original_kernel/include/keys
Jarkko Sakkinen f3c82ade7c tpm: fix checks for policy digest existence in tpm2_seal_trusted()
In my original patch sealing with policy was done with dynamically
allocated buffer that I changed later into an array so the checks in
tpm2-cmd.c became invalid. This patch fixes the issue.

Fixes: 5beb0c435b ("keys, trusted: seal with a TPM2 authorization policy")
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
Acked-by: Peter Huewe <peterhuewe@gmx.de>
2016-02-10 04:10:55 +02:00
..
asymmetric-parser.h
asymmetric-subtype.h KEYS: Merge the type-specific data with the payload data 2015-10-21 15:18:36 +01:00
asymmetric-type.h KEYS: Merge the type-specific data with the payload data 2015-10-21 15:18:36 +01:00
big_key-type.h
ceph-type.h
dns_resolver-type.h
encrypted-type.h
keyring-type.h
rxrpc-type.h
system_keyring.h IMA: create machine owner and blacklist keyrings 2015-12-15 10:01:43 -05:00
trusted-type.h tpm: fix checks for policy digest existence in tpm2_seal_trusted() 2016-02-10 04:10:55 +02:00
user-type.h KEYS: Merge the type-specific data with the payload data 2015-10-21 15:18:36 +01:00