linux/include/keys
Mat Martineau aaf66c8838 KEYS: Split role of the keyring pointer for keyring restrict functions
The first argument to the restrict_link_func_t functions was a keyring
pointer. These functions are called by the key subsystem with this
argument set to the destination keyring, but restrict_link_by_signature
expects a pointer to the relevant trusted keyring.

Restrict functions may need something other than a single struct key
pointer to allow or reject key linkage, so the data used to make that
decision (such as the trust keyring) is moved to a new, fourth
argument. The first argument is now always the destination keyring.

Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
2017-04-03 10:24:56 -07:00
..
asymmetric-parser.h
asymmetric-subtype.h KEYS: Allow authentication data to be stored in an asymmetric key 2016-04-06 16:13:33 +01:00
asymmetric-type.h KEYS: Generalise x509_request_asymmetric_key() 2016-04-11 22:41:56 +01:00
big_key-type.h KEYS: big_key: Use key preparsing 2014-07-22 21:46:47 +01:00
ceph-type.h
dns_resolver-type.h
encrypted-type.h
keyring-type.h KEYS: Expand the capacity of a keyring 2013-09-24 10:35:18 +01:00
rxrpc-type.h KEYS: Strip trailing spaces 2016-06-14 10:29:44 +01:00
system_keyring.h KEYS: Split role of the keyring pointer for keyring restrict functions 2017-04-03 10:24:56 -07:00
trusted-type.h tpm: fix checks for policy digest existence in tpm2_seal_trusted() 2016-02-10 04:10:55 +02:00
user-type.h KEYS: Differentiate uses of rcu_dereference_key() and user_key_payload() 2017-03-02 10:09:00 +11:00