summaryrefslogtreecommitdiffstats
path: root/include/keys/system_keyring.h
Commit message (Expand)AuthorAgeFilesLines
* integrity: PowerVM support for loading third party code signing keysNayna Jain2023-08-171-0/+4
* KEYS: DigitalSignature link restrictionEric Snowberg2023-08-171-0/+10
* certs: Factor out the blacklist hash creationMickaël Salaün2022-05-231-3/+11
* KEYS: Introduce link restriction for machine keysEric Snowberg2022-03-081-0/+6
* KEYS: store reference to machine keyringEric Snowberg2022-03-081-0/+8
* Merge tag 'integrity-v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2021-05-011-0/+7
|\
| * ima: enable loading of build time generated key on .ima keyringNayna Jain2021-04-091-0/+7
* | certs: Add EFI_CERT_X509_GUID support for dbx entriesEric Snowberg2021-03-111-0/+15
|/
* certs: Add wrapper function to check blacklisted binary hashNayna Jain2019-11-121-0/+6
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-241-5/+1
* integrity, KEYS: add a reference to platform keyringKairui Song2019-02-041-0/+8
* KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau2017-04-031-2/+4
* KEYS: Add a system blacklist keyringDavid Howells2017-04-031-0/+12
* IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells2016-04-111-11/+2
* certs: Add a secondary system keyring that can be added to dynamicallyDavid Howells2016-04-111-0/+9
* KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-1/+0
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-12/+7
* KEYS: Generalise system_verify_data() to provide access to internal contentDavid Howells2016-04-061-6/+1
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+24
* PKCS#7: Appropriately restrict authenticated attributes and content typeDavid Howells2015-08-121-1/+3
* MODSIGN: Extract the blob PKCS#7 signature verifier from module signingDavid Howells2015-08-071-0/+5
* KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+9
* KEYS: Separate the kernel signature checking keyring from module signingDavid Howells2013-09-251-0/+23