summaryrefslogtreecommitdiffstats
path: root/include/keys
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'keys-request-20190626' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2019-07-081-0/+1
|\
| * keys: Move the RCU locks outwards from the keyring search functionsDavid Howells2019-06-191-0/+1
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-052-8/+2
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner2019-05-305-25/+5
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-245-25/+5
|/
* KEYS: trusted: fix -Wvarags warningndesaulniers@google.com2019-04-081-1/+1
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-101-0/+8
|\
| * integrity, KEYS: add a reference to platform keyringKairui Song2019-02-041-0/+8
* | KEYS: user: Align the payload bufferEric Biggers2019-02-221-1/+1
* | keys: Fix dependency loop between construction record and auth keyDavid Howells2019-02-151-0/+36
|/
* KEYS: Move trusted.h to include/keys [ver #2]Denis Kenzior2018-10-261-0/+136
* KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]David Howells2018-10-261-0/+9
* docs: Fix some broken referencesMauro Carvalho Chehab2018-06-152-2/+2
* License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-021-0/+1
* net: rxrpc: Replace time_t type with time64_t typeBaolin Wang2017-08-291-0/+23
* KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau2017-04-031-2/+4
* KEYS: Add a system blacklist keyringDavid Howells2017-04-031-0/+12
* KEYS: Differentiate uses of rcu_dereference_key() and user_key_payload()David Howells2017-03-021-2/+7
* KEYS: Strip trailing spacesDavid Howells2016-06-141-1/+1
* IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells2016-04-111-11/+2
* certs: Add a secondary system keyring that can be added to dynamicallyDavid Howells2016-04-111-0/+9
* KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-1/+0
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-12/+7
* KEYS: Generalise x509_request_asymmetric_key()David Howells2016-04-111-4/+4
* KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells2016-04-111-0/+5
* KEYS: Generalise system_verify_data() to provide access to internal contentDavid Howells2016-04-062-6/+2
* KEYS: Allow authentication data to be stored in an asymmetric keyDavid Howells2016-04-062-4/+5
* tpm: fix checks for policy digest existence in tpm2_seal_trusted()Jarkko Sakkinen2016-02-101-1/+1
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2015-12-261-0/+24
|\
| * IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+24
* | keys, trusted: seal with a TPM2 authorization policyJarkko Sakkinen2015-12-201-0/+4
* | keys, trusted: select hash algorithm for TPM2 chipsJarkko Sakkinen2015-12-201-0/+1
|/
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-213-1/+24
* tpm: seal/unseal for TPM 2.0Jarkko Sakkinen2015-10-191-1/+1
* keys, trusted: move struct trusted_key_options to trusted-type.hJarkko Sakkinen2015-10-191-0/+12
* PKCS#7: Appropriately restrict authenticated attributes and content typeDavid Howells2015-08-121-1/+3
* MODSIGN: Extract the blob PKCS#7 signature verifier from module signingDavid Howells2015-08-071-0/+5
* KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-061-0/+3
* KEYS: Implement binary asymmetric key ID handlingDavid Howells2014-09-161-0/+38
* KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-161-3/+0
* KEYS: Preparse match dataDavid Howells2014-09-161-1/+3
* Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-221-1/+9
|\
| * KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+9
* | KEYS: big_key: Use key preparsingDavid Howells2014-07-221-1/+2
* | KEYS: user: Use key preparsingDavid Howells2014-07-221-1/+2
|/
* KEYS: Separate the kernel signature checking keyring from module signingDavid Howells2013-09-251-0/+23
* KEYS: Implement a big key type that can save to tmpfsDavid Howells2013-09-241-0/+25
* KEYS: Expand the capacity of a keyringDavid Howells2013-09-241-15/+2
* KEYS: Asymmetric key pluggable data parsersDavid Howells2012-10-081-0/+37
* KEYS: Implement asymmetric key typeDavid Howells2012-10-082-0/+80
OpenPOWER on IntegriCloud