/third_party/ltp/testcases/commands/keyctl/ |
H A D | keyctl01.sh | 20 TST_NEEDS_CMDS="keyctl" 28 if ! keyctl 2>&1 | grep -q "keyctl $op"; then 33 local key=`keyctl request2 user debug:foo bar` 40 if ! keyctl unlink $key @s; then 46 tst_brk TCONF "keyctl operation $op not supported" 83 keyctl request2 user debug:fred negate @t >temp 2>&1 90 local key=`keyctl show | awk '/debug:fred/ {print $1}'` 92 key=`keyctl show | \ 97 keyctl unlin [all...] |
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
H A D | request_key04.c | 20 #include "lapi/keyctl.h" 27 TEST(keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL)); in do_test() 31 TEST(keyctl(KEYCTL_SETPERM, KEY_SPEC_SESSION_KEYRING, in do_test() 38 TEST(keyctl(KEYCTL_SET_REQKEY_KEYRING, in do_test() 45 TEST(keyctl(KEYCTL_READ, KEY_SPEC_SESSION_KEYRING, in do_test() 57 TEST(keyctl(KEYCTL_READ, KEY_SPEC_SESSION_KEYRING, in do_test()
|
H A D | request_key02.c | 26 #include "lapi/keyctl.h" 71 if (keyctl(cmd, n) == -1) { in init_key() 77 if (keyctl(cmd, n, sec) == -1) { in init_key()
|
H A D | request_key03.c | 38 #include "lapi/keyctl.h" 99 TEST(keyctl(KEYCTL_CLEAR, KEY_SPEC_SESSION_KEYRING)); in run_child_add() 141 TEST(keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL)); in do_test()
|
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
H A D | keyctl05.c | 32 #include "lapi/keyctl.h" 78 TEST(keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL)); in new_session_keyring() 124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
H A D | keyctl02.c | 32 #include "lapi/keyctl.h" 45 keyctl(KEYCTL_READ, key, buffer, 4); in do_read() 54 keyctl(KEYCTL_REVOKE, key); in do_revoke() 108 if (keyctl(KEYCTL_INVALIDATE, key_inv) == -1 && errno != EOPNOTSUPP) in do_test() 116 ret = keyctl(KEYCTL_REVOKE, key); in do_test()
|
H A D | keyctl04.c | 20 #include "lapi/keyctl.h" 26 TEST(keyctl(KEYCTL_GET_KEYRING_ID, KEY_SPEC_THREAD_KEYRING, 1)); in do_test() 31 TEST(keyctl(KEYCTL_SET_REQKEY_KEYRING, KEY_REQKEY_DEFL_THREAD_KEYRING)); in do_test() 35 TEST(keyctl(KEYCTL_GET_KEYRING_ID, KEY_SPEC_THREAD_KEYRING, 0)); in do_test()
|
H A D | keyctl01.c | 8 * Description: This tests the keyctl() syscall 19 #include "lapi/keyctl.h" 25 TEST(keyctl(KEYCTL_GET_KEYRING_ID, KEY_SPEC_USER_SESSION_KEYRING)); in do_test() 32 TEST(keyctl(KEYCTL_READ, key)); in do_test() 37 TEST(keyctl(KEYCTL_REVOKE, key)); in do_test()
|
H A D | keyctl09.c | 14 #include "lapi/keyctl.h" 37 TST_EXP_POSITIVE(keyctl(KEYCTL_READ, TST_RET, buffer, sizeof(buffer))); in do_test() 47 keyctl(KEYCTL_CLEAR, KEY_SPEC_PROCESS_KEYRING); in do_test()
|
H A D | keyctl07.c | 16 #include "lapi/keyctl.h" 49 TEST(keyctl(KEYCTL_READ, KEY_SPEC_PROCESS_KEYRING, in try_to_read_negative_key() 63 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
|
