summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: fix filename hint to reflect script interpreter nameMimi Zohar2012-05-161-1/+3
* security: fix ima kconfig warningRandy Dunlap2012-02-281-1/+1
* IMA: fix audit res field to indicate 1 for success and 0 for failureEric Paris2012-02-162-2/+2
* Merge branch 'next-queue' into nextJames Morris2012-02-092-1/+2
|\
| * ima: policy for RAMFSDmitry Kasatkin2012-01-191-0/+1
| * ima: fix Kconfig dependenciesFabio Estevam2012-01-191-1/+1
* | ima: fix cred sparse warningMimi Zohar2012-01-191-1/+2
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2012-01-173-5/+5
|\ \
| * | integrity: digital signature config option name changeDmitry Kasatkin2012-01-183-4/+4
| * | lib: digital signature config option name changeDmitry Kasatkin2012-01-181-1/+1
| |/
* | audit: treat s_id as an untrusted stringKees Cook2012-01-171-3/+5
|/
* Merge branch 'next' into for-linusJames Morris2012-01-099-43/+244
|\
| * ima: fix invalid memory referenceRoberto Sassu2011-12-191-5/+11
| * ima: free duplicate measurement memoryRoberto Sassu2011-12-192-2/+3
| * evm: prevent racing during tfm allocationDmitry Kasatkin2011-12-081-3/+11
| * evm: key must be set once during initializationDmitry Kasatkin2011-12-081-7/+8
| * digsig: build dependency fixDmitry Kasatkin2011-11-221-1/+1
| * evm: digital signature verification supportDmitry Kasatkin2011-11-093-30/+142
| * integrity: digital signature verification using multiple keyringsDmitry Kasatkin2011-11-094-0/+84
* | evm: prevent racing during tfm allocationDmitry Kasatkin2011-12-201-0/+9
* | evm: key must be set once during initializationDmitry Kasatkin2011-12-201-4/+6
|/
* Merge branch 'for-linus' of git://github.com/richardweinberger/linuxLinus Torvalds2011-11-021-1/+1
|\
| * um: switch to use of drivers/KconfigAl Viro2011-11-021-1/+1
* | evm: clean verification statusDmitry Kasatkin2011-09-141-0/+1
* | evm: permit mode bits to be updatedMimi Zohar2011-09-141-17/+13
* | evm: posix acls modify i_modeMimi Zohar2011-09-143-5/+46
* | evm: limit verifying current security.evm integrityMimi Zohar2011-09-141-34/+24
* | evm: remove TCG_TPM dependencyMimi Zohar2011-09-141-2/+1
* | ima: sparse fix: include linux/ima.h in ima_main.cJames Morris2011-09-091-0/+1
* | ima: sparse fix: make ima_open_policy staticJames Morris2011-09-091-1/+1
* | integrity: sparse fix: move iint_initialized to integrity.hJames Morris2011-09-092-1/+3
* | evm: add Kconfig TCG_TPM dependencyMimi Zohar2011-08-181-1/+1
* | evm: fix evm_inode_init_security return codeMimi Zohar2011-08-111-1/+1
* | EVM: ensure trusted and encypted key symbols are available to EVMJames Morris2011-08-091-1/+3
* | Merge branch 'next-evm' of git://git.kernel.org/pub/scm/linux/kernel/git/zoha...James Morris2011-08-0916-199/+1022
|\ \ | |/ |/|
| * evm: add evm_inode_setattr to prevent updating an invalid security.evmMimi Zohar2011-07-181-0/+15
| * evm: permit only valid security.evm xattrs to be updatedMimi Zohar2011-07-181-14/+63
| * evm: replace hmac_status with evm_statusDmitry Kasatkin2011-07-183-9/+9
| * evm: evm_verify_hmac must not return INTEGRITY_UNKNOWNDmitry Kasatkin2011-07-181-6/+5
| * evm: additional parameter to pass integrity cache entry 'iint'Dmitry Kasatkin2011-07-181-10/+8
| * evm: crypto hash replaced by shashDmitry Kasatkin2011-07-183-45/+57
| * evm: add evm_inode_init_security to initialize new filesMimi Zohar2011-07-183-0/+61
| * security: imbed evm calls in security hooksMimi Zohar2011-07-181-0/+1
| * evm: add support for different security.evm data typesDmitry Kasatkin2011-07-183-9/+23
| * evm: re-releaseMimi Zohar2011-07-1810-1/+632
| * integrity: move ima inode integrity data managementMimi Zohar2011-07-1810-199/+242
* | ima: fmode_t misspelled as mode_t...Al Viro2011-07-261-1/+1
|/
* ima: remove unnecessary call to ima_must_measureMimi Zohar2011-02-233-15/+7
* IMA: remove IMA imbalance checkingMimi Zohar2011-02-102-104/+4
* IMA: maintain i_readcount in the VFS layerMimi Zohar2011-02-102-19/+8
OpenPOWER on IntegriCloud