Searched refs:request_key (Results 1 - 7 of 7) sorted by relevance
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
H A D | keyctl03.c | 33 request_key("keyring", "foo", "bar", KEY_SPEC_THREAD_KEYRING); in do_test()
|
H A D | keyctl07.c | 28 * request_key() will result in the creation of a negative key provided in try_to_read_negative_key() 38 TEST(request_key("user", "description", "callout_info", in try_to_read_negative_key() 41 tst_brk(TBROK, "request_key() unexpectedly succeeded"); in try_to_read_negative_key() 45 "request_key() failed with unexpected error"); in try_to_read_negative_key()
|
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
H A D | request_key01.c | 13 * The testcase checks basic functionality of the request_key(2). 14 * request_key(2) asks the kernel to find a key which matches the 30 TEST(request_key("keyring", "ltp", NULL, KEY_REQKEY_DEFL_DEFAULT)); in verify_request_key() 32 tst_res(TFAIL | TTERRNO, "request_key() failed"); in verify_request_key() 39 tst_res(TPASS, "request_key() succeed"); in verify_request_key()
|
H A D | request_key04.c | 8 * for request_key() destination"), or CVE-2017-17807. This bug allowed adding 52 TEST(request_key("user", "desc", "callout_info", 0)); in do_test() 54 tst_brk(TBROK, "request_key() unexpectedly succeeded"); in do_test() 66 tst_res(TPASS, "request_key() failed with EACCES as expected"); in do_test() 69 "request_key() failed with unexpected error code"); in do_test()
|
H A D | request_key02.c | 13 * 1) request_key(2) fails if no matching key was found. 14 * 2) request_key(2) fails if A revoked key was found. 15 * 3) request_key(2) fails if An expired key was found. 18 * 1) request_key(2) should return -1 and set errno to ENOKEY. 19 * 2) request_key(2) should return -1 and set errno to EKEYREVOKED. 20 * 3) request_key(2) should return -1 and set errno to EKEYEXPIRED. 46 TEST(request_key("keyring", tc->des, NULL, *tc->id)); in verify_request_key() 48 tst_res(TFAIL, "request_key() succeed unexpectly"); in verify_request_key() 53 tst_res(TPASS | TTERRNO, "request_key() failed expectly"); in verify_request_key() 57 tst_res(TFAIL | TTERRNO, "request_key() faile in verify_request_key() [all...] |
H A D | request_key03.c | 16 * it with request_key() in another task. This reproduces both bugs: 19 * request_key() is still in the "uninstantiated" state. For the "encrypted" or 25 * For CVE-2017-15951, request_key() has to run while the key is "negatively 26 * instantiated" (from a prior request_key()) and is being concurrently changed 28 * a bit more difficult to reproduce, caused the task executing request_key() to 116 TEST(request_key(type, "desc", "callout_info", in run_child_request() 127 "request_key() process runtime exceeded"); in run_child_request() 175 * Verify that neither the add_key() nor the request_key() process in do_test() 177 * CVE-2017-15299, while if the request_key() process crashed it is in do_test() 207 tst_brk(TBROK, "request_key chil in do_test() [all...] |
/third_party/ltp/include/lapi/ |
H A D | keyctl.h | 33 static inline key_serial_t request_key(const char *type, in request_key() function
|
Completed in 2 milliseconds