H A D | keyctl03.c | 23 #include "lapi/keyctl.h" 35 TEST(keyctl(KEYCTL_UNLINK, key, KEY_SPEC_SESSION_KEYRING)); in do_test() 37 tst_res(TFAIL | TTERRNO, "keyctl unlink failed"); in do_test()
|
/third_party/ltp/testcases/kernel/security/mmc_security/ |
H A D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then 75 keyctl clear -3
|
H A D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 59 keyctl clear -3
|
H A D | ask_password.sh | 55 if ! keyctl instantiate $1 "$passwd" $2 >/dev/null 2>&1; then
|
H A D | force_erase.sh | 70 keyctl clear -3
|
H A D | assign_password.sh | 60 if ! keyctl instantiate $1 "$newpasswd" $2 >/dev/null 2>&1; then
|
/third_party/ltp/testcases/cve/ |
H A D | cve-2016-7042.c | 22 #include "lapi/keyctl.h" 37 if (keyctl(KEYCTL_UPDATE, key, "b", 1)) in do_test() 50 if (keyctl(KEYCTL_UNLINK, key, KEY_SPEC_SESSION_KEYRING)) in do_test() 63 if (key > 0 && keyctl(KEYCTL_UNLINK, key, KEY_SPEC_SESSION_KEYRING)) in cleanup()
|
/third_party/ltp/include/lapi/ |
H A D | keyctl.h | 15 # include <linux/keyctl.h> 42 static inline long keyctl(int cmd, ...) in keyctl() function 58 return keyctl(KEYCTL_JOIN_SESSION_KEYRING, name); in keyctl_join_session_keyring() 98 /* keyctl commands */
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
H A D | ima_keys.sh | 25 tst_is_num $KEYRING_ID && keyctl clear $KEYRING_ID 101 tst_require_cmds keyctl openssl 114 KEYRING_ID=$(keyctl newring $keyring_name @s) || \
|
/third_party/ltp/testcases/kernel/watchqueue/ |
H A D | wqueue09.c | 16 #include "lapi/keyctl.h" 47 keyctl(KEYCTL_UPDATE, key, "b", 1); in run() 61 keyctl(KEYCTL_REVOKE, key); in cleanup()
|
H A D | common.h | 12 #include "lapi/keyctl.h" 88 keyctl(KEYCTL_WATCH_KEY, key, fd, 0x01); in wqueue_add_key() 89 keyctl(KEYCTL_WATCH_KEY, KEY_SPEC_SESSION_KEYRING, fd, 0x02); in wqueue_add_key()
|
H A D | wqueue08.c | 15 #include "lapi/keyctl.h" 40 keyctl(KEYCTL_WATCH_KEY, key, fd, -1); in run()
|
H A D | wqueue07.c | 9 * Test if keyctl setperm is correctly recognized by watch queue. 15 #include "lapi/keyctl.h" 22 tst_res(TPASS, "keyctl setattr has been recognized"); in saw_key_setattr() 24 tst_res(TFAIL, "keyctl setattr has not been recognized"); in saw_key_setattr() 35 keyctl(KEYCTL_SETPERM, key, KEY_POS_ALL | KEY_USR_ALL); in run()
|
H A D | wqueue05.c | 9 * Test if keyctl invalidate is correctly recognized by watch queue. 15 #include "lapi/keyctl.h" 22 tst_res(TPASS, "keyctl invalidate has been recognized"); in saw_key_invalidated() 24 tst_res(TFAIL, "keyctl invalidate has not been recognized"); in saw_key_invalidated() 35 keyctl(KEYCTL_INVALIDATE, key); in run()
|
H A D | wqueue06.c | 9 * Test if keyctl clear is correctly recognized by watch queue. 15 #include "lapi/keyctl.h" 22 tst_res(TPASS, "keyctl clear has been recognized"); in saw_key_cleared() 24 tst_res(TFAIL, "keyctl clear has not been recognized"); in saw_key_cleared() 34 keyctl(KEYCTL_CLEAR, KEY_SPEC_SESSION_KEYRING); in run()
|