Home
last modified time | relevance | path

Searched refs:request_key (Results 1 - 7 of 7) sorted by relevance

/third_party/ltp/testcases/kernel/syscalls/keyctl/
H A Dkeyctl03.c33 request_key("keyring", "foo", "bar", KEY_SPEC_THREAD_KEYRING); in do_test()
H A Dkeyctl07.c28 * request_key() will result in the creation of a negative key provided in try_to_read_negative_key()
38 TEST(request_key("user", "description", "callout_info", in try_to_read_negative_key()
41 tst_brk(TBROK, "request_key() unexpectedly succeeded"); in try_to_read_negative_key()
45 "request_key() failed with unexpected error"); in try_to_read_negative_key()
/third_party/ltp/testcases/kernel/syscalls/request_key/
H A Drequest_key01.c13 * The testcase checks basic functionality of the request_key(2).
14 * request_key(2) asks the kernel to find a key which matches the
30 TEST(request_key("keyring", "ltp", NULL, KEY_REQKEY_DEFL_DEFAULT)); in verify_request_key()
32 tst_res(TFAIL | TTERRNO, "request_key() failed"); in verify_request_key()
39 tst_res(TPASS, "request_key() succeed"); in verify_request_key()
H A Drequest_key04.c8 * for request_key() destination"), or CVE-2017-17807. This bug allowed adding
52 TEST(request_key("user", "desc", "callout_info", 0)); in do_test()
54 tst_brk(TBROK, "request_key() unexpectedly succeeded"); in do_test()
66 tst_res(TPASS, "request_key() failed with EACCES as expected"); in do_test()
69 "request_key() failed with unexpected error code"); in do_test()
H A Drequest_key02.c13 * 1) request_key(2) fails if no matching key was found.
14 * 2) request_key(2) fails if A revoked key was found.
15 * 3) request_key(2) fails if An expired key was found.
18 * 1) request_key(2) should return -1 and set errno to ENOKEY.
19 * 2) request_key(2) should return -1 and set errno to EKEYREVOKED.
20 * 3) request_key(2) should return -1 and set errno to EKEYEXPIRED.
46 TEST(request_key("keyring", tc->des, NULL, *tc->id)); in verify_request_key()
48 tst_res(TFAIL, "request_key() succeed unexpectly"); in verify_request_key()
53 tst_res(TPASS | TTERRNO, "request_key() failed expectly"); in verify_request_key()
57 tst_res(TFAIL | TTERRNO, "request_key() faile in verify_request_key()
[all...]
H A Drequest_key03.c16 * it with request_key() in another task. This reproduces both bugs:
19 * request_key() is still in the "uninstantiated" state. For the "encrypted" or
25 * For CVE-2017-15951, request_key() has to run while the key is "negatively
26 * instantiated" (from a prior request_key()) and is being concurrently changed
28 * a bit more difficult to reproduce, caused the task executing request_key() to
116 TEST(request_key(type, "desc", "callout_info", in run_child_request()
127 "request_key() process runtime exceeded"); in run_child_request()
175 * Verify that neither the add_key() nor the request_key() process in do_test()
177 * CVE-2017-15299, while if the request_key() process crashed it is in do_test()
207 tst_brk(TBROK, "request_key chil in do_test()
[all...]
/third_party/ltp/include/lapi/
H A Dkeyctl.h33 static inline key_serial_t request_key(const char *type, in request_key() function

Completed in 2 milliseconds