linux/security/integrity
Josh Boyer 386b49f51d efi: Allow the "db" UEFI variable to be suppressed
If a user tells shim to not use the certs/hashes in the UEFI db variable
for verification purposes, shim will set a UEFI variable called
MokIgnoreDB. Have the uefi import code look for this and ignore the db
variable if it is found.

[zohar@linux.ibm.com: removed reference to "secondary" keyring comment]
Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Nayna Jain <nayna@linux.ibm.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Reviewed-by: James Morris <james.morris@microsoft.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2018-12-12 22:09:10 -05:00
..
evm security/integrity: constify some read-only data 2018-10-10 12:56:15 -04:00
ima ima: don't measure/appraise files on efivarfs 2018-12-11 07:19:46 -05:00
platform_certs efi: Allow the "db" UEFI variable to be suppressed 2018-12-12 22:09:10 -05:00
digsig_asymmetric.c integrity: support new struct public_key_signature encoding field 2018-11-13 07:37:42 -05:00
digsig.c integrity: Load certs to the platform keyring 2018-12-12 22:02:54 -05:00
iint.c LSM: Record LSM name in struct lsm_info 2018-10-10 20:40:22 -07:00
integrity_audit.c ima: Use audit_log_format() rather than audit_log_string() 2018-07-18 07:27:22 -04:00
integrity.h integrity: Load certs to the platform keyring 2018-12-12 22:02:54 -05:00
Kconfig integrity: Define a trusted platform keyring 2018-12-12 22:02:28 -05:00
Makefile efi: Import certificates from UEFI Secure Boot 2018-12-12 22:04:33 -05:00