summaryrefslogtreecommitdiffstats
path: root/kernel/module_signing.c
Commit message (Expand)AuthorAgeFilesLines
* modsign: use all trusted keys to verify module signatureKe Wu2018-11-071-1/+2
* modsign: log module name in the event of an errorJessica Yu2018-07-021-5/+7
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-1/+1
* PKCS#7: Make trust determination dependent on contents of trust keyringDavid Howells2016-04-061-1/+1
* KEYS: Generalise system_verify_data() to provide access to internal contentDavid Howells2016-04-061-2/+3
* X.509: Make algo identifiers text instead of enumDavid Howells2016-03-031-0/+6
* MODSIGN: linux/string.h should be #included to get memcpy()David Howells2016-03-011-0/+1
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-0/+1
* PKCS#7: Appropriately restrict authenticated attributes and content typeDavid Howells2015-08-121-1/+2
* MODSIGN: Extract the blob PKCS#7 signature verifier from module signingDavid Howells2015-08-071-43/+1
* MODSIGN: Use PKCS#7 messages as module signaturesDavid Howells2015-08-071-176/+44
* keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin2013-10-251-4/+4
* KEYS: Separate the kernel signature checking keyring from module signingDavid Howells2013-09-251-1/+2
* KEYS: Rename public key parameter name arraysDavid Howells2013-09-251-2/+2
* MODSIGN: Don't use enum-type bitfields in module signature info blockDavid Howells2012-12-051-7/+7
* module_signing: fix printk format warningRandy Dunlap2012-10-221-1/+1
* MODSIGN: Move the magic string to the end of a module and eliminate the searchDavid Howells2012-10-191-9/+15
* MODSIGN: Implement module signature checkingDavid Howells2012-10-101-1/+221
* module: signature checking hookRusty Russell2012-10-101-0/+23
OpenPOWER on IntegriCloud