summaryrefslogtreecommitdiffstats
path: root/security/yama (unfollow)
Commit message (Expand)AuthorFilesLines
2013-10-30apparmor: fix capability to not use the current task, during reportingJohn Johansen6-22/+15
2013-10-28Smack: Ptrace access check modeCasey Schaufler1-1/+1
2013-10-27ima: provide hash algo info in the xattrDmitry Kasatkin2-15/+59
2013-10-27ima: enable support for larger default filedata hash algorithmsMimi Zohar3-3/+64
2013-10-27ima: define kernel parameter 'ima_template=' to change configured defaultRoberto Sassu2-0/+36
2013-10-27ima: add Kconfig default measurement list templateMimi Zohar2-2/+27
2013-10-27ima: defer determining the appraisal hash algorithm for 'ima' templateRoberto Sassu1-1/+5
2013-10-27ima: add audit log support for larger hashesMimi Zohar1-1/+4
2013-10-25ima: switch to new template management mechanismRoberto Sassu5-97/+107
2013-10-25ima: define new template ima-ng and template fields d-ng and n-ngRoberto Sassu3-17/+150
2013-10-25ima: define template fields library and new helpersRoberto Sassu6-8/+242
2013-10-25ima: new templates management mechanismRoberto Sassu6-1/+235
2013-10-25ima: define new function ima_alloc_init_template() to APIRoberto Sassu3-39/+76
2013-10-25ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu4-10/+13
2013-10-25ima: pass the file descriptor to ima_add_violation()Roberto Sassu3-5/+5
2013-10-25ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin3-5/+31
2013-10-25ima: support arbitrary hash algorithms in ima_calc_buffer_hashDmitry Kasatkin2-6/+25
2013-10-25ima: provide dedicated hash algo allocation functionDmitry Kasatkin1-14/+29
2013-10-25ima: differentiate between template hash and file data hash sizesMimi Zohar6-12/+12
2013-10-25ima: use dynamically allocated hash storageDmitry Kasatkin4-30/+49
2013-10-25ima: pass full xattr with the signatureDmitry Kasatkin4-5/+7
2013-10-25ima: read and use signature hash algorithmDmitry Kasatkin6-25/+94
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin9-35/+100
2013-10-25keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin8-48/+28
2013-10-25crypto: provide single place for hash algo informationDmitry Kasatkin5-0/+137
2013-10-25Revert "ima: policy for RAMFS"Mimi Zohar1-1/+0
2013-10-25ima: fix script messagesDmitry Kasatkin6-13/+13
2013-10-22tpm: use tabs instead of whitespaces in KconfigPeter Huewe1-8/+8
2013-10-22tpm: Fix module name description in Kconfig for tpm_i2c_infineonPeter Huewe1-1/+1
2013-10-22tpm: Add support for Atmel I2C TPMsJason Gunthorpe4-0/+295
2013-10-22tpm: Add support for the Nuvoton NPCT501 I2C TPMJason Gunthorpe4-0/+723
2013-10-22tpm: Merge the tpm-bios module with tpm.oJason Gunthorpe3-11/+3
2013-10-22tpm: Rename tpm.c to tpm-interface.cJason Gunthorpe2-0/+2
2013-10-22tpm: cleanup checkpatch warningsPeter Huewe1-22/+22
2013-10-22tpm: Remove tpm_show_caps_1_2Jason Gunthorpe6-39/+27
2013-10-22tpm: st33: Remove chip->data_buffer access from this driverJason Gunthorpe1-8/+0
2013-10-22tpm: Remove redundant dev_set_drvdataJason Gunthorpe3-6/+0
2013-10-22tpm: Use container_of to locate the tpm_chip in tpm_openJason Gunthorpe1-17/+4
2013-10-22tpm: Store devname in the tpm_chipJason Gunthorpe2-11/+7
2013-10-22tpm atmel: Call request_region with the correct baseJason Gunthorpe1-1/+1
2013-10-22tpm: ibmvtpm: Use %zd formatting for size_t format argumentsJason Gunthorpe1-2/+2
2013-10-22tpm: MAINTAINERS: Add myself as tpm maintainerPeter Huewe1-0/+1
2013-10-18Smack: Implement lock security modeCasey Schaufler4-8/+33
2013-09-26selinux: correct locking in selinux_netlbl_socket_connect)Paul Moore1-4/+2
2013-09-26selinux: Use kmemdup instead of kmalloc + memcpyDuan Jiong1-2/+2
2013-09-25X.509: remove possible code fragility: enumeration values not handledAntonio Alecrim Jr1-0/+2
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov1-0/+3
2013-09-25MPILIB: add module description and licenseKonstantin Khlebnikov1-0/+3
2013-09-25KEYS: initialize root uid and session keyrings earlyMimi Zohar1-0/+10
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+80