<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/keys/encrypted-keys, branch v3.4.22</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/keys/encrypted-keys?h=v3.4.22</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/keys/encrypted-keys?h=v3.4.22'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-01-17T23:41:30Z</updated>
<entry>
<title>encrypted-keys: fix rcu and sparse messages</title>
<updated>2012-01-17T23:41:30Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2012-01-17T20:40:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6ac6172a935d1faf7ef259802267657bc0007a62'/>
<id>urn:sha1:6ac6172a935d1faf7ef259802267657bc0007a62</id>
<content type='text'>
Enabling CONFIG_PROVE_RCU and CONFIG_SPARSE_RCU_POINTER resulted in
"suspicious rcu_dereference_check() usage!" and "incompatible types
in comparison expression (different address spaces)" messages.

Access the masterkey directly when holding the rwsem.

Changelog v1:
- Use either rcu_read_lock()/rcu_derefence_key()/rcu_read_unlock()
or remove the unnecessary rcu_derefence() - David Howells

Reported-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>keys: fix trusted/encrypted keys sparse rcu_assign_pointer messages</title>
<updated>2012-01-17T23:41:29Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2012-01-17T20:39:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ee0b31a25a010116f44fca6c96f4516d417793dd'/>
<id>urn:sha1:ee0b31a25a010116f44fca6c96f4516d417793dd</id>
<content type='text'>
Define rcu_assign_keypointer(), which uses the key payload.rcudata instead
of payload.data, to resolve the CONFIG_SPARSE_RCU_POINTER message:
"incompatible types in comparison expression (different address spaces)"

Replace the rcu_assign_pointer() calls in encrypted/trusted keys with
rcu_assign_keypointer().

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: module build fixes</title>
<updated>2011-11-16T19:23:14Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-10-16T23:17:48Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9c69898783a0121399ec078d40d4ccc00e3cb0df'/>
<id>urn:sha1:9c69898783a0121399ec078d40d4ccc00e3cb0df</id>
<content type='text'>
Encrypted keys are encrypted/decrypted using either a trusted or
user-defined key type, which is referred to as the 'master' key.
The master key may be of type trusted iff the trusted key is
builtin or both the trusted key and encrypted keys are built as
modules.  This patch resolves the build dependency problem.

- Use "masterkey-$(CONFIG_TRUSTED_KEYS)-$(CONFIG_ENCRYPTED_KEYS)" construct
to encapsulate the above logic. (Suggested by Dimtry Kasatkin.)
- Fixing the encrypted-keys Makefile, results in a module name change
from encrypted.ko to encrypted-keys.ko.
- Add module dependency for request_trusted_key() definition

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: fix error return code</title>
<updated>2011-11-16T19:23:13Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-10-24T12:17:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f4a0d5abef14562c37dee5a1d49180f494106230'/>
<id>urn:sha1:f4a0d5abef14562c37dee5a1d49180f494106230</id>
<content type='text'>
Fix request_master_key() error return code.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>security: follow rename pack_hex_byte() to hex_byte_pack()</title>
<updated>2011-11-01T00:30:56Z</updated>
<author>
<name>Andy Shevchenko</name>
<email>andriy.shevchenko@linux.intel.com</email>
</author>
<published>2011-11-01T00:12:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=02473119bc54b0b239c2501064c7a37314347f87'/>
<id>urn:sha1:02473119bc54b0b239c2501064c7a37314347f87</id>
<content type='text'>
There is no functional change.

Signed-off-by: Andy Shevchenko &lt;andriy.shevchenko@linux.intel.com&gt;
Cc: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Cc: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: check hex2bin result</title>
<updated>2011-09-21T03:26:44Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-09-20T15:23:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2b3ff6319e2312656fbefe0209bef02d58b6836a'/>
<id>urn:sha1:2b3ff6319e2312656fbefe0209bef02d58b6836a</id>
<content type='text'>
For each hex2bin call in encrypted keys, check that the ascii hex string
is valid.  On failure, return -EINVAL.

Changelog v1:
- hex2bin now returns an int

Signed-off-by: Mimi Zohar &lt;zohar@linux.vnet.ibm.com&gt;
Acked-by: Andy Shevchenko &lt;andy.shevchenko@gmail.com&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: IS_ERR need include/err.h</title>
<updated>2011-09-15T21:37:24Z</updated>
<author>
<name>Stephen Rothwell</name>
<email>sfr@canb.auug.org.au</email>
</author>
<published>2011-09-15T07:07:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=cc100551b4d92f47abebfa7c7918b2be71263b4a'/>
<id>urn:sha1:cc100551b4d92f47abebfa7c7918b2be71263b4a</id>
<content type='text'>
Fixes this build error:

security/keys/encrypted-keys/masterkey_trusted.c: In function 'request_trusted_key':
security/keys/encrypted-keys/masterkey_trusted.c:35:2: error: implicit declaration of function 'IS_ERR'

Signed-off-by: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;
Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: remove trusted-keys dependency</title>
<updated>2011-09-14T19:23:49Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-08-28T02:21:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=982e617a313b57abee3bcfa53381c356d00fd64a'/>
<id>urn:sha1:982e617a313b57abee3bcfa53381c356d00fd64a</id>
<content type='text'>
Encrypted keys are decrypted/encrypted using either a trusted-key or,
for those systems without a TPM, a user-defined key.  This patch
removes the trusted-keys and TCG_TPM dependencies.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>encrypted-keys: create encrypted-keys directory</title>
<updated>2011-09-14T19:22:26Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-09-14T19:06:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=61cf45d0199041df1a8ba334b6bf4a3a13b7f904'/>
<id>urn:sha1:61cf45d0199041df1a8ba334b6bf4a3a13b7f904</id>
<content type='text'>
Move all files associated with encrypted keys to keys/encrypted-keys.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
</feed>
