1. a511e1a KEYS: Move the point of trust determination to __key_link() by David Howells · 8 years ago
  2. bda850c PKCS#7: Make trust determination dependent on contents of trust keyring by David Howells · 8 years ago
  3. e68503b KEYS: Generalise system_verify_data() to provide access to internal content by David Howells · 8 years ago
  4. 4e8ae72 X.509: Make algo identifiers text instead of enum by David Howells · 8 years ago
  5. 89053aa MODSIGN: linux/string.h should be #included to get memcpy() by David Howells · 8 years ago
  6. 146aa8b KEYS: Merge the type-specific data with the payload data by David Howells · 9 years ago
  7. 99db443 PKCS#7: Appropriately restrict authenticated attributes and content type by David Howells · 9 years ago
  8. 091f6e2 MODSIGN: Extract the blob PKCS#7 signature verifier from module signing by David Howells · 9 years ago
  9. 3f1e1be MODSIGN: Use PKCS#7 messages as module signatures by David Howells · 9 years ago
  10. 3fe78ca keys: change asymmetric keys to use common hash definitions by Dmitry Kasatkin · 11 years ago
  11. b56e5a1 KEYS: Separate the kernel signature checking keyring from module signing by David Howells · 11 years ago
  12. 9abc4e6 KEYS: Rename public key parameter name arrays by David Howells · 11 years ago
  13. 12e130b MODSIGN: Don't use enum-type bitfields in module signature info block by David Howells · 12 years ago
  14. 0390c88 module_signing: fix printk format warning by Randy Dunlap · 12 years ago
  15. caabe24 MODSIGN: Move the magic string to the end of a module and eliminate the search by David Howells · 12 years ago
  16. 48ba246 MODSIGN: Implement module signature checking by David Howells · 12 years ago
  17. 106a4ee module: signature checking hook by Rusty Russell · 12 years ago