summaryrefslogtreecommitdiffstats
path: root/Documentation/security
Commit message (Expand)AuthorAgeFilesLines
* Documentation: fix security related doc refsTom Saeger2017-10-123-3/+3
* docs: ReSTify table of contents in core.rstJosh Holland2017-08-301-11/+1
* docs: Fix paths in security/keysJosh Holland2017-08-243-4/+4
* KEYS: Add documentation for asymmetric keyring restrictionsMat Martineau2017-07-141-0/+6
* docs: Fix some formatting issues in request-key.rstJonathan Corbet2017-05-181-3/+3
* doc: ReSTify keys-trusted-encrypted.txtKees Cook2017-05-184-24/+21
* doc: ReSTify keys-request-key.txtKees Cook2017-05-183-38/+34
* doc: ReSTify keys-ecryptfs.txtKees Cook2017-05-183-9/+13
* doc: ReSTify keys.txtKees Cook2017-05-184-165/+160
* doc: ReSTify Smack.txtKees Cook2017-05-182-754/+0
* doc: ReSTify LoadPin.txtKees Cook2017-05-181-17/+0
* doc: ReSTify Yama.txtKees Cook2017-05-182-73/+0
* doc: ReSTify tomoyo.txtKees Cook2017-05-182-57/+0
* doc: ReSTify apparmor.txtKees Cook2017-05-182-41/+0
* doc: ReSTify SELinux.txtKees Cook2017-05-182-29/+0
* doc: ReSTify and split LSM.txtKees Cook2017-05-184-43/+15
* doc: ReSTify self-protection.txtKees Cook2017-05-182-36/+64
* doc: ReSTify credentials.txtKees Cook2017-05-183-153/+125
* doc: ReSTify IMA-templates.txtKees Cook2017-05-183-23/+29
* KEYS: add SP800-56A KDF support for DHStephan Mueller2017-04-041-8/+26
* KEYS: Add KEYCTL_RESTRICT_KEYRINGMat Martineau2017-04-041-0/+25
* KEYS: Add an optional lookup_restriction hook to key_typeMat Martineau2017-04-041-0/+9
* KEYS: Use structure to capture key restriction function and dataMat Martineau2017-04-041-9/+12
* KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau2017-04-031-4/+4
* KEYS: Use a typedef for restrict_link function pointersMat Martineau2017-04-031-4/+1
* KEYS: Differentiate uses of rcu_dereference_key() and user_key_payload()David Howells2017-03-021-2/+15
* Merge tag 'rodata-v4.11-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2017-02-211-2/+8
|\
| * arch: Rename CONFIG_DEBUG_RODATA and CONFIG_DEBUG_MODULE_RONXLaura Abbott2017-02-071-2/+2
| * arch: Move CONFIG_DEBUG_RODATA and CONFIG_SET_MODULE_RONX to be commonLaura Abbott2017-02-071-0/+6
* | LSM: Add /sys/kernel/security/lsmCasey Schaufler2017-01-191-0/+7
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2016-12-141-2/+0
|\
| * Doc: security: keys-trusted: drop duplicate blobauth entryBaruch Siach2016-11-131-2/+0
* | docs: Add more manuals to the PDF buildJonathan Corbet2016-11-161-0/+8
* | tpm: move documentation under Documentation/securityJarkko Sakkinen2016-11-074-0/+177
|/
* Merge tag 'docs-for-linus' of git://git.lwn.net/linuxLinus Torvalds2016-07-261-10/+18
|\
| * docs: self-protection: rename "leak" to "exposure"Kees Cook2016-06-091-10/+18
* | KEYS: Add placeholder for KDF usage with DHStephan Mueller2016-06-031-1/+4
|/
* Merge tag 'docs-for-linus' of git://git.lwn.net/linuxLinus Torvalds2016-05-191-0/+261
|\
| * doc: self-protection: provide initial detailsKees Cook2016-05-171-0/+261
* | Merge tag 'keys-next-20160505' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-05-061-0/+52
|\ \
| * \ Merge branch 'keys-trust' into keys-nextDavid Howells2016-05-041-0/+22
| |\ \
| | * | KEYS: Add a facility to restrict new links into a keyringDavid Howells2016-04-111-0/+22
| | |/
| * | KEYS: Add KEYCTL_DH_COMPUTE commandMat Martineau2016-04-121-0/+30
| |/
* | LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+17
|/
* keys, trusted: seal with a TPM2 authorization policyJarkko Sakkinen2015-12-201-14/+20
* keys, trusted: select hash algorithm for TPM2 chipsJarkko Sakkinen2015-12-201-0/+3
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-16/+25
* Smack: limited capability for changing process labelZbigniew Jasinski2015-10-191-0/+10
* Merge branch 'smack-for-4.3' of https://github.com/cschaufler/smack-next into...James Morris2015-08-111-1/+26
|\
| * Smack: IPv6 host labelingCasey Schaufler2015-07-281-1/+26
OpenPOWER on IntegriCloud