summaryrefslogtreecommitdiffstats
path: root/security/integrity (follow)
Commit message (Expand)AuthorAgeFilesLines
* evm: enable key retention service automaticallyDmitry Kasatkin2014-03-071-2/+3
* ima: skip memory allocation for empty filesDmitry Kasatkin2014-03-071-8/+12
* evm: EVM does not use MD5Dmitry Kasatkin2014-03-071-1/+0
* ima: return d_name.name if d_path failsDmitry Kasatkin2014-03-072-7/+2
* integrity: fix checkpatch errorsDmitry Kasatkin2014-03-0711-70/+69
* ima: fix erroneous removal of security.ima xattrDmitry Kasatkin2014-03-071-2/+4
* security: integrity: Use a more current logging styleJoe Perches2014-03-077-11/+27
* ima: reduce memory usage when a template containing the n field is usedRoberto Sassu2014-03-072-17/+13
* ima: restore the original behavior for sending data with ima templateRoberto Sassu2014-03-073-4/+10
* Integrity: Pass commname via get_task_comm()Tetsuo Handa2014-03-071-1/+2
* ima: use static const char array definitionsMimi Zohar2014-03-074-10/+10
* ima: new helper: file_inode(file)Libo Chen2014-03-041-1/+1
* security: cleanup Makefiles to use standard syntax for specifying sub-directo...Sam Ravnborg2014-02-171-2/+2
* security: replace strict_strto*() with kstrto*()Jingoo Han2014-02-062-4/+4
* Merge to v3.13-rc7 for prerequisite changes in the Xen code for TPMJames Morris2014-01-0611-78/+68
|\
| * ima: properly free ima_template_entry structuresRoberto Sassu2013-12-033-5/+19
| * ima: Do not free 'entry' before it is initializedChristoph Paasch2013-12-031-1/+0
| * ima: store address of template_fmt_copy in a pointer before calling strsepRoberto Sassu2013-11-301-2/+4
| * ima: make a copy of template_fmt in template_desc_init_fields()Roberto Sassu2013-11-251-7/+14
| * ima: do not send field length to userspace for digest of ima templateRoberto Sassu2013-11-253-5/+18
| * ima: do not include field length in template digest calc for ima templateRoberto Sassu2013-11-253-6/+15
| * Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds2013-11-244-55/+1
* | ima: remove unneeded size_limit argument from ima_eventdigest_init_common()Roberto Sassu2014-01-031-8/+6
* | ima: pass HASH_ALGO__LAST as hash algo in ima_eventdigest_init()Roberto Sassu2014-01-031-2/+2
* | ima: change the default hash algorithm to SHA1 in ima_eventdigest_ng_init()Roberto Sassu2014-01-031-1/+1
|/
* ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar2013-11-014-1/+55
* ima: extend the measurement list to include the file signatureMimi Zohar2013-11-018-12/+73
* ima: provide hash algo info in the xattrDmitry Kasatkin2013-10-272-15/+59
* ima: enable support for larger default filedata hash algorithmsMimi Zohar2013-10-272-2/+59
* ima: define kernel parameter 'ima_template=' to change configured defaultRoberto Sassu2013-10-271-0/+31
* ima: add Kconfig default measurement list templateMimi Zohar2013-10-272-2/+27
* ima: defer determining the appraisal hash algorithm for 'ima' templateRoberto Sassu2013-10-271-1/+5
* ima: add audit log support for larger hashesMimi Zohar2013-10-271-1/+4
* ima: switch to new template management mechanismRoberto Sassu2013-10-255-97/+107
* ima: define new template ima-ng and template fields d-ng and n-ngRoberto Sassu2013-10-253-17/+150
* ima: define template fields library and new helpersRoberto Sassu2013-10-256-8/+242
* ima: new templates management mechanismRoberto Sassu2013-10-254-1/+146
* ima: define new function ima_alloc_init_template() to APIRoberto Sassu2013-10-253-39/+76
* ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu2013-10-254-10/+13
* ima: pass the file descriptor to ima_add_violation()Roberto Sassu2013-10-253-5/+5
* ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin2013-10-253-5/+31
* ima: support arbitrary hash algorithms in ima_calc_buffer_hashDmitry Kasatkin2013-10-252-6/+25
* ima: provide dedicated hash algo allocation functionDmitry Kasatkin2013-10-251-14/+29
* ima: differentiate between template hash and file data hash sizesMimi Zohar2013-10-256-12/+12
* ima: use dynamically allocated hash storageDmitry Kasatkin2013-10-254-30/+49
* ima: pass full xattr with the signatureDmitry Kasatkin2013-10-254-5/+7
* ima: read and use signature hash algorithmDmitry Kasatkin2013-10-256-25/+94
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-257-32/+98
* Revert "ima: policy for RAMFS"Mimi Zohar2013-10-251-1/+0
* ima: fix script messagesDmitry Kasatkin2013-10-256-13/+13