summaryrefslogtreecommitdiffstats
path: root/security/keys/keyring.c
Commit message (Expand)AuthorAgeFilesLines
* keyring: Remove now-redundant smp_read_barrier_depends()Paul E. McKenney2017-12-041-7/+0
* security: keys: Replace time_t/timespec with time64_tBaolin Wang2017-11-151-10/+10
* KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-021-20/+19
* KEYS: Load key expiry time atomically in keyring_search_iterator()Eric Biggers2017-10-181-1/+3
* KEYS: Fix race between updating and finding a negative keyDavid Howells2017-10-181-5/+5
* KEYS: prevent creating a different user's keyringsEric Biggers2017-09-251-9/+14
* KEYS: fix writing past end of user-supplied buffer in keyring_read()Eric Biggers2017-09-251-9/+5
* security: use READ_ONCE instead of deprecated ACCESS_ONCEDavidlohr Bueso2017-06-091-6/+6
* KEYS: Add KEYCTL_RESTRICT_KEYRINGMat Martineau2017-04-041-0/+105
* KEYS: Use structure to capture key restriction function and dataMat Martineau2017-04-041-5/+63
* KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau2017-04-031-2/+4
* KEYS: Use a typedef for restrict_link function pointersMat Martineau2017-04-031-3/+1
* security, keys: convert key.usage from atomic_t to refcount_tElena Reshetova2017-04-031-4/+4
* KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-28/+1
* KEYS: Add a facility to restrict new links into a keyringDavid Howells2016-04-111-7/+66
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-6/+6
* KEYS: ensure we free the assoc array edit if edit is validColin Ian King2015-07-281-3/+5
* KEYS: request_key() should reget expired keys rather than give EKEYEXPIREDDavid Howells2014-12-011-1/+2
* KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flagsDavid Howells2014-12-011-3/+4
* KEYS: Make the key matching functions return boolDavid Howells2014-09-161-2/+2
* KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-161-5/+10
* KEYS: Preparse match dataDavid Howells2014-09-161-19/+30
* KEYS: keyring: Provide key preparsingDavid Howells2014-07-221-11/+23
* KEYS: Move the flags representing required permission to linux/key.hDavid Howells2014-03-141-4/+4
* KEYS: Make the keyring cycle detector ignore other keyrings of the same nameDavid Howells2014-03-091-1/+5
* KEYS: Fix searching of nested keyringsDavid Howells2013-12-021-1/+1
* KEYS: Fix multiple key add into associative arrayDavid Howells2013-12-021-4/+3
* KEYS: Fix the keyring hash functionDavid Howells2013-12-021-4/+4
* KEYS: Fix keyring content gc scannerDavid Howells2013-11-141-10/+35
* KEYS: Fix keyring quota misaccounting on key replacement and unlinkDavid Howells2013-10-301-12/+15
* KEYS: Fix a race between negating a key and reading the error setDavid Howells2013-10-301-0/+1
* KEYS: Add a 'trusted' flag and a 'trusted only' flagDavid Howells2013-09-251-0/+4
* KEYS: Expand the capacity of a keyringDavid Howells2013-09-241-693/+743
* KEYS: Drop the permissions argument from __keyring_search_one()David Howells2013-09-241-6/+3
* KEYS: Define a __key_get() wrapper to use rather than atomic_inc()David Howells2013-09-241-3/+3
* KEYS: Introduce a search context structureDavid Howells2013-09-241-35/+35
* KEYS: Consolidate the concept of an 'index key' for key accessDavid Howells2013-09-241-18/+19
* KEYS: Use bool in make_key_ref() and is_key_possessed()David Howells2013-09-241-2/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2012-12-161-6/+4
|\
| * Merge branch 'modsign-keys-devel' into security-next-keysDavid Howells2012-10-021-3/+3
| |\
| | * KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-09-131-3/+3
| * | KEYS: Use keyring_alloc() to create special keyringsDavid Howells2012-10-021-0/+1
| * | KEYS: Reduce initial permissions on keysDavid Howells2012-10-021-6/+3
| |/
* | Merge branch 'modules-next' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2012-10-141-3/+3
|\ \
| * | KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-10-081-3/+3
| |/
* | userns: Convert security/keys to the new userns infrastructureEric W. Biederman2012-09-131-2/+2
|/
* KEYS: Fix some sparse warningsDavid Howells2012-05-251-0/+2
* KEYS: Add invalidation supportDavid Howells2012-05-111-14/+11
* KEYS: Do LRU discard in full keyringsDavid Howells2012-05-111-7/+40
* KEYS: Permit in-place link replacement in keyring listDavid Howells2012-05-111-39/+56
OpenPOWER on IntegriCloud