Home
last modified time | relevance | path

Searched hist:"8607 c501" (Results 1 – 4 of 4) sorted by relevance

/openbmc/linux/security/integrity/
H A DKconfig8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
H A DMakefile8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
H A Ddigsig.c8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
H A Dintegrity.h8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
8607c501 Wed Oct 05 03:54:46 CDT 2011 Dmitry Kasatkin <dmitry.kasatkin@intel.com> integrity: digital signature verification using multiple keyrings

Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>