linux/security/keys
Dan Carpenter 5217660379 KEYS: Use memzero_explicit() for secret data
I don't think GCC has figured out how to optimize the memset() away, but
they might eventually so let's future proof this code a bit.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2017-02-10 12:43:51 +11:00
..
encrypted-keys KEYS: Use memzero_explicit() for secret data 2017-02-10 12:43:51 +11:00
big_key.c
compat.c
dh.c
gc.c
internal.h
Kconfig security/keys: make BIG_KEYS dependent on stdrng. 2016-10-27 16:03:33 +11:00
key.c
keyctl.c Replace <asm/uaccess.h> with <linux/uaccess.h> globally 2016-12-24 11:46:01 -08:00
keyring.c
Makefile
permission.c
persistent.c
proc.c
process_keys.c Replace <asm/uaccess.h> with <linux/uaccess.h> globally 2016-12-24 11:46:01 -08:00
request_key_auth.c Replace <asm/uaccess.h> with <linux/uaccess.h> globally 2016-12-24 11:46:01 -08:00
request_key.c
sysctl.c
trusted.c
trusted.h
user_defined.c Replace <asm/uaccess.h> with <linux/uaccess.h> globally 2016-12-24 11:46:01 -08:00