Lines Matching defs:key

4250  * Casey has not tested key support very heavily.
4257 * smack_key_alloc - Set the key security blob
4258 * @key: object
4266 static int smack_key_alloc(struct key *key, const struct cred *cred,
4271 key->security = skp;
4276 * smack_key_free - Clear the key security blob
4277 * @key: the object
4281 static void smack_key_free(struct key *key)
4283 key->security = NULL;
4287 * smack_key_permission - Smack access on a key
4290 * @need_perm: requested key permission
4299 struct key *keyp;
4333 * If the key hasn't been initialized give it access so that
4349 ad.a.u.key_struct.key = keyp->serial;
4353 rc = smk_bu_note("key access", tkp, keyp->security, request, rc);
4358 * smack_key_getsecurity - Smack label tagging the key
4359 * @key points to the key to be queried
4366 static int smack_key_getsecurity(struct key *key, char **_buffer)
4368 struct smack_known *skp = key->security;
4372 if (key->security == NULL) {
4389 * smack_watch_key - Smack access to watch a key for notifications.
4390 * @key: The key to be watched
4392 * Return 0 if the @watch->cred has permission to read from the key object and
4395 static int smack_watch_key(struct key *key)
4401 if (key == NULL)
4404 * If the key hasn't been initialized give it access so that
4407 if (key->security == NULL)
4420 ad.a.u.key_struct.key = key->serial;
4421 ad.a.u.key_struct.key_desc = key->description;
4423 rc = smk_access(tkp, key->security, MAY_READ, &ad);
4424 rc = smk_bu_note("key watch", tkp, key->security, MAY_READ, rc);
4846 /* key management security hooks */