1. 2b6aa41 KEYS: Use structure to capture key restriction function and data by Mat Martineau · 8 years ago
  2. aaf66c8 KEYS: Split role of the keyring pointer for keyring restrict functions by Mat Martineau · 8 years ago
  3. 734114f KEYS: Add a system blacklist keyring by David Howells · 8 years ago
  4. d3bfe84 certs: Add a secondary system keyring that can be added to dynamically by David Howells · 9 years ago
  5. 77f68ba KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTED by David Howells · 9 years ago
  6. a511e1a KEYS: Move the point of trust determination to __key_link() by David Howells · 9 years ago
  7. 99716b7 KEYS: Make the system trusted keyring depend on the asymmetric key type by David Howells · 9 years ago
  8. 5ac7eac KEYS: Add a facility to restrict new links into a keyring by David Howells · 9 years ago
  9. bda850c PKCS#7: Make trust determination dependent on contents of trust keyring by David Howells · 9 years ago
  10. e68503b KEYS: Generalise system_verify_data() to provide access to internal content by David Howells · 9 years ago
  11. 0d1db3e certs: Fix misaligned data in extra certificate list by David Howells · 9 years ago
  12. c4c3610 KEYS: Reserve an extra certificate symbol for inserting without recompiling by Mehmet Kayaalp · 9 years ago
  13. 5d06ee2 modsign: hide openssl output in silent builds by Arnd Bergmann · 9 years ago
  14. 5d2787c KEYS: Add an alloc flag to convey the builtinness of a key by David Howells · 9 years ago
  15. 48dbc16 certs: add .gitignore to stop git nagging about x509_certificate_list by Paul Gortmaker · 9 years ago
  16. 3ee550f modsign: Handle signing key in source tree by David Woodhouse · 9 years ago
  17. 62172c8 modsign: Use if_changed rule for extracting cert from module signing key by David Woodhouse · 9 years ago
  18. cfc411e Move certificate handling to its own directory by David Howells · 9 years ago