summaryrefslogtreecommitdiff
path: root/security/keys/internal.h
AgeCommit message (Expand)AuthorFilesLines
2013-09-24KEYS: Drop the permissions argument from __keyring_search_one()David Howells1-2/+1
2013-09-24KEYS: Introduce a search context structureDavid Howells1-16/+24
2013-09-24KEYS: Consolidate the concept of an 'index key' for key accessDavid Howells1-5/+3
2013-09-24KEYS: key_is_dead() should take a const key pointer argumentDavid Howells1-1/+1
2013-09-24KEYS: Skip key state checks when checking for possessionDavid Howells1-0/+1
2013-05-08aio: don't include aio.h in sched.hKent Overstreet1-0/+2
2012-09-14userns: Convert security/keys to the new userns infrastructureEric W. Biederman1-4/+2
2012-07-24Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-1/+1
2012-07-22merge task_work and rcu_head, get rid of separate allocation for keyring caseAl Viro1-5/+1
2012-07-22trimming task_work: kill ->dataAl Viro1-0/+4
2012-06-10Merge commit 'v3.5-rc2' into nextJames Morris1-0/+2
2012-05-25KEYS: Fix some sparse warningsDavid Howells1-1/+1
2012-05-24keys: change keyctl_session_to_parent() to use task_work_add()Oleg Nesterov1-0/+2
2012-05-11KEYS: Add invalidation supportDavid Howells1-1/+14
2012-01-18keys: add a "logon" key typeJeff Layton1-0/+1
2011-08-23KEYS: Correctly destroy key payloads when their keytype is removedDavid Howells1-1/+3
2011-08-23KEYS: Move the unreferenced key reaper to the keys garbage collector fileDavid Howells1-0/+2
2011-03-17KEYS: Improve /proc/keysDavid Howells1-1/+3
2011-03-08KEYS: Add an iovec version of KEYCTL_INSTANTIATEDavid Howells1-0/+7
2011-03-08KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells1-0/+1
2011-01-26KEYS: Fix __key_link_end() quota fixup on errorDavid Howells1-3/+3
2011-01-22KEYS: Fix up comments in key management codeDavid Howells1-12/+14
2010-08-12Add a dummy printk function for the maintenance of unused printksDavid Howells1-5/+0
2010-08-02KEYS: Make /proc/keys check to see if a key is possessed before security checkDavid Howells1-0/+5
2010-05-27umh: creds: convert call_usermodehelper_keys() to use subprocess_info->init()Oleg Nesterov1-0/+1
2010-05-06KEYS: Do preallocation for __key_link()David Howells1-1/+10
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+1
2009-09-02KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]David Howells1-0/+4
2009-09-02KEYS: Deal with dead-type keys appropriately [try #6]David Howells1-1/+4
2009-02-27keys: distinguish per-uid keys in different namespacesSerge E. Hallyn1-1/+3
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-8/+9
2008-11-14KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells1-5/+7
2008-11-14KEYS: Disperse linux/key_ui.hDavid Howells1-1/+30
2008-06-06keys: remove unused key_alloc_semDaniel Walker1-1/+0
2008-04-29keys: make the keyring quotas controllable through /proc/sysDavid Howells1-4/+10
2008-04-29keys: don't generate user and user session keyrings unless they're accessedDavid Howells1-3/+1
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-1/+2
2008-04-29keys: allow the callout data to be passed as a blob rather than a stringDavid Howells1-3/+6
2008-04-18security: replace remaining __FUNCTION__ occurrencesHarvey Harrison1-4/+4
2007-10-17KEYS: Make request_key() and co fundamentally asynchronousDavid Howells1-12/+23
2006-06-29[PATCH] Keys: Allow in-kernel key requestor to pass auxiliary data to upcallerDavid Howells1-0/+1
2006-06-26[PATCH] keys: sort out key quota systemDavid Howells1-1/+2
2006-01-09[PATCH] keys: Permit running process to instantiate keysDavid Howells1-1/+3
2006-01-09[PATCH] keys: Permit key expiry time to be setDavid Howells1-0/+1
2006-01-06[PATCH] security/: possible cleanupsAdrian Bunk1-1/+0
2005-09-28[PATCH] Keys: Add possessor permissions to keys [try #3]David Howells1-13/+13
2005-06-24[PATCH] Keys: Make request-key create an authorisation keyDavid Howells1-4/+41
2005-04-17Linux-2.6.12-rc2v2.6.12-rc2Linus Torvalds1-0/+123