summaryrefslogtreecommitdiffstats
path: root/certs
diff options
context:
space:
mode:
authorMatthew Garrett <mjg59@google.com>2017-10-11 21:10:14 +0200
committerMimi Zohar <zohar@linux.vnet.ibm.com>2017-11-08 21:16:36 +0100
commitf00d79750712511d0a83c108eea0d44b680a915f (patch)
treef0bdb9499c9e6b7bb7c37ace6b70d25bc5035ac5 /certs
parentEVM: Include security.apparmor in EVM measurements (diff)
downloadlinux-f00d79750712511d0a83c108eea0d44b680a915f.tar.xz
linux-f00d79750712511d0a83c108eea0d44b680a915f.zip
EVM: Allow userspace to signal an RSA key has been loaded
EVM will only perform validation once a key has been loaded. This key may either be a symmetric trusted key (for HMAC validation and creation) or the public half of an asymmetric key (for digital signature validation). The /sys/kernel/security/evm interface allows userland to signal that a symmetric key has been loaded, but does not allow userland to signal that an asymmetric public key has been loaded. This patch extends the interface to permit userspace to pass a bitmask of loaded key types. It also allows userspace to block loading of a symmetric key in order to avoid a compromised system from being able to load an additional key type later. Signed-off-by: Matthew Garrett <mjg59@google.com> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'certs')
0 files changed, 0 insertions, 0 deletions