1. 2b6aa41 KEYS: Use structure to capture key restriction function and data by Mat Martineau · 8 years ago
  2. aaf66c8 KEYS: Split role of the keyring pointer for keyring restrict functions by Mat Martineau · 8 years ago
  3. d3bfe84 certs: Add a secondary system keyring that can be added to dynamically by David Howells · 9 years ago
  4. 77f68ba KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTED by David Howells · 9 years ago
  5. a511e1a KEYS: Move the point of trust determination to __key_link() by David Howells · 9 years ago
  6. 5ac7eac KEYS: Add a facility to restrict new links into a keyring by David Howells · 9 years ago
  7. bda850c PKCS#7: Make trust determination dependent on contents of trust keyring by David Howells · 9 years ago
  8. e68503b KEYS: Generalise system_verify_data() to provide access to internal content by David Howells · 9 years ago
  9. 5d2787c KEYS: Add an alloc flag to convey the builtinness of a key by David Howells · 9 years ago
  10. cfc411e Move certificate handling to its own directory by David Howells · 9 years ago[Renamed from kernel/system_keyring.c]
  11. 99db443 PKCS#7: Appropriately restrict authenticated attributes and content type by David Howells · 9 years ago
  12. 091f6e2 MODSIGN: Extract the blob PKCS#7 signature verifier from module signing by David Howells · 9 years ago
  13. 1c39449 system_keyring.c doesn't need to #include module-internal.h by David Howells · 9 years ago
  14. 32c4741 KEYS: validate certificate trust only with builtin keys by Dmitry Kasatkin · 11 years ago
  15. 6222698 KEYS: correct alignment of system_certificate_list content in assembly file by Hendrik Brueckner · 11 years ago
  16. af34cb0 KEYS: Make the system 'trusted' keyring viewable by userspace by Mimi Zohar · 11 years ago
  17. 008643b KEYS: Add a 'trusted' flag and a 'trusted only' flag by David Howells · 11 years ago
  18. b56e5a1 KEYS: Separate the kernel signature checking keyring from module signing by David Howells · 11 years ago