[PATCH] implement in-kernel keys & keyring management
The feature set the patch includes: - Key attributes: - Key type - Description (by which a key of a particular type can be selected) - Payload - UID, GID and permissions mask - Expiry time - Keyrings (just a type of key that holds links to other keys) - User-defined keys - Key revokation - Access controls - Per user key-count and key-memory consumption quota - Three std keyrings per task: per-thread, per-process, session - Two std keyrings per user: per-user and default-user-session - prctl() functions for key and keyring creation and management - Kernel interfaces for filesystem, blockdev, net stack access - JIT key creation by usermode helper There are also two utility programs available: (*) http://people.redhat.com/~dhowells/keys/keyctl.c A comprehensive key management tool, permitting all the interfaces available to userspace to be exercised. (*) http://people.redhat.com/~dhowells/keys/request-key An example shell script (to be installed in /sbin) for instantiating a key. Signed-Off-By: David Howells <dhowells@redhat.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Showing
Documentation/keys.txt
0 → 100644
This diff is collapsed.
include/linux/key-ui.h
0 → 100644
include/linux/key.h
0 → 100644
include/linux/keyctl.h
0 → 100644
security/keys/Makefile
0 → 100644
security/keys/internal.h
0 → 100644
security/keys/key.c
0 → 100644
This diff is collapsed.
security/keys/keyctl.c
0 → 100644
This diff is collapsed.
security/keys/keyring.c
0 → 100644
This diff is collapsed.
security/keys/proc.c
0 → 100644
security/keys/process_keys.c
0 → 100644
This diff is collapsed.
security/keys/request_key.c
0 → 100644
This diff is collapsed.
security/keys/user_defined.c
0 → 100644
This diff is collapsed.
Please register or sign in to comment