summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
| | * | | | | pefile: Handle pesign using the wrong OIDVivek Goyal2014-07-091-1/+7
| | * | | | | pefile: Parse the "Microsoft individual code signing" data blobDavid Howells2014-07-096-2/+174
| | * | | | | pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells2014-07-091-1/+20
| | * | | | | pefile: Strip the wrapper off of the cert data blockDavid Howells2014-07-091-0/+71
| | * | | | | pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells2014-07-095-0/+235
| | * | | | | Provide PE binary definitionsDavid Howells2014-07-091-0/+448
| | * | | | | KEYS: X.509: Fix a spelling mistakeDavid Howells2014-07-081-1/+1
| * | | | | | Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells2014-07-2213-2/+1339
| |\| | | | |
| | * | | | | PKCS#7: Provide a key type for testing PKCS#7David Howells2014-07-083-0/+117
| | * | | | | PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2014-07-083-0/+228
| | * | | | | PKCS#7: Verify internal certificate chainDavid Howells2014-07-081-1/+87
| | * | | | | PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells2014-07-082-0/+69
| | * | | | | PKCS#7: Digest the data in a signed-data messageDavid Howells2014-07-082-1/+175
| | * | | | | PKCS#7: Implement a parser [RFC 2315]David Howells2014-07-087-0/+630
| | * | | | | X.509: Export certificate parse and free functionsDavid Howells2014-07-021-0/+3
| | * | | | | X.509: Add bits needed for PKCS#7David Howells2014-07-013-2/+30
| * | | | | | Merge tag 'keys-preparse-1-20140722' into keys-nextDavid Howells2014-07-2216-185/+291
| |\ \ \ \ \ \ | | |_|/ / / / | |/| | | | |
| | * | | | | KEYS: request_key_auth: Provide key preparsingDavid Howells2014-07-221-0/+13
| | * | | | | KEYS: keyring: Provide key preparsingDavid Howells2014-07-221-11/+23
| | * | | | | KEYS: big_key: Use key preparsingDavid Howells2014-07-222-17/+27
| | * | | | | KEYS: RxRPC: Use key preparsingDavid Howells2014-07-221-68/+97
| | * | | | | KEYS: DNS: Use key preparsingDavid Howells2014-07-221-18/+25
| | * | | | | KEYS: Ceph: Use user_match()David Howells2014-07-221-6/+2
| | * | | | | KEYS: Ceph: Use key preparsingDavid Howells2014-07-221-9/+15
| | * | | | | KEYS: user: Use key preparsingDavid Howells2014-07-223-22/+30
| | * | | | | KEYS: Call ->free_preparse() even after ->preparse() returns an errorDavid Howells2014-07-222-6/+7
| | * | | | | KEYS: Allow expiry time to be set when preparsing a keyDavid Howells2014-07-223-3/+16
| | * | | | | KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-225-6/+8
| | * | | | | KEYS: Provide a generic instantiation functionDavid Howells2014-07-183-24/+33
| |/ / / / /
* | | | | | commoncap: don't alloc the credential unless needed in cap_task_prctlTetsuo Handa2014-07-241-42/+30
* | | | | | Merge tag 'seccomp-3.17' of git://git.kernel.org/pub/scm/linux/kernel/git/kee...James Morris2014-07-1922-80/+471
|\ \ \ \ \ \
| * | | | | | seccomp: implement SECCOMP_FILTER_FLAG_TSYNCKees Cook2014-07-184-2/+140
| * | | | | | seccomp: allow mode setting across threadsKees Cook2014-07-181-11/+25
| * | | | | | seccomp: introduce writer lockingKees Cook2014-07-183-5/+66
| * | | | | | seccomp: split filter prep from check and applyKees Cook2014-07-181-30/+67
| * | | | | | sched: move no_new_privs into new atomic flagsKees Cook2014-07-185-10/+22
| * | | | | | MIPS: add seccomp syscallKees Cook2014-07-185-6/+13
| * | | | | | ARM: add seccomp syscallKees Cook2014-07-182-0/+2
| * | | | | | seccomp: add "seccomp" syscallKees Cook2014-07-188-6/+65
| * | | | | | seccomp: split mode setting routinesKees Cook2014-07-181-23/+48
| * | | | | | seccomp: extract check/assign mode helpersKees Cook2014-07-181-4/+18
| * | | | | | seccomp: create internal mode-setting functionKees Cook2014-07-181-2/+14
| * | | | | | MAINTAINERS: create seccomp entryKees Cook2014-07-181-0/+10
| |/ / / / /
* | | | | | Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into nextJames Morris2014-07-1913-162/+102
|\ \ \ \ \ \ | |/ / / / / |/| | | | / | | |_|_|/ | |/| | |
| * | | | selinux: reduce the number of calls to synchronize_net() when flushing cachesPaul Moore2014-06-267-42/+23
| * | | | selinux: no recursive read_lock of policy_rwlock in security_genfs_sid()Waiman Long2014-06-231-9/+32
| * | | | selinux: fix a possible memory leak in cond_read_node()Namhyung Kim2014-06-191-1/+1
| * | | | selinux: simple cleanup for cond_read_node()Namhyung Kim2014-06-191-7/+2
| * | | | security: Used macros from compiler.h instead of __attribute__((...))Gideon Israel Dsouza2014-06-181-1/+2
| * | | | selinux: introduce str_read() helperNamhyung Kim2014-06-181-96/+37