summaryrefslogtreecommitdiffstats
path: root/security/keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* KEYS: reject NULL restriction string when type is specifiedEric Biggers2017-12-081-14/+10
* security: keys: remove redundant assignment to key_refColin Ian King2017-12-081-1/+0
* KEYS: add missing permission check for request_key() destinationEric Biggers2017-12-081-9/+37
* KEYS: remove unnecessary get/put of explicit dest_keyringEric Biggers2017-12-081-2/+0
* Merge branch 'timers-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/...Linus Torvalds2017-11-251-2/+2
|\
| * treewide: Switch DEFINE_TIMER callbacks to struct timer_list *Kees Cook2017-11-221-2/+2
* | security: keys: Replace time_t with time64_t for struct key_preparsed_payloadBaolin Wang2017-11-151-4/+4
* | security: keys: Replace time_t/timespec with time64_tBaolin Wang2017-11-157-52/+43
|/
* Merge branch 'timers-core-for-linus' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2017-11-141-1/+1
|\
| * timer: Remove expires and data arguments from DEFINE_TIMERKees Cook2017-10-051-1/+1
* | Merge tag 'spdx_identifiers-4.14-rc8' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2017-11-024-0/+4
|\ \
| * | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-024-0/+4
* | | KEYS: trusted: fix writing past end of buffer in trusted_read()Eric Biggers2017-11-021-11/+12
* | | KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-021-20/+19
|/ /
* | KEYS: load key flags and expiry time atomically in proc_keys_show()Eric Biggers2017-10-181-10/+14
* | KEYS: Load key expiry time atomically in keyring_search_iterator()Eric Biggers2017-10-181-1/+3
* | KEYS: load key flags and expiry time atomically in key_validate()Eric Biggers2017-10-181-3/+4
* | KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-10-181-0/+10
* | KEYS: Fix race between updating and finding a negative keyDavid Howells2017-10-1812-39/+49
* | security/keys: BIG_KEY requires CONFIG_CRYPTOArnd Bergmann2017-10-181-0/+1
* | KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-10-121-0/+7
|/
* security/keys: rewrite all of big_key cryptoJason A. Donenfeld2017-09-262-71/+60
* security/keys: properly zero out sensitive key material in big_keyJason A. Donenfeld2017-09-261-6/+6
* KEYS: use kmemdup() in request_key_auth_new()Eric Biggers2017-09-251-3/+2
* KEYS: restrict /proc/keys by credentials at open timeEric Biggers2017-09-251-6/+2
* KEYS: reset parent each time before searching key_user_treeEric Biggers2017-09-251-2/+2
* KEYS: prevent KEYCTL_READ on negative keyEric Biggers2017-09-251-0/+5
* KEYS: prevent creating a different user's keyringsEric Biggers2017-09-254-12/+21
* KEYS: fix writing past end of user-supplied buffer in keyring_read()Eric Biggers2017-09-251-9/+5
* KEYS: fix key refcount leak in keyctl_read_key()Eric Biggers2017-09-251-1/+1
* KEYS: fix key refcount leak in keyctl_assume_authority()Eric Biggers2017-09-251-4/+2
* KEYS: don't revoke uninstantiated key in request_key_auth_new()Eric Biggers2017-09-251-1/+0
* KEYS: fix cred refcount leak in request_key_auth_new()Eric Biggers2017-09-251-37/+31
* fs: fix kernel_write prototypeChristoph Hellwig2017-09-051-1/+2
* fs: fix kernel_read prototypeChristoph Hellwig2017-09-051-1/+2
* Merge tag 'gcc-plugins-v4.13-rc2' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2017-07-191-1/+1
|\
| * randstruct: Mark various structs for randomizationKees Cook2017-06-301-1/+1
* | KEYS: DH: validate __spare fieldEric Biggers2017-07-142-0/+7
* | Merge tag 'docs-4.13' of git://git.lwn.net/linuxLinus Torvalds2017-07-045-5/+5
|\ \
| * | doc: ReSTify keys-trusted-encrypted.txtKees Cook2017-05-183-3/+3
| * | doc: ReSTify keys-request-key.txtKees Cook2017-05-182-2/+2
| |/
* | sched/wait: Split out the wait_bit*() APIs from <linux/wait.h> into <linux/wa...Ingo Molnar2017-06-201-0/+1
* | KEYS: fix refcount_inc() on zeroMark Rutland2017-06-091-7/+4
* | KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP APIMat Martineau2017-06-092-103/+171
* | KEYS: DH: ensure the KDF counter is properly alignedEric Biggers2017-06-091-13/+3
* | KEYS: DH: don't feed uninitialized "otherinfo" into KDFEric Biggers2017-06-091-1/+1
* | KEYS: DH: forbid using digest_null as the KDF hashEric Biggers2017-06-091-1/+11
* | KEYS: sanitize key structs before freeingEric Biggers2017-06-091-3/+1
* | KEYS: trusted: sanitize all key materialEric Biggers2017-06-091-28/+22
* | KEYS: encrypted: sanitize all key materialEric Biggers2017-06-091-18/+13