<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/integrity/digsig.c, branch v3.8.2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/integrity/digsig.c?h=v3.8.2</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/integrity/digsig.c?h=v3.8.2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-11-09T14:51:09Z</updated>
<entry>
<title>integrity: digital signature verification using multiple keyrings</title>
<updated>2011-11-09T14:51:09Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2011-10-05T08:54:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8607c501478432b23654739c7321bc7456053cb6'/>
<id>urn:sha1:8607c501478432b23654739c7321bc7456053cb6</id>
<content type='text'>
Define separate keyrings for each of the different use cases - evm, ima,
and modules. Using different keyrings improves search performance, and also
allows "locking" specific keyring to prevent adding new keys.
This is useful for evm and module keyrings, when keys are usually only
added from initramfs.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
</content>
</entry>
</feed>
