summaryrefslogtreecommitdiff
path: root/include/linux/key.h
Commit message (Expand)AuthorAgeFilesLines
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-19/+14
* Merge branch 'keys-fixes' into keys-nextDavid Howells2014-07-221-0/+1
|\
| * KEYS: Allow special keys (eg. DNS results) to be invalidated by CAP_SYS_ADMINDavid Howells2014-07-171-0/+1
* | KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-0/+1
|/
* Merge branch 'serge-next-1' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2014-06-101-0/+11
|\
| * KEYS: Move the flags representing required permission to linux/key.hDavid Howells2014-03-141-0/+11
* | key: convert use of typedef ctl_table to struct ctl_tableJoe Perches2014-06-061-1/+1
|/
* KEYS: Add a 'trusted' flag and a 'trusted only' flagDavid Howells2013-09-251-0/+3
* KEYS: Implement a big key type that can save to tmpfsDavid Howells2013-09-241-0/+1
* KEYS: Expand the capacity of a keyringDavid Howells2013-09-241-5/+8
* KEYS: Define a __key_get() wrapper to use rather than atomic_inc()David Howells2013-09-241-3/+7
* KEYS: Consolidate the concept of an 'index key' for key accessDavid Howells2013-09-241-5/+16
* KEYS: Use bool in make_key_ref() and is_key_possessed()David Howells2013-09-241-2/+2
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2012-12-161-0/+1
|\
| * KEYS: Reduce initial permissions on keysDavid Howells2012-10-021-0/+1
* | userns: Convert security/keys to the new userns infrastructureEric W. Biederman2012-09-131-4/+5
|/
* key: Remove extraneous parentheses from rcu_assign_keypointer()Paul E. McKenney2012-07-021-1/+3
* keys: kill the dummy key_replace_session_keyring()Oleg Nesterov2012-05-231-2/+0
* keys: change keyctl_session_to_parent() to use task_work_add()Oleg Nesterov2012-05-231-4/+2
* KEYS: Don't check for NULL key pointer in key_validate()David Howells2012-05-161-1/+1
* KEYS: Add invalidation supportDavid Howells2012-05-111-0/+3
* KEYS: Do LRU discard in full keyringsDavid Howells2012-05-111-0/+1
* KEYS: Perform RCU synchronisation on keys prior to key destructionDavid Howells2012-05-111-1/+4
* Merge tag 'nfs-for-3.4-1' of git://git.linux-nfs.org/projects/trondmy/linux-nfsLinus Torvalds2012-03-231-0/+2
|\
| * Created a function for setting timeouts on keysBryan Schumaker2012-03-011-0/+2
* | Merge branch 'next-queue' into nextJames Morris2012-02-091-0/+1
|\ \ | |/ |/|
| * KEYS: Allow special keyrings to be clearedDavid Howells2012-01-191-0/+1
* | KEYS: Permit key_serial() to be called with a const key pointerDavid Howells2012-01-191-1/+1
* | keys: fix trusted/encrypted keys sparse rcu_assign_pointer messagesMimi Zohar2012-01-181-0/+3
|/
* atomic: use <linux/atomic.h>Arun Sharma2011-07-261-1/+1
* Merge branch 'docs-move' of git://git.kernel.org/pub/scm/linux/kernel/git/rdu...Linus Torvalds2011-05-271-1/+1
|\
| * Create Documentation/security/,Randy Dunlap2011-05-191-1/+1
* | KEYS: Improve /proc/keysDavid Howells2011-03-171-0/+13
|/
* KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells2011-03-081-0/+1
* KEYS: Add an RCU payload dereference macroDavid Howells2011-03-081-0/+4
* keys: __rcu annotationsArnd Bergmann2010-08-191-1/+2
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+3
* KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]David Howells2009-09-021-1/+4
* kmemtrace, security: fix linux/key.h header file dependenciesPekka Enberg2009-04-031-0/+1
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-2/+0
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-18/+4
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-141-6/+2
* KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-141-8/+8
* add key_revoke() dummy for KEYS=nAdrian Bunk2008-10-121-0/+1
* keys: make key_serial() a function if CONFIG_KEYS=yDavid Howells2008-04-291-1/+4
* keys: make the keyring quotas controllable through /proc/sysDavid Howells2008-04-291-0/+5
* keys: don't generate user and user session keyrings unless they're accessedDavid Howells2008-04-291-8/+0
* keys: allow clients to set key perms in key_create_or_update()Arun Raghavan2008-04-291-0/+3
* keys: allow the callout data to be passed as a blob rather than a stringDavid Howells2008-04-291-3/+6
* KEYS: fix macroSebastian Siewior2008-01-081-1/+1