summaryrefslogtreecommitdiffstats
path: root/security/keys/trusted-keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* trusted-keys: match tpm_get_ops on all return pathsBen Boeckel2021-05-121-3/+3
* KEYS: trusted: Fix memory leak on object tdColin Ian King2021-05-121-3/+5
* Merge tag 'queue' of git://git.kernel.org/pub/scm/linux/kernel/git/jejb/tpmddLinus Torvalds2021-04-262-13/+16
|\
| * KEYS: trusted: fix TPM trusted keys for generic frameworkJames Bottomley2021-04-222-13/+16
* | Merge tag 'tpmdd-next-v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2021-04-266-327/+1035
|\|
| * KEYS: trusted: Fix missing null return from kzalloc callColin Ian King2021-04-141-2/+4
| * KEYS: trusted: Introduce TEE based Trusted KeysSumit Garg2021-04-143-0/+324
| * KEYS: trusted: Add generic trusted keys frameworkSumit Garg2021-04-143-297/+424
| * security: keys: trusted: Make sealed key properly interoperableJames Bottomley2021-04-141-15/+38
| * security: keys: trusted: use ASN.1 TPM2 key format for the blobsJames Bottomley2021-04-144-8/+218
| * security: keys: trusted: fix TPM2 authorizationsJames Bottomley2021-04-142-10/+32
* | KEYS: trusted: Fix TPM reservation for seal/unsealJames Bottomley2021-04-221-1/+1
|/
* KEYS: trusted: Reserve TPM for seal and unseal operationsJarkko Sakkinen2021-02-161-4/+18
* KEYS: trusted: Fix migratable=1 failingJarkko Sakkinen2021-02-161-1/+1
* KEYS: trusted: Fix incorrect handling of tpm_get_random()Jarkko Sakkinen2021-02-161-3/+17
* crypto: sha - split sha.h into sha1.h and sha2.hEric Biggers2020-11-201-1/+1
* mm, treewide: rename kzfree() to kfree_sensitive()Waiman Long2020-08-071-17/+17
* KEYS: Don't write out to userspace while holding key semaphoreWaiman Long2020-03-291-12/+2
* security: keys: trusted: fix lost handle flushJames Bottomley2019-12-171-0/+1
* KEYS: trusted: Remove set but not used variable 'keyhndl'zhengbin2019-11-121-2/+0
* KEYS: trusted: Move TPM2 trusted keys codeSumit Garg2019-11-123-2/+317
* KEYS: trusted: Create trusted keys subsystemSumit Garg2019-11-122-0/+1282