summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'master' of git://git.infradead.org/users/pcmoore/selinux into r...James Morris2013-10-2217-400/+450
|\
| * selinux: correct locking in selinux_netlbl_socket_connect)Paul Moore2013-09-261-4/+2
| * selinux: Use kmemdup instead of kmalloc + memcpyDuan Jiong2013-09-261-2/+2
| * selinux: add Paul Moore as a SELinux maintainerPaul Moore2013-09-181-1/+2
| * Merge git://git.infradead.org/users/eparis/selinuxPaul Moore2013-09-1816-396/+448
| |\
| | * Revert "SELinux: do not handle seclabel as a special flag"Eric Paris2013-08-282-1/+4
| | * selinux: consider filesystem subtype in policiesAnand Avati2013-08-282-22/+60
| | * Add SELinux policy capability for always checking packet and peer classes.Chris PeBenito2013-07-254-6/+30
| | * selinux: fix problems in netnode when BUG() is compiled outPaul Moore2013-07-251-0/+2
| | * SELinux: use a helper function to determine seclabelEric Paris2013-07-251-14/+24
| | * SELinux: pass a superblock to security_fs_useEric Paris2013-07-253-15/+11
| | * SELinux: do not handle seclabel as a special flagEric Paris2013-07-252-4/+1
| | * SELinux: change sbsec->behavior to shortEric Paris2013-07-253-3/+3
| | * SELinux: renumber the superblock optionsEric Paris2013-07-252-4/+5
| | * SELinux: do all flags twiddling in one placeEric Paris2013-07-251-7/+5
| | * SELinux: rename SE_SBLABELSUPP to SBLABEL_MNTEric Paris2013-07-252-15/+15
| | * SELinux: use define for number of bits in the mnt flags maskEric Paris2013-07-251-1/+4
| | * SELinux: make it harder to get the number of mnt opts wrongEric Paris2013-07-251-2/+3
| | * SELinux: remove crazy contortions around procEric Paris2013-07-251-1/+1
| | * SELinux: fix selinuxfs policy file on big endian systemsEric Paris2013-07-251-2/+1
| | * SELinux: Enable setting security contexts on rootfs inodes.Stephen Smalley2013-07-251-0/+7
| | * SELinux: Increase ebitmap_node size for 64-bit configurationWaiman Long2013-07-251-1/+7
| | * SELinux: Reduce overhead of mls_level_isvalid() function callWaiman Long2013-07-254-19/+27
| | * selinux: remove the BUG_ON() from selinux_skb_xfrm_sid()Paul Moore2013-07-252-5/+8
| | * selinux: cleanup the XFRM headerPaul Moore2013-07-251-14/+5
| | * selinux: cleanup selinux_xfrm_decode_session()Paul Moore2013-07-251-11/+12
| | * selinux: cleanup some comment and whitespace issues in the XFRM codePaul Moore2013-07-251-13/+10
| | * selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()Paul Moore2013-07-252-60/+42
| | * selinux: cleanup selinux_xfrm_policy_lookup() and selinux_xfrm_state_pol_flow...Paul Moore2013-07-251-36/+18
| | * selinux: cleanup and consolidate the XFRM alloc/clone/delete/free codePaul Moore2013-07-251-31/+40
| | * lsm: split the xfrm_state_alloc_security() hook implementationPaul Moore2013-07-256-132/+128
* | | X.509: remove possible code fragility: enumeration values not handledAntonio Alecrim Jr2013-09-251-0/+2
* | | X.509: add module description and licenseKonstantin Khlebnikov2013-09-251-0/+3
* | | MPILIB: add module description and licenseKonstantin Khlebnikov2013-09-251-0/+3
* | | KEYS: initialize root uid and session keyrings earlyMimi Zohar2013-09-251-0/+10
* | | KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2013-09-251-1/+80
* | | KEYS: Make the system 'trusted' keyring viewable by userspaceMimi Zohar2013-09-251-3/+3
* | | KEYS: Set the asymmetric-key type default search methodDavid Howells2013-09-251-0/+1
* | | KEYS: Add a 'trusted' flag and a 'trusted only' flagDavid Howells2013-09-255-1/+19
* | | KEYS: Separate the kernel signature checking keyring from module signingDavid Howells2013-09-258-115/+155
* | | KEYS: Have make canonicalise the paths of the X.509 certs better to deduplicateDavid Howells2013-09-251-3/+9
* | | KEYS: Load *.x509 files into kernel keyringDavid Howells2013-09-252-8/+30
* | | X.509: Remove certificate date checksDavid Howells2013-09-251-38/+0
* | | X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells2013-09-251-4/+5
* | | X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells2013-09-251-0/+11
* | | X.509: Embed public_key_signature struct and create filler functionDavid Howells2013-09-253-55/+74
* | | X.509: struct x509_certificate needs struct tm declaringDavid Howells2013-09-251-0/+1
* | | KEYS: Store public key algo ID in public_key_signature structDavid Howells2013-09-251-0/+1
* | | KEYS: Split public_key_verify_signature() and make availableDavid Howells2013-09-253-9/+39
* | | KEYS: Store public key algo ID in public_key structDavid Howells2013-09-254-5/+6