summaryrefslogtreecommitdiffstats
path: root/security/integrity/integrity.h
Commit message (Expand)AuthorAgeFilesLines
* Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2019-07-101-4/+2
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-0/+6
|\
| * integrity: Introduce struct evm_xattrThiago Jung Bauermann2019-06-301-0/+6
* | Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-2/+4
|\ \
| * | keys: Replace uid/gid/perm permissions checking with an ACLDavid Howells2019-06-271-2/+4
| |/
* / treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-6/+1
|/
* integrity: Remove references to module keyringThiago Jung Bauermann2018-12-171-3/+2
* integrity: Load certs to the platform keyringNayna Jain2018-12-121-0/+20
* integrity: Define a trusted platform keyringNayna Jain2018-12-121-1/+2
* ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not setStefan Berger2018-07-181-0/+15
* integrity: Add an integrity directory in securityfsMatthew Garrett2018-05-171-0/+2
* integrity: Remove unused macro IMA_ACTION_RULE_FLAGSThiago Jung Bauermann2018-03-251-1/+0
* ima: fail signature verification based on policyMimi Zohar2018-03-231-0/+1
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-2/+7
* ima: support new "hash" and "dont_hash" policy actionsMimi Zohar2017-12-181-10/+13
* ima: re-introduce own integrity cache lockDmitry Kasatkin2017-12-111-5/+13
* EVM: Add support for portable signature formatMatthew Garrett2017-12-111-0/+2
* integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig2017-11-081-2/+0
* integrity: Small code improvementsThiago Jung Bauermann2017-06-211-3/+4
* integrity: add measured_pcrs field to integrity cacheEric Richter2016-06-301-0/+1
* ima: fix ima_inode_post_setattrMimi Zohar2016-05-011-0/+1
* Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-03-041-1/+1
|\
| * X.509: Make algo identifiers text instead of enumDavid Howells2016-03-031-1/+1
* | ima: remove firmware and module specific cached status infoMimi Zohar2016-02-211-12/+4
* | ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-2/+5
|/
* evm: load an x509 certificate from the kernelDmitry Kasatkin2015-12-151-0/+8
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-231-3/+2
* integrity: add validity checks for 'path' parameterDmitry Kasatkin2015-05-211-1/+1
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2014-12-141-4/+15
|\
| * ima: load x509 certificate from the kernelDmitry Kasatkin2014-11-171-0/+8
| * integrity: provide a function to load x509 certificate from the kernelDmitry Kasatkin2014-11-171-0/+2
| * integrity: define a new function integrity_read_file()Dmitry Kasatkin2014-11-171-0/+4
| * integrity: add missing '__init' keyword for integrity_init_keyring()Dmitry Kasatkin2014-10-071-1/+1
| * ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin2014-10-071-3/+0
* | ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin2014-10-281-0/+1
|/
* integrity: remove declaration of non-existing functionsDmitry Kasatkin2014-09-091-1/+0
* ima: provide flag to identify new empty filesDmitry Kasatkin2014-09-081-0/+1
* ima: add support for measuring and appraising firmwareMimi Zohar2014-07-251-2/+7
* ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar2014-07-171-0/+5
* ima: audit log files opened with O_DIRECT flagMimi Zohar2014-06-031-0/+1
* Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds2013-11-231-7/+0
* ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar2013-10-311-0/+7
* ima: provide hash algo info in the xattrDmitry Kasatkin2013-10-261-1/+12
* ima: use dynamically allocated hash storageDmitry Kasatkin2013-10-251-2/+2
* ima: pass full xattr with the signatureDmitry Kasatkin2013-10-251-0/+1
* ima: read and use signature hash algorithmDmitry Kasatkin2013-10-251-0/+11
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-251-3/+12
* ima: fix script messagesDmitry Kasatkin2013-10-251-1/+1
* integrity: move integrity_audit_msg()Mimi Zohar2013-06-201-0/+14
* ima: digital signature verification using asymmetric keysDmitry Kasatkin2013-02-061-0/+12