summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_init.c
Commit message (Expand)AuthorAgeFilesLines
* ima: define ima_max_digest_data struct without a flexible array variableMimi Zohar2022-02-151-4/+1
* ima: Add digest and digest_len params to the functions to measure a bufferRoberto Sassu2021-07-231-1/+2
* evm: Load EVM key in ima_load_x509() to avoid appraisalRoberto Sassu2021-05-211-0/+4
* IMA: Measure kernel version in early bootRaphael Gianotti2021-01-261-0/+5
* ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()Roberto Sassu2020-06-031-1/+1
* ima: Switch to ima_hash_algo for boot aggregateRoberto Sassu2020-04-191-5/+17
* integrity: Remove duplicate pr_fmt definitionsTushar Sugandhi2020-02-281-2/+0
* IMA: Defined delayed workqueue to free the queued keysLakshmi Ramasubramanian2020-01-231-1/+7
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-3/+3
|\
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-191-1/+1
| * ima: Use designated initializers for struct ima_event_dataThiago Jung Bauermann2019-06-141-2/+2
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-5/+1
|/
* tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()Roberto Sassu2019-02-131-0/+4
* security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL insteadStefan Berger2018-07-281-5/+2
* ima: Use tpm_default_chip() and call TPM functions with a tpm_chipStefan Berger2018-07-281-7/+4
* tpm: use struct tpm_chip for tpm_chip_find_get()Jarkko Sakkinen2018-01-081-1/+1
* ima: on soft reboot, restore the measurement listMimi Zohar2016-12-201-0/+2
* ima: include the reason for TPM-bypass modeMimi Zohar2016-11-131-1/+2
* ima: include pcr for each measurement log entryEric Richter2016-06-301-1/+2
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-181-1/+1
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-231-1/+1
* ima: pass iint to ima_add_violation()Roberto Sassu2015-05-211-1/+1
* ima: wrap event related data to the new ima_event_data structureRoberto Sassu2015-05-211-2/+3
* ima: remove definition of IMA_X509_PATHDmitry Kasatkin2015-05-211-7/+1
* ima: load x509 certificate from the kernelDmitry Kasatkin2014-11-171-0/+17
* ima: return an error code from ima_add_boot_aggregate()Roberto Sassu2014-09-171-6/+15
* ima: move keyring initialization to ima_init()Dmitry Kasatkin2014-09-171-0/+4
* security: integrity: Use a more current logging styleJoe Perches2014-03-071-1/+4
* ima: use static const char array definitionsMimi Zohar2014-03-071-2/+2
* ima: properly free ima_template_entry structuresRoberto Sassu2013-12-021-1/+1
* ima: Do not free 'entry' before it is initializedChristoph Paasch2013-12-021-1/+0
* ima: extend the measurement list to include the file signatureMimi Zohar2013-10-311-1/+1
* ima: new templates management mechanismRoberto Sassu2013-10-251-0/+4
* ima: define new function ima_alloc_init_template() to APIRoberto Sassu2013-10-251-11/+13
* ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu2013-10-251-1/+2
* ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin2013-10-251-1/+9
* ima: differentiate between template hash and file data hash sizesMimi Zohar2013-10-251-1/+1
* ima: use new crypto_shash API instead of old crypto_hashDmitry Kasatkin2013-02-061-0/+3
* ima: remove unused cleanup functionsDmitry Kasatkin2012-07-021-5/+0
* Merge branch 'master' into nextJames Morris2010-05-061-0/+1
|\
| * include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-301-0/+1
* | IMA: include the word IMA in printk messagesEric Paris2010-04-231-1/+1
|/
* IMA: Add __init notation to ima functionsEric Paris2009-05-221-2/+2
* integrity: audit updateMimi Zohar2009-02-121-1/+1
* integrity: IMA displayMimi Zohar2009-02-061-1/+7
* integrity: IMA as an integrity service providerMimi Zohar2009-02-061-0/+90