summaryrefslogtreecommitdiffstats
path: root/include/linux/key-type.h
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'keys-namespace-20190627' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2019-07-081-0/+3
|\
| * keys: Network namespace domain tagDavid Howells2019-06-261-0/+3
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-241-5/+1
|/
* keys: Fix dependency loop between construction record and auth keyDavid Howells2019-02-151-16/+6
* KEYS: Provide key type operations for asymmetric key ops [ver #2]David Howells2018-10-261-0/+11
* security: keys: Replace time_t with time64_t for struct key_preparsed_payloadBaolin Wang2017-11-151-1/+1
* randstruct: Mark various structs for randomizationKees Cook2017-06-301-2/+2
* KEYS: Add an optional lookup_restriction hook to key_typeMat Martineau2017-04-041-0/+8
* KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-1/+0
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-2/+1
* KEYS: Make the key matching functions return boolDavid Howells2014-09-161-4/+6
* KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-161-4/+0
* KEYS: Remove key_type::def_lookup_typeDavid Howells2014-09-161-3/+0
* KEYS: Preparse match dataDavid Howells2014-09-161-3/+28
* KEYS: Allow expiry time to be set when preparsing a keyDavid Howells2014-07-221-0/+1
* KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-221-1/+1
* KEYS: Provide a generic instantiation functionDavid Howells2014-07-181-0/+2
* KEYS: Add a 'trusted' flag and a 'trusted only' flagDavid Howells2013-09-251-0/+1
* KEYS: Introduce a search context structureDavid Howells2013-09-241-0/+5
* KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-10-081-2/+33
* KEYS: linux/key-type.h needs linux/errno.hDavid Howells2012-07-301-0/+1
* KEYS: Give key types their own lockdep class for key->semDavid Howells2011-11-171-0/+1
* KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells2011-03-081-1/+10
* KEYS: Add a key type op to permit the key description to be vettedDavid Howells2011-03-081-0/+3
* KEYS: Make request_key() and co fundamentally asynchronousDavid Howells2007-10-171-0/+112