KEYS: Fix up comments in key management code
Fix up comments in the key management code. No functional changes. Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
committed by
Linus Torvalds
parent
a8b17ed019
commit
973c9f4f49
@@ -1,4 +1,4 @@
|
||||
/* internal.h: authentication token and access key management internal defs
|
||||
/* Authentication token and access key management internal defs
|
||||
*
|
||||
* Copyright (C) 2003-5, 2007 Red Hat, Inc. All Rights Reserved.
|
||||
* Written by David Howells (dhowells@redhat.com)
|
||||
@@ -35,10 +35,12 @@ extern struct key_type key_type_user;
|
||||
|
||||
/*****************************************************************************/
|
||||
/*
|
||||
* keep track of keys for a user
|
||||
* - this needs to be separate to user_struct to avoid a refcount-loop
|
||||
* (user_struct pins some keyrings which pin this struct)
|
||||
* - this also keeps track of keys under request from userspace for this UID
|
||||
* Keep track of keys for a user.
|
||||
*
|
||||
* This needs to be separate to user_struct to avoid a refcount-loop
|
||||
* (user_struct pins some keyrings which pin this struct).
|
||||
*
|
||||
* We also keep track of keys under request from userspace for this UID here.
|
||||
*/
|
||||
struct key_user {
|
||||
struct rb_node node;
|
||||
@@ -62,7 +64,7 @@ extern struct key_user *key_user_lookup(uid_t uid,
|
||||
extern void key_user_put(struct key_user *user);
|
||||
|
||||
/*
|
||||
* key quota limits
|
||||
* Key quota limits.
|
||||
* - root has its own separate limits to everyone else
|
||||
*/
|
||||
extern unsigned key_quota_root_maxkeys;
|
||||
@@ -146,13 +148,13 @@ extern unsigned key_gc_delay;
|
||||
extern void keyring_gc(struct key *keyring, time_t limit);
|
||||
extern void key_schedule_gc(time_t expiry_at);
|
||||
|
||||
/*
|
||||
* check to see whether permission is granted to use a key in the desired way
|
||||
*/
|
||||
extern int key_task_permission(const key_ref_t key_ref,
|
||||
const struct cred *cred,
|
||||
key_perm_t perm);
|
||||
|
||||
/*
|
||||
* Check to see whether permission is granted to use a key in the desired way.
|
||||
*/
|
||||
static inline int key_permission(const key_ref_t key_ref, key_perm_t perm)
|
||||
{
|
||||
return key_task_permission(key_ref, current_cred(), perm);
|
||||
@@ -168,7 +170,7 @@ static inline int key_permission(const key_ref_t key_ref, key_perm_t perm)
|
||||
#define KEY_ALL 0x3f /* all the above permissions */
|
||||
|
||||
/*
|
||||
* request_key authorisation
|
||||
* Authorisation record for request_key().
|
||||
*/
|
||||
struct request_key_auth {
|
||||
struct key *target_key;
|
||||
@@ -188,7 +190,7 @@ extern struct key *request_key_auth_new(struct key *target,
|
||||
extern struct key *key_get_instantiation_authkey(key_serial_t target_id);
|
||||
|
||||
/*
|
||||
* keyctl functions
|
||||
* keyctl() functions
|
||||
*/
|
||||
extern long keyctl_get_keyring_ID(key_serial_t, int);
|
||||
extern long keyctl_join_session_keyring(const char __user *);
|
||||
@@ -214,7 +216,7 @@ extern long keyctl_get_security(key_serial_t keyid, char __user *buffer,
|
||||
extern long keyctl_session_to_parent(void);
|
||||
|
||||
/*
|
||||
* debugging key validation
|
||||
* Debugging key validation
|
||||
*/
|
||||
#ifdef KEY_DEBUGGING
|
||||
extern void __key_check(const struct key *);
|
||||
|
Reference in New Issue
Block a user