summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: fix the string representation of the LSM/IMA hook enumeration orderingMimi Zohar2016-05-041-2/+2
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2016-03-1714-158/+409
|\
| * Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-03-043-11/+9
| |\
| | * X.509: Make algo identifiers text instead of enumDavid Howells2016-03-032-4/+5
| | * akcipher: Move the RSA DER encoding check to the crypto layerDavid Howells2016-03-031-0/+1
| | * integrity: convert digsig to akcipher apiTadeusz Struk2016-02-182-7/+4
| | * KEYS: CONFIG_KEYS_DEBUG_PROC_KEYS is no longer an optionDavid Howells2016-02-101-1/+0
| * | ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
| * | ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-214-3/+24
| * | ima: load policy using pathDmitry Kasatkin2016-02-211-2/+43
| * | ima: support for kexec image and initramfsMimi Zohar2016-02-213-7/+27
| * | ima: remove firmware and module specific cached status infoMimi Zohar2016-02-215-39/+28
| * | module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13
| * | security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
| * | firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10
| * | ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-206-14/+51
| * | ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar2016-02-181-2/+73
| * | ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-182-0/+49
| * | ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-185-27/+37
| * | ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
| * | ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-188-40/+33
| * | IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-081-1/+1
| |/
* | EVM: Use crypto_memneq() for digest comparisonsRyan Ware2016-02-121-1/+2
|/
* wrappers for ->i_mutex accessAl Viro2016-01-221-4/+4
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2016-01-1717-76/+575
|\
| * ima: ima_write_policy() limit lockingPetko Manolov2016-01-031-9/+9
| * IMA: policy can be updated zero timesSasha Levin2015-12-243-0/+14
| * security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker2015-12-151-3/+2
| * ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
| * IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar2015-12-151-0/+2
| * IMA: allow reading back the current IMA policyPetko Manolov2015-12-154-8/+253
| * IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-154-0/+87
| * IMA: policy can now be updated multiple timesPetko Manolov2015-12-153-28/+75
| * evm: EVM_LOAD_X509 depends on EVMArnd Bergmann2015-12-151-1/+1
| * evm: reset EVM status when file attributes changeDmitry Kasatkin2015-12-151-0/+13
| * evm: provide a function to set the EVM key from the kernelDmitry Kasatkin2015-12-152-14/+46
| * evm: enable EVM when X509 certificate is loadedDmitry Kasatkin2015-12-154-3/+14
| * evm: load an x509 certificate from the kernelDmitry Kasatkin2015-12-154-0/+33
| * integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-237-22/+35
* | fix the leak in integrity_read_file()Al Viro2016-01-041-5/+6
|/
* mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman2015-11-061-1/+1
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-1/+1
* integrity: prevent loading untrusted certificates on the IMA trusted keyringDmitry Kasatkin2015-10-091-1/+1
* Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2015-07-011-1/+1
|\
| * kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez2015-05-281-1/+1
* | ima: update builtin policiesMimi Zohar2015-06-161-9/+56
* | ima: extend "mask" policy matching supportMimi Zohar2015-06-161-5/+15
* | ima: add support for new "euid" policy conditionMimi Zohar2015-06-161-4/+23
* | ima: fix ima_show_template_data_ascii()Mimi Zohar2015-06-163-4/+5
* | ima: pass iint to ima_add_violation()Roberto Sassu2015-05-215-9/+13
OpenPOWER on IntegriCloud