linux-next/security/integrity
Eric Snowberg 90f6f691a7 integrity: Enforce digitalSignature usage in the ima and evm keyrings
After being vouched for by a system keyring, only allow keys into the .ima
and .evm keyrings that have the digitalSignature usage field set.

Link: https://lore.kernel.org/all/41dffdaeb7eb7840f7e38bc691fbda836635c9f9.camel@linux.ibm.com
Suggested-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com>
Acked-and-tested-by: Mimi Zohar <zohar@linux.ibm.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
2023-08-17 20:12:35 +00:00
..
evm integrity: Enforce digitalSignature usage in the ima and evm keyrings 2023-08-17 20:12:35 +00:00
ima integrity: Enforce digitalSignature usage in the ima and evm keyrings 2023-08-17 20:12:35 +00:00
platform_certs security/integrity: fix pointer to ESL data and its size on pseries 2023-06-21 14:08:53 +10:00
digsig_asymmetric.c ima: fix reference leak in asymmetric_verify() 2022-01-24 18:37:36 -05:00
digsig.c integrity: Enforce digitalSignature usage in the ima and evm keyrings 2023-08-17 20:12:35 +00:00
iint.c integrity: Fix possible multiple allocation in integrity_inode_get() 2023-06-01 07:25:04 -04:00
integrity_audit.c integrity: check the return value of audit_log_start() 2022-02-02 11:44:23 -05:00
integrity.h ima: support fs-verity file digest based version 3 signatures 2022-05-05 17:41:51 -04:00
Kconfig integrity: machine keyring CA configuration 2023-04-24 16:15:53 +03:00
Makefile integrity: Introduce a Linux keyring called machine 2022-03-08 13:55:52 +02:00