summaryrefslogtreecommitdiff
path: root/certs/Kconfig
AgeCommit message (Expand)AuthorFilesLines
2023-11-02Merge tag 'v6.7-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/...Linus Torvalds1-2/+4
2023-10-31certs: Only allow certs signed by keys on the builtin keyringMimi Zohar1-1/+15
2023-10-27module: enable automatic module signing with FIPS 202 SHA-3Dimitri John Ledkov1-1/+1
2023-10-20certs: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512Dimitri John Ledkov1-2/+4
2022-09-24certs: make system keyring depend on built-in x509 parserMasahiro Yamada1-1/+1
2022-07-24certs: make system keyring depend on x509 parserAdam Borowski1-0/+1
2022-05-23certs: Allow root user to append signed hashes to the blacklist keyringMickaël Salaün1-0/+10
2022-05-23certs: Check that builtin blacklist hashes are validMickaël Salaün1-2/+5
2021-12-11certs: move the 'depends on' to the choice of module signing keysMasahiro Yamada1-3/+1
2021-08-23certs: Add support for using elliptic curve keys for signing modulesStefan Berger1-0/+26
2021-05-01Merge tag 'integrity-v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-1/+1
2021-04-26ima: ensure IMA_APPRAISE_MODSIG has necessary dependenciesNayna Jain1-1/+1
2021-04-09ima: enable signing of modules with build time generated keyNayna Jain1-1/+1
2021-03-11certs: Add ability to preload revocation certsEric Snowberg1-0/+8
2021-03-11certs: Add EFI_CERT_X509_GUID support for dbx entriesEric Snowberg1-0/+9
2018-06-15docs: Fix some broken referencesMauro Carvalho Chehab1-1/+1
2017-11-02License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman1-0/+1
2017-04-03KEYS: Add a system blacklist keyringDavid Howells1-0/+18
2016-04-11certs: Add a secondary system keyring that can be added to dynamicallyDavid Howells1-0/+8
2016-04-11KEYS: Make the system trusted keyring depend on the asymmetric key typeDavid Howells1-0/+1
2016-02-26KEYS: Reserve an extra certificate symbol for inserting without recompilingMehmet Kayaalp1-0/+16
2015-08-14Move certificate handling to its own directoryDavid Howells1-0/+42