Searched hist:"8607 c501" (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/security/integrity/ |
H A D | Kconfig | 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings
Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs.
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com> 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
|
H A D | Makefile | 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings
Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs.
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com> 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
|
H A D | digsig.c | 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings
Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs.
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com> 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
|
H A D | integrity.h | 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings
Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs.
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com> 8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings Define separate keyrings for each of the different use cases - evm, ima, and modules. Using different keyrings improves search performance, and also allows "locking" specific keyring to prevent adding new keys. This is useful for evm and module keyrings, when keys are usually only added from initramfs. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
|