summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2015-09-0876-1407/+3588
|\
| * PKCS#7: Add OIDs for sha224, sha284 and sha512 hash algos and use themDavid Howells2015-09-013-0/+20
| * Documentation/Changes: Now need OpenSSL devel packages for module signingDavid Howells2015-08-281-1/+16
| * scripts: add extract-cert and sign-file to .gitignorePaul Gortmaker2015-08-271-0/+2
| * Merge tag 'modsign-pkcs7-20150814' of git://git.kernel.org/pub/scm/linux/kern...James Morris2015-08-2611-198/+212
| |\
| | * modsign: Handle signing key in source treeDavid Woodhouse2015-08-143-58/+54
| | * modsign: Use if_changed rule for extracting cert from module signing keyDavid Woodhouse2015-08-141-2/+3
| | * Move certificate handling to its own directoryDavid Howells2015-08-1410-195/+212
| * | Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into nextJames Morris2015-08-1514-110/+915
| |\ \ | | |/ | |/|
| | * selinux: explicitly declare the role "base_r"Laurent Bigonville2015-07-131-0/+1
| | * selinux: Create a common helper to determine an inode label [ver #3]David Howells2015-07-131-46/+41
| | * selinux: Augment BUG_ON assertion for secclass_map.Stephen Smalley2015-07-131-1/+2
| | * selinux: initialize sock security class to default valueStephen Smalley2015-07-131-0/+1
| | * selinux: reduce locking overhead in inode_free_security()Waiman Long2015-07-131-3/+14
| | * selinux: extended permissions for ioctlsJeff Vander Stoep2015-07-1311-60/+834
| | * security: add ioctl specific auditing to lsm_auditJeff Vander Stoep2015-07-132-0/+22
| * | Merge branch 'smack-for-4.3' of https://github.com/cschaufler/smack-next into...James Morris2015-08-141-14/+18
| |\ \
| | * | Smack - Fix build error with bringup unconfiguredCasey Schaufler2015-08-121-14/+18
| * | | Merge tag 'modsign-pkcs7-20150812-3' of git://git.kernel.org/pub/scm/linux/ke...James Morris2015-08-1435-928/+1597
| |\ \ \
| | * | | sign-file: Fix warning about BIO_reset() return valueDavid Howells2015-08-131-1/+1
| | * | | PKCS#7: Add MODULE_LICENSE() to test moduleDavid Howells2015-08-131-0/+3
| | * | | sign-file: Document dependency on OpenSSL devel librariesDavid Howells2015-08-122-0/+7
| | * | | PKCS#7: Appropriately restrict authenticated attributes and content typeDavid Howells2015-08-1216-27/+285
| | * | | KEYS: Add a name for PKEY_ID_PKCS7David Howells2015-08-121-0/+1
| | * | | PKCS#7: Improve and export the X.509 ASN.1 time object decoderDavid Howells2015-08-123-31/+72
| | * | | modsign: Use extract-cert to process CONFIG_SYSTEM_TRUSTED_KEYSDavid Woodhouse2015-08-123-14/+17
| | * | | extract-cert: Cope with multiple X.509 certificates in a single fileDavid Woodhouse2015-08-121-12/+46
| | * | | sign-file: Generate CMS message as signature instead of PKCS#7David Howells2015-08-121-24/+27
| | * | | PKCS#7: Support CMS messages also [RFC5652]David Howells2015-08-123-9/+68
| | * | | X.509: Change recorded SKID & AKID to not include Subject or IssuerDavid Howells2015-08-121-6/+2
| | * | | PKCS#7: Check content type and versionsDavid Howells2015-08-122-4/+77
| | * | | modsign: Add explicit CONFIG_SYSTEM_TRUSTED_KEYS optionDavid Woodhouse2015-08-073-64/+89
| | * | | modsign: Use single PEM file for autogenerated keyDavid Woodhouse2015-08-075-17/+16
| | * | | modsign: Extract signing cert from CONFIG_MODULE_SIG_KEY if neededDavid Woodhouse2015-08-075-11/+181
| | * | | modsign: Allow external signing key to be specifiedDavid Woodhouse2015-08-074-6/+46
| | * | | modsign: Allow signing key to be PKCS#11David Woodhouse2015-08-071-5/+24
| | * | | modsign: Allow password to be specified for signing keyDavid Woodhouse2015-08-073-1/+34
| | * | | modsign: Abort modules_install when signing failsDavid Woodhouse2015-08-071-1/+1
| | * | | MODSIGN: Extract the blob PKCS#7 signature verifier from module signingDavid Howells2015-08-074-53/+75
| | * | | system_keyring.c doesn't need to #include module-internal.hDavid Howells2015-08-071-1/+0
| | * | | sign-file: Add option to only create signature fileLuis R. Rodriguez2015-08-071-3/+10
| | * | | MODSIGN: Use PKCS#7 messages as module signaturesDavid Howells2015-08-075-598/+48
| | * | | MODSIGN: Provide a utility to append a PKCS#7 signature to a moduleDavid Howells2015-08-072-0/+206
| | * | | PKCS#7: Allow detached data to be supplied for signature checking purposesDavid Howells2015-08-072-0/+28
| | * | | X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifierDavid Howells2015-08-074-41/+103
| | * | | X.509: Extract both parts of the AuthorityKeyIdentifierDavid Howells2015-08-077-69/+145
| | * | | ASN.1: Copy string names to tokens in ASN.1 compilerDavid Howells2015-08-071-82/+73
| | * | | ASN.1: Add an ASN.1 compiler option to dump the element treeDavid Howells2015-08-071-12/+76
| * | | | MAINTAINERS: The keyrings mailing list has movedDavid Howells2015-08-121-3/+3
| * | | | Merge branch 'smack-for-4.3' of https://github.com/cschaufler/smack-next into...James Morris2015-08-115-209/+833
| |\ \ \ \ | | |/ / / | |/| / / | | |/ /
OpenPOWER on IntegriCloud