summaryrefslogtreecommitdiffstats
path: root/security/keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2011-07-285-53/+313
|\
| * Merge branch 'linus' into nextJames Morris2011-06-301-3/+3
| |\
| * | encrypted-keys: add ecryptfs format supportRoberto Sassu2011-06-274-8/+180
| * | encrypted-keys: add key format supportRoberto Sassu2011-06-271-40/+101
| * | encrypted-keys: added additional debug messagesRoberto Sassu2011-06-271-11/+34
| * | encrypted-keys: fixed valid_master_desc() function descriptionRoberto Sassu2011-06-271-1/+1
| * | encrypted_keys: avoid dumping the master key if the request failsRoberto Sassu2011-06-271-3/+5
| * | KEYS: Don't return EAGAIN to keyctl_assume_authority()David Howells2011-06-141-0/+2
* | | Merge branch 'master' into for-nextJiri Kosina2011-07-111-3/+3
|\ \ \ | | |/ | |/|
| * | KEYS: Fix error handling in construct_key_and_link()David Howells2011-06-221-1/+2
| * | KEYS/DNS: Fix ____call_usermodehelper() to not lose the session keyringDavid Howells2011-06-171-2/+1
| |/
* / rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko2011-07-081-1/+0
|/
* Merge branch 'docs-move' of git://git.kernel.org/pub/scm/linux/kernel/git/rdu...Linus Torvalds2011-05-274-4/+4
|\
| * Create Documentation/security/,Randy Dunlap2011-05-204-4/+4
* | Set cred->user_ns in key_replace_session_keyringSerge E. Hallyn2011-05-261-0/+1
* | Merge branch 'next' into for-linusJames Morris2011-05-248-25/+46
|\ \
| * | KEYS: Make request_key() and co. return an error for a negative keyDavid Howells2011-03-171-0/+6
| * | KEYS: Improve /proc/keysDavid Howells2011-03-177-25/+40
| |/
* / security,rcu: convert call_rcu(user_update_rcu_disposal) to kfree_rcu()Lai Jiangshan2011-05-081-14/+2
|/
* KEYS: Add an iovec version of KEYCTL_INSTANTIATEDavid Howells2011-03-083-7/+150
* KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells2011-03-086-13/+56
* KEYS: Add a key type op to permit the key description to be vettedDavid Howells2011-03-081-0/+8
* KEYS: Add an RCU payload dereference macroDavid Howells2011-03-083-6/+3
* KEYS: Fix __key_link_end() quota fixup on errorDavid Howells2011-01-254-20/+27
* trusted keys: Fix a memory leak in trusted_update().Jesper Juhl2011-01-241-0/+1
* encrypted-keys: rename encrypted_defined files to encryptedMimi Zohar2011-01-243-2/+3
* trusted-keys: rename trusted_defined files to trustedMimi Zohar2011-01-243-2/+2
* KEYS: Fix up comments in key management codeDavid Howells2011-01-2111-366/+777
* KEYS: Do some style cleanup in the key management code.David Howells2011-01-2110-248/+80
* trusted-keys: avoid scattring va_end()Tetsuo Handa2011-01-181-17/+13
* trusted-keys: check for NULL before using itTetsuo Handa2011-01-181-0/+5
* trusted-keys: another free memory bugfixTetsuo Handa2011-01-181-3/+5
* trusted-keys: free memory bugfixMimi Zohar2011-01-141-5/+7
* Merge branch 'master' into nextJames Morris2011-01-091-1/+0
|\
| * KEYS: Don't call up_write() if __key_link_begin() returns an errorDavid Howells2010-12-241-1/+0
* | encrypted-keys: style and other cleanupMimi Zohar2010-12-152-37/+29
* | encrypted-keys: verify datablob size before converting to binaryMimi Zohar2010-12-151-14/+15
* | trusted-keys: kzalloc and other cleanupMimi Zohar2010-12-151-18/+16
* | trusted-keys: additional TSS return code and other error handlingMimi Zohar2010-12-151-62/+87
* | keys: add missing include file for trusted and encrypted keysMimi Zohar2010-11-292-0/+2
* | keys: add new key-type encryptedMimi Zohar2010-11-283-0/+964
* | keys: add new trusted key-typeMimi Zohar2010-11-283-0/+1286
|/
* Fix install_process_keyring error handlingAndi Kleen2010-10-281-1/+1
* KEYS: Fix bug in keyctl_session_to_parent() if parent has no session keyringDavid Howells2010-09-101-1/+2
* KEYS: Fix RCU no-lock warning in keyctl_session_to_parent()David Howells2010-09-101-0/+3
* Add a dummy printk function for the maintenance of unused printksDavid Howells2010-08-121-5/+0
* KEYS: request_key() should return -ENOKEY if the constructed key is negativeDavid Howells2010-08-061-0/+2
* KEYS: Reinstate lost passing of process keyring ID in call_sbin_request_key()Justin P. Mattock2010-08-021-0/+1
* KEYS: Use the variable 'key' in keyctl_describe_key()David Howells2010-08-021-7/+5
* KEYS: Make /proc/keys check to see if a key is possessed before security checkDavid Howells2010-08-023-23/+66