index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
integrity
/
digsig.c
Age
Commit message (
Expand
)
Author
Files
Lines
2019-08-06
ima: Implement support for module-style appended signatures
Thiago Jung Bauermann
1
-9
/
+34
2019-07-11
Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...
Linus Torvalds
1
-13
/
+18
2019-07-09
Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...
Linus Torvalds
1
-2
/
+3
2019-07-09
Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/gi...
Linus Torvalds
1
-18
/
+13
2019-06-28
keys: Replace uid/gid/perm permissions checking with an ACL
David Howells
1
-18
/
+13
2019-06-17
integrity: Fix __integrity_init_keyring() section mismatch
Geert Uytterhoeven
1
-2
/
+3
2019-06-05
treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441
Thomas Gleixner
1
-5
/
+1
2019-02-05
integrity, KEYS: add a reference to platform keyring
Kairui Song
1
-0
/
+3
2018-12-18
integrity: Remove references to module keyring
Thiago Jung Bauermann
1
-1
/
+0
2018-12-13
integrity: Load certs to the platform keyring
Nayna Jain
1
-24
/
+43
2018-12-13
integrity: Define a trusted platform keyring
Nayna Jain
1
-15
/
+32
2018-10-10
security/integrity: remove unnecessary 'init_keyring' variable
Eric Biggers
1
-7
/
+1
2018-10-10
security/integrity: constify some read-only data
Eric Biggers
1
-1
/
+1
2018-02-23
integrity/security: fix digsig.c build error with header file
Randy Dunlap
1
-0
/
+1
2017-11-08
integrity: use kernel_read_file_from_path() to read x509 certs
Christoph Hellwig
1
-5
/
+9
2017-04-05
KEYS: Use structure to capture key restriction function and data
Mat Martineau
1
-1
/
+8
2016-11-14
security/integrity: Harden against malformed xattrs
Seth Forshee
1
-1
/
+1
2016-04-12
IMA: Use the the system trusted keyrings instead of .ima_mok
David Howells
1
-26
/
+4
2016-04-12
KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTED
David Howells
1
-2
/
+1
2016-04-12
KEYS: Move the point of trust determination to __key_link()
David Howells
1
-1
/
+32
2016-04-12
KEYS: Add a facility to restrict new links into a keyring
David Howells
1
-4
/
+3
2015-11-23
integrity: define '.evm' as a builtin 'trusted' keyring
Dmitry Kasatkin
1
-2
/
+12
2015-10-09
integrity: prevent loading untrusted certificates on the IMA trusted keyring
Dmitry Kasatkin
1
-1
/
+1
2015-05-21
integrity: add validity checks for 'path' parameter
Dmitry Kasatkin
1
-1
/
+1
2014-11-18
integrity: provide a function to load x509 certificate from the kernel
Dmitry Kasatkin
1
-1
/
+35
2014-10-07
integrity: add missing '__init' keyword for integrity_init_keyring()
Dmitry Kasatkin
1
-1
/
+1
2014-07-17
ima: define '.ima' as a builtin 'trusted' keyring
Mimi Zohar
1
-0
/
+28
2013-11-24
Revert "ima: define '_ima' as a builtin 'trusted' keyring"
Linus Torvalds
1
-29
/
+1
2013-11-01
ima: define '_ima' as a builtin 'trusted' keyring
Mimi Zohar
1
-1
/
+29
2013-10-26
ima: pass full xattr with the signature
Dmitry Kasatkin
1
-2
/
+3
2013-10-25
ima: fix script messages
Dmitry Kasatkin
1
-1
/
+1
2013-02-07
ima: digital signature verification using asymmetric keys
Dmitry Kasatkin
1
-1
/
+10
2011-11-09
integrity: digital signature verification using multiple keyrings
Dmitry Kasatkin
1
-0
/
+48