summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
Commit message (Expand)AuthorAgeFilesLines
* ima: properly free ima_template_entry structuresRoberto Sassu2013-12-023-5/+19
* ima: Do not free 'entry' before it is initializedChristoph Paasch2013-12-021-1/+0
* ima: store address of template_fmt_copy in a pointer before calling strsepRoberto Sassu2013-11-301-2/+4
* ima: make a copy of template_fmt in template_desc_init_fields()Roberto Sassu2013-11-251-7/+14
* ima: do not send field length to userspace for digest of ima templateRoberto Sassu2013-11-253-5/+18
* ima: do not include field length in template digest calc for ima templateRoberto Sassu2013-11-253-6/+15
* Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds2013-11-232-19/+0
* ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar2013-10-312-0/+19
* ima: extend the measurement list to include the file signatureMimi Zohar2013-10-318-12/+73
* ima: provide hash algo info in the xattrDmitry Kasatkin2013-10-261-14/+47
* ima: enable support for larger default filedata hash algorithmsMimi Zohar2013-10-262-2/+59
* ima: define kernel parameter 'ima_template=' to change configured defaultRoberto Sassu2013-10-261-0/+31
* ima: add Kconfig default measurement list templateMimi Zohar2013-10-262-2/+27
* ima: defer determining the appraisal hash algorithm for 'ima' templateRoberto Sassu2013-10-261-1/+5
* ima: add audit log support for larger hashesMimi Zohar2013-10-261-1/+4
* ima: switch to new template management mechanismRoberto Sassu2013-10-255-97/+107
* ima: define new template ima-ng and template fields d-ng and n-ngRoberto Sassu2013-10-253-17/+150
* ima: define template fields library and new helpersRoberto Sassu2013-10-256-8/+242
* ima: new templates management mechanismRoberto Sassu2013-10-254-1/+146
* ima: define new function ima_alloc_init_template() to APIRoberto Sassu2013-10-253-39/+76
* ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu2013-10-254-10/+13
* ima: pass the file descriptor to ima_add_violation()Roberto Sassu2013-10-253-5/+5
* ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin2013-10-253-5/+31
* ima: support arbitrary hash algorithms in ima_calc_buffer_hashDmitry Kasatkin2013-10-252-6/+25
* ima: provide dedicated hash algo allocation functionDmitry Kasatkin2013-10-251-14/+29
* ima: differentiate between template hash and file data hash sizesMimi Zohar2013-10-256-12/+12
* ima: use dynamically allocated hash storageDmitry Kasatkin2013-10-252-28/+45
* ima: pass full xattr with the signatureDmitry Kasatkin2013-10-251-1/+1
* ima: read and use signature hash algorithmDmitry Kasatkin2013-10-254-14/+83
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-256-29/+86
* Revert "ima: policy for RAMFS"Mimi Zohar2013-10-251-1/+0
* ima: fix script messagesDmitry Kasatkin2013-10-253-10/+9
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2013-07-034-91/+0
|\
| * integrity: move integrity_audit_msg()Mimi Zohar2013-06-204-91/+0
* | Replace a bunch of file->dentry->d_inode refs with file_inode()David Howells2013-06-291-1/+1
|/
* ima: eliminate passing d_name.name to process_measurement()Mimi Zohar2013-04-171-9/+5
* hlist: drop the node parameter from iteratorsSasha Levin2013-02-271-2/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-02-263-6/+6
|\
| * new helper: file_inode(file)Al Viro2013-02-223-6/+6
* | block: fix part_pack_uuid() build errorMimi Zohar2013-02-261-5/+6
* | ima: "remove enforce checking duplication" merge fixMimi Zohar2013-02-261-1/+2
* | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2013-02-217-159/+341
|\ \ | |/ |/|
| * ima: rename hash calculation functionsDmitry Kasatkin2013-02-063-9/+9
| * ima: use new crypto_shash API instead of old crypto_hashDmitry Kasatkin2013-02-063-38/+41
| * ima: add policy support for file system uuidDmitry Kasatkin2013-02-061-1/+21
| * ima: differentiate appraise status only for hook specific rulesMimi Zohar2013-01-222-6/+12
| * ima: per hook cache integrity appraisal statusMimi Zohar2013-01-224-19/+106
| * ima: added policy support for 'security.ima' typeDmitry Kasatkin2013-01-223-1/+23
| * ima: forbid write access to files with digital signaturesDmitry Kasatkin2013-01-161-2/+5
| * ima: move full pathname resolution to separate functionDmitry Kasatkin2013-01-163-31/+38
OpenPOWER on IntegriCloud