android_kernel_xiaomi_sm8350/security/keys
Arun Raghavan 6b79ccb514 keys: allow clients to set key perms in key_create_or_update()
The key_create_or_update() function provided by the keyring code has a default
set of permissions that are always applied to the key when created.  This
might not be desirable to all clients.

Here's a patch that adds a "perm" parameter to the function to address this,
which can be set to KEY_PERM_UNDEF to revert to the current behaviour.

Signed-off-by: Arun Raghavan <arunsr@cse.iitk.ac.in>
Signed-off-by: David Howells <dhowells@redhat.com>
Cc: Satyam Sharma <ssatyam@cse.iitk.ac.in>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-04-29 08:06:16 -07:00
..
compat.c keys: add keyctl function to get a security label 2008-04-29 08:06:16 -07:00
internal.h keys: add keyctl function to get a security label 2008-04-29 08:06:16 -07:00
key.c keys: allow clients to set key perms in key_create_or_update() 2008-04-29 08:06:16 -07:00
keyctl.c keys: allow clients to set key perms in key_create_or_update() 2008-04-29 08:06:16 -07:00
keyring.c keys: check starting keyring as part of search 2008-04-29 08:06:16 -07:00
Makefile
permission.c
proc.c keys: switch to proc_create() 2008-04-29 08:06:16 -07:00
process_keys.c Convert ERR_PTR(PTR_ERR(p)) instances to ERR_CAST(p) 2008-02-07 08:42:26 -08:00
request_key_auth.c keys: allow the callout data to be passed as a blob rather than a string 2008-04-29 08:06:16 -07:00
request_key.c keys: allow the callout data to be passed as a blob rather than a string 2008-04-29 08:06:16 -07:00
user_defined.c