summaryrefslogtreecommitdiff
path: root/security/integrity/integrity.h
AgeCommit message (Expand)AuthorFilesLines
2018-03-25integrity: Remove unused macro IMA_ACTION_RULE_FLAGSThiago Jung Bauermann1-1/+0
2018-03-23ima: fail signature verification based on policyMimi Zohar1-0/+1
2018-03-23IMA: Support using new creds in appraisal policyMatthew Garrett1-2/+7
2017-12-18ima: support new "hash" and "dont_hash" policy actionsMimi Zohar1-10/+13
2017-12-11ima: re-introduce own integrity cache lockDmitry Kasatkin1-5/+13
2017-12-11EVM: Add support for portable signature formatMatthew Garrett1-0/+2
2017-11-08integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig1-2/+0
2017-06-21integrity: Small code improvementsThiago Jung Bauermann1-3/+4
2016-06-30integrity: add measured_pcrs field to integrity cacheEric Richter1-0/+1
2016-05-01ima: fix ima_inode_post_setattrMimi Zohar1-0/+1
2016-03-04Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris1-1/+1
2016-03-03X.509: Make algo identifiers text instead of enumDavid Howells1-1/+1
2016-02-21ima: remove firmware and module specific cached status infoMimi Zohar1-12/+4
2016-02-20ima: define a new hook to measure and appraise a file already in memoryMimi Zohar1-2/+5
2015-12-15evm: load an x509 certificate from the kernelDmitry Kasatkin1-0/+8
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin1-3/+2
2015-05-21integrity: add validity checks for 'path' parameterDmitry Kasatkin1-1/+1
2014-12-14Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-4/+15
2014-11-17ima: load x509 certificate from the kernelDmitry Kasatkin1-0/+8
2014-11-17integrity: provide a function to load x509 certificate from the kernelDmitry Kasatkin1-0/+2
2014-11-17integrity: define a new function integrity_read_file()Dmitry Kasatkin1-0/+4
2014-10-28ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin1-0/+1
2014-10-07integrity: add missing '__init' keyword for integrity_init_keyring()Dmitry Kasatkin1-1/+1
2014-10-07ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin1-3/+0
2014-09-09integrity: remove declaration of non-existing functionsDmitry Kasatkin1-1/+0
2014-09-08ima: provide flag to identify new empty filesDmitry Kasatkin1-0/+1
2014-07-25ima: add support for measuring and appraising firmwareMimi Zohar1-2/+7
2014-07-17ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar1-0/+5
2014-06-03ima: audit log files opened with O_DIRECT flagMimi Zohar1-0/+1
2013-11-23Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds1-7/+0
2013-10-31ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar1-0/+7
2013-10-26ima: provide hash algo info in the xattrDmitry Kasatkin1-1/+12
2013-10-25ima: use dynamically allocated hash storageDmitry Kasatkin1-2/+2
2013-10-25ima: pass full xattr with the signatureDmitry Kasatkin1-0/+1
2013-10-25ima: read and use signature hash algorithmDmitry Kasatkin1-0/+11
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin1-3/+12
2013-10-25ima: fix script messagesDmitry Kasatkin1-1/+1
2013-06-20integrity: move integrity_audit_msg()Mimi Zohar1-0/+14
2013-02-06ima: digital signature verification using asymmetric keysDmitry Kasatkin1-0/+12
2013-01-22ima: per hook cache integrity appraisal statusMimi Zohar1-4/+22
2013-01-22ima: increase iint flag sizeMimi Zohar1-12/+12
2013-01-22ima: added policy support for 'security.ima' typeDmitry Kasatkin1-0/+2
2013-01-16integrity: reduce storage size for ima_status and evm_statusDmitry Kasatkin1-2/+2
2012-09-19ima: change flags container data typeDmitry Kasatkin1-1/+1
2012-09-13ima: audit log hashesPeter Moody1-2/+5
2012-09-13ima: generic IMA action flag handlingDmitry Kasatkin1-6/+12
2012-09-07ima: digital signature verification supportDmitry Kasatkin1-0/+1
2012-09-07ima: add support for different security.ima data typesMimi Zohar1-1/+1
2012-09-07ima: integrity appraisal extensionMimi Zohar1-2/+6
2012-01-18integrity: digital signature config option name changeDmitry Kasatkin1-2/+2