summaryrefslogtreecommitdiffstats
path: root/include/keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* tpm: fix checks for policy digest existence in tpm2_seal_trusted()Jarkko Sakkinen2016-02-101-1/+1
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2015-12-261-0/+24
|\
| * IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+24
* | keys, trusted: seal with a TPM2 authorization policyJarkko Sakkinen2015-12-201-0/+4
* | keys, trusted: select hash algorithm for TPM2 chipsJarkko Sakkinen2015-12-201-0/+1
|/
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-213-1/+24
* tpm: seal/unseal for TPM 2.0Jarkko Sakkinen2015-10-191-1/+1
* keys, trusted: move struct trusted_key_options to trusted-type.hJarkko Sakkinen2015-10-191-0/+12
* PKCS#7: Appropriately restrict authenticated attributes and content typeDavid Howells2015-08-121-1/+3
* MODSIGN: Extract the blob PKCS#7 signature verifier from module signingDavid Howells2015-08-071-0/+5
* KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-061-0/+3
* KEYS: Implement binary asymmetric key ID handlingDavid Howells2014-09-161-0/+38
* KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-161-3/+0
* KEYS: Preparse match dataDavid Howells2014-09-161-1/+3
* Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-221-1/+9
|\
| * KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+9
* | KEYS: big_key: Use key preparsingDavid Howells2014-07-221-1/+2
* | KEYS: user: Use key preparsingDavid Howells2014-07-221-1/+2
|/
* KEYS: Separate the kernel signature checking keyring from module signingDavid Howells2013-09-251-0/+23
* KEYS: Implement a big key type that can save to tmpfsDavid Howells2013-09-241-0/+25
* KEYS: Expand the capacity of a keyringDavid Howells2013-09-241-15/+2
* KEYS: Asymmetric key pluggable data parsersDavid Howells2012-10-081-0/+37
* KEYS: Implement asymmetric key typeDavid Howells2012-10-082-0/+80
* KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-10-081-2/+4
* KEYS: Permit in-place link replacement in keyring listDavid Howells2012-05-111-1/+1
* keys: add a "logon" key typeJeff Layton2012-01-181-1/+2
* encrypted-keys: add key format supportRoberto Sassu2011-06-271-2/+11
* libceph: Create a new key type "ceph".Tommi Virtanen2011-03-291-0/+8
* RxRPC: Fix v1 keysAnton Blanchard2011-03-031-1/+0
* keys: add new key-type encryptedMimi Zohar2010-11-281-0/+29
* keys: add new trusted key-typeMimi Zohar2010-11-281-0/+31
* DNS: Separate out CIFS DNS Resolver codeWang Lei2010-08-051-0/+23
* RxRPC: Use uX/sX rather than uintX_t/intX_t typesDavid Howells2009-09-161-10/+10
* RxRPC: Parse security index 5 keys (Kerberos 5)David Howells2009-09-151-0/+52
* RxRPC: Allow key payloads to be passed in XDR formDavid Howells2009-09-151-0/+55
* KEYS: Disperse linux/key_ui.hDavid Howells2008-11-141-0/+31
* KEYS: Fix the comment to match the file name in rxrpc-type.h.Robert P. J. Day2008-04-221-1/+1
* KEYS: Make request_key() and co fundamentally asynchronousDavid Howells2007-10-171-0/+2
* [AF_RXRPC]: Provide secure RxRPC sockets for use by userspace and kernel bothDavid Howells2007-04-271-0/+22
* [PATCH] keys: discard the contents of a key on revocationDavid Howells2006-06-261-0/+1
* [PATCH] Keys: Remove key duplicationDavid Howells2006-01-061-1/+0
* [PATCH] Keys: Export user-defined keyring operationsDavid Howells2005-10-311-0/+47