linux/certs
Nayna Jain 6cbdfb3d91 ima: enable loading of build time generated key on .ima keyring
The kernel currently only loads the kernel module signing key onto the
builtin trusted keyring. Load the module signing key onto the IMA keyring
as well.

Signed-off-by: Nayna Jain <nayna@linux.ibm.com>
Acked-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2021-04-09 10:40:20 -04:00
..
.gitignore .gitignore: add SPDX License Identifier 2020-03-25 11:50:48 +01:00
blacklist_hashes.c License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
blacklist_nohashes.c certs/blacklist_nohashes.c: fix const confusion in certs blacklist 2018-02-21 15:35:43 -08:00
blacklist.c certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID 2021-01-21 16:16:10 +00:00
blacklist.h certs/blacklist: fix const confusion 2018-06-26 09:43:03 -07:00
Kconfig ima: enable signing of modules with build time generated key 2021-04-09 10:40:20 -04:00
Makefile ima: enable signing of modules with build time generated key 2021-04-09 10:40:20 -04:00
system_certificates.S ima: enable loading of build time generated key on .ima keyring 2021-04-09 10:40:20 -04:00
system_keyring.c ima: enable loading of build time generated key on .ima keyring 2021-04-09 10:40:20 -04:00