security/keys/
H A Dkeyctl.c167 SYSCALL_DEFINE4(request_key, const char __user *, _type,
1148 * Change the request_key authorisation key on the current process.
1310 * Negative keys are used to rate limit repeated request_key() calls by causing
1330 * Negative keys are used to rate limit repeated request_key() calls by causing
1387 * Read or set the default keyring in which request_key() will cache keys and
1504 * available all the keys from the caller of the request_key() that created a
1505 * key to request_key() calls made by the caller of this function.
1514 * the callout information passed to request_key().
H A Drequest_key.c120 static char const request_key[] = "/sbin/request-key"; local
185 argv[i++] = (char *)request_key;
196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring,
244 if (key->type->request_key)
245 actor = key->type->request_key;
344 * that /sbin/request-key can itself use request_key() to add
367 * race between two thread calling request_key().
/linux-master/security/integrity/evm/
H A Devm_crypto.c432 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL);
/linux-master/include/linux/gpio/
H A Ddriver.h168 * @request_key:
172 struct lock_class_key *request_key; member in struct:gpio_irq_chip
591 struct lock_class_key *request_key);
619 static struct lock_class_key request_key; \
621 &request_key); \
625 static struct lock_class_key request_key; \
627 &request_key); \
642 struct lock_class_key *request_key);
/linux-master/fs/ecryptfs/
H A Dkeystore.c25 * request_key returned an error instead of a valid key address;
1617 (*auth_tok_key) = request_key(&key_type_user, sig, NULL);
H A Decryptfs_kernel.h94 return request_key(&key_type_encrypted, sig, NULL);
/linux-master/drivers/net/dsa/mv88e6xxx/
H A Dchip.c346 static struct lock_class_key request_key; local
357 irq_set_lockdep_class(chip->irq, &lock_key, &request_key);
/linux-master/drivers/md/
H A Ddm-crypt.c2588 key = request_key(type, key_desc + 1, NULL);
H A Ddm-verity-verify-sig.c38 key = request_key(&key_type_user,
/linux-master/drivers/gpio/
H A Dgpiolib.c94 struct lock_class_key *request_key);
877 struct lock_class_key *request_key)
1047 ret = gpiochip_add_irqchip(gc, lock_key, request_key);
1489 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key);
1679 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key);
1897 * @request_key: lockdep class for IRQ request
1901 struct lock_class_key *request_key)
1931 gc->irq.request_key = request_key;
2045 struct lock_class_key *request_key)
875 gpiochip_add_data_with_key(struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
1899 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
2043 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
[all...]
H A Dgpiolib-devres.c406 * @request_key: lockdep class for IRQ request
419 struct lock_class_key *request_key)
423 ret = gpiochip_add_data_with_key(gc, data, lock_key, request_key);
417 devm_gpiochip_add_data_with_key(struct device *dev, struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
/linux-master/fs/smb/client/
H A Dconnect.c2122 key = request_key(&key_type_logon, desc, "");
2133 key = request_key(&key_type_logon, desc, "");
H A Dcifs_spnego.c161 spnego_key = request_key(&cifs_spnego_key_type, description, "");
211 * instruct request_key() to use this special keyring as a cache for
H A Dcifsacl.c296 sidkey = request_key(&cifs_idmap_key_type, desc, "");
402 sidkey = request_key(&cifs_idmap_key_type, sidstr, "");
491 /* instruct request_key() to use this special keyring as a cache for
/linux-master/security/integrity/
H A Ddigsig_asymmetric.c54 key = request_key(&key_type_asymmetric, name, NULL);
H A Ddigsig.c49 request_key(&key_type_keyring, keyring_name[id], NULL);
/linux-master/security/keys/encrypted-keys/
H A Dencrypted.c313 ukey = request_key(&key_type_user, master_desc, NULL);
/linux-master/fs/ubifs/
H A Dauth.c278 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
/linux-master/kernel/
H A Dsys_ni.c166 COND_SYSCALL(request_key); variable
/linux-master/include/linux/
H A Dkey-type.h134 /* handle request_key() for this type instead of invoking
142 request_key_actor_t request_key; member in struct:key_type
H A Dkey.h339 * request_key - Request a key and wait for construction
346 static inline struct key *request_key(struct key_type *type, function
361 * As for request_key() except that it does not add the returned key to a
/linux-master/fs/crypto/
H A Dkeysetup_v1.c107 key = request_key(&key_type_logon, description, NULL);
/linux-master/fs/nfs/
H A Dnfs4idmap.c252 * Assemble the description to pass to request_key()
291 rkey = request_key(&key_type_id_resolver, desc, "");
420 .request_key = nfs_idmap_legacy_upcall,

Completed in 680 milliseconds

12