/linux-master/fs/bcachefs/ |
H A D | checksum.c | 514 keyring_key = request_key(&key_type_user, key_description, NULL); 538 key_id = request_key("user", key_description, NULL, 543 key_id = request_key("user", key_description, NULL, 548 key_id = request_key("user", key_description, NULL, 601 key_id = request_key("user", key_description.buf, NULL, KEY_SPEC_USER_KEYRING);
|
/linux-master/arch/s390/kernel/ |
H A D | cert_store.c | 366 cs_keyring = request_key(&key_type_keyring, CERT_STORE_KEYRING_NAME, NULL);
|
/linux-master/security/keys/ |
H A D | keyctl.c | 167 SYSCALL_DEFINE4(request_key, const char __user *, _type, 1148 * Change the request_key authorisation key on the current process. 1310 * Negative keys are used to rate limit repeated request_key() calls by causing 1330 * Negative keys are used to rate limit repeated request_key() calls by causing 1387 * Read or set the default keyring in which request_key() will cache keys and 1504 * available all the keys from the caller of the request_key() that created a 1505 * key to request_key() calls made by the caller of this function. 1514 * the callout information passed to request_key().
|
H A D | request_key.c | 120 static char const request_key[] = "/sbin/request-key"; local 185 argv[i++] = (char *)request_key; 196 ret = call_usermodehelper_keys(request_key, argv, envp, keyring, 244 if (key->type->request_key) 245 actor = key->type->request_key; 344 * that /sbin/request-key can itself use request_key() to add 367 * race between two thread calling request_key().
|
/linux-master/security/integrity/evm/ |
H A D | evm_crypto.c | 432 evm_key = request_key(&key_type_encrypted, EVMKEY, NULL);
|
/linux-master/include/linux/gpio/ |
H A D | driver.h | 168 * @request_key: 172 struct lock_class_key *request_key; member in struct:gpio_irq_chip 591 struct lock_class_key *request_key); 619 static struct lock_class_key request_key; \ 621 &request_key); \ 625 static struct lock_class_key request_key; \ 627 &request_key); \ 642 struct lock_class_key *request_key);
|
/linux-master/fs/ecryptfs/ |
H A D | keystore.c | 25 * request_key returned an error instead of a valid key address; 1617 (*auth_tok_key) = request_key(&key_type_user, sig, NULL);
|
H A D | ecryptfs_kernel.h | 94 return request_key(&key_type_encrypted, sig, NULL);
|
/linux-master/drivers/net/dsa/mv88e6xxx/ |
H A D | chip.c | 346 static struct lock_class_key request_key; local 357 irq_set_lockdep_class(chip->irq, &lock_key, &request_key);
|
/linux-master/drivers/md/ |
H A D | dm-crypt.c | 2588 key = request_key(type, key_desc + 1, NULL);
|
H A D | dm-verity-verify-sig.c | 38 key = request_key(&key_type_user,
|
/linux-master/drivers/gpio/ |
H A D | gpiolib.c | 94 struct lock_class_key *request_key); 877 struct lock_class_key *request_key) 1047 ret = gpiochip_add_irqchip(gc, lock_key, request_key); 1489 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); 1679 irq_set_lockdep_class(irq, gc->irq.lock_key, gc->irq.request_key); 1897 * @request_key: lockdep class for IRQ request 1901 struct lock_class_key *request_key) 1931 gc->irq.request_key = request_key; 2045 struct lock_class_key *request_key) 875 gpiochip_add_data_with_key(struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument 1899 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument 2043 gpiochip_add_irqchip(struct gpio_chip *gc, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument [all...] |
H A D | gpiolib-devres.c | 406 * @request_key: lockdep class for IRQ request 419 struct lock_class_key *request_key) 423 ret = gpiochip_add_data_with_key(gc, data, lock_key, request_key); 417 devm_gpiochip_add_data_with_key(struct device *dev, struct gpio_chip *gc, void *data, struct lock_class_key *lock_key, struct lock_class_key *request_key) argument
|
/linux-master/fs/smb/client/ |
H A D | connect.c | 2122 key = request_key(&key_type_logon, desc, ""); 2133 key = request_key(&key_type_logon, desc, "");
|
H A D | cifs_spnego.c | 161 spnego_key = request_key(&cifs_spnego_key_type, description, ""); 211 * instruct request_key() to use this special keyring as a cache for
|
H A D | cifsacl.c | 296 sidkey = request_key(&cifs_idmap_key_type, desc, ""); 402 sidkey = request_key(&cifs_idmap_key_type, sidstr, ""); 491 /* instruct request_key() to use this special keyring as a cache for
|
/linux-master/security/integrity/ |
H A D | digsig_asymmetric.c | 54 key = request_key(&key_type_asymmetric, name, NULL);
|
H A D | digsig.c | 49 request_key(&key_type_keyring, keyring_name[id], NULL);
|
/linux-master/security/keys/encrypted-keys/ |
H A D | encrypted.c | 313 ukey = request_key(&key_type_user, master_desc, NULL);
|
/linux-master/fs/ubifs/ |
H A D | auth.c | 278 keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
|
/linux-master/kernel/ |
H A D | sys_ni.c | 166 COND_SYSCALL(request_key); variable
|
/linux-master/include/linux/ |
H A D | key-type.h | 134 /* handle request_key() for this type instead of invoking 142 request_key_actor_t request_key; member in struct:key_type
|
H A D | key.h | 339 * request_key - Request a key and wait for construction 346 static inline struct key *request_key(struct key_type *type, function 361 * As for request_key() except that it does not add the returned key to a
|
/linux-master/fs/crypto/ |
H A D | keysetup_v1.c | 107 key = request_key(&key_type_logon, description, NULL);
|
/linux-master/fs/nfs/ |
H A D | nfs4idmap.c | 252 * Assemble the description to pass to request_key() 291 rkey = request_key(&key_type_id_resolver, desc, ""); 420 .request_key = nfs_idmap_legacy_upcall,
|