summaryrefslogtreecommitdiffstats
path: root/security/integrity/digsig.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* fs/kernel_file_read: Add "offset" arg for partial readsKees Cook2020-10-051-1/+1
* fs/kernel_read_file: Add file_size output argumentKees Cook2020-10-051-1/+1
* fs/kernel_read_file: Switch buffer size arg to size_tKees Cook2020-10-051-1/+1
* fs/kernel_read_file: Remove redundant size argumentKees Cook2020-10-051-2/+3
* fs/kernel_read_file: Split into separate include fileScott Branden2020-10-051-0/+1
* fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enumKees Cook2020-10-051-1/+1
* integrity: Remove duplicate pr_fmt definitionsTushar Sugandhi2020-02-281-2/+0
* ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-061-9/+34
* Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2019-07-111-13/+18
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-091-2/+3
|\
| * integrity: Fix __integrity_init_keyring() section mismatchGeert Uytterhoeven2019-06-171-2/+3
* | Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-091-18/+13
|\ \
| * | keys: Replace uid/gid/perm permissions checking with an ACLDavid Howells2019-06-281-18/+13
| |/
* / treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-5/+1
|/
* integrity, KEYS: add a reference to platform keyringKairui Song2019-02-041-0/+3
* integrity: Remove references to module keyringThiago Jung Bauermann2018-12-171-1/+0
* integrity: Load certs to the platform keyringNayna Jain2018-12-131-24/+43
* integrity: Define a trusted platform keyringNayna Jain2018-12-131-15/+32
* security/integrity: remove unnecessary 'init_keyring' variableEric Biggers2018-10-101-7/+1
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* integrity/security: fix digsig.c build error with header fileRandy Dunlap2018-02-231-0/+1
* integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig2017-11-081-5/+9
* KEYS: Use structure to capture key restriction function and dataMat Martineau2017-04-041-1/+8
* security/integrity: Harden against malformed xattrsSeth Forshee2016-11-141-1/+1
* IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells2016-04-111-26/+4
* KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-2/+1
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-1/+32
* KEYS: Add a facility to restrict new links into a keyringDavid Howells2016-04-111-4/+3
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-231-2/+12
* integrity: prevent loading untrusted certificates on the IMA trusted keyringDmitry Kasatkin2015-10-091-1/+1
* integrity: add validity checks for 'path' parameterDmitry Kasatkin2015-05-211-1/+1
* integrity: provide a function to load x509 certificate from the kernelDmitry Kasatkin2014-11-181-1/+35
* integrity: add missing '__init' keyword for integrity_init_keyring()Dmitry Kasatkin2014-10-071-1/+1
* ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar2014-07-171-0/+28
* Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds2013-11-241-29/+1
* ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar2013-11-011-1/+29
* ima: pass full xattr with the signatureDmitry Kasatkin2013-10-251-2/+3
* ima: fix script messagesDmitry Kasatkin2013-10-251-1/+1
* ima: digital signature verification using asymmetric keysDmitry Kasatkin2013-02-071-1/+10
* integrity: digital signature verification using multiple keyringsDmitry Kasatkin2011-11-091-0/+48