summaryrefslogtreecommitdiff
path: root/security/integrity/integrity.h
AgeCommit message (Expand)AuthorFilesLines
2017-11-08integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig1-2/+0
2017-06-21integrity: Small code improvementsThiago Jung Bauermann1-3/+4
2016-06-30integrity: add measured_pcrs field to integrity cacheEric Richter1-0/+1
2016-05-01ima: fix ima_inode_post_setattrMimi Zohar1-0/+1
2016-03-04Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris1-1/+1
2016-03-04X.509: Make algo identifiers text instead of enumDavid Howells1-1/+1
2016-02-21ima: remove firmware and module specific cached status infoMimi Zohar1-12/+4
2016-02-21ima: define a new hook to measure and appraise a file already in memoryMimi Zohar1-2/+5
2015-12-15evm: load an x509 certificate from the kernelDmitry Kasatkin1-0/+8
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin1-3/+2
2015-05-21integrity: add validity checks for 'path' parameterDmitry Kasatkin1-1/+1
2014-12-15Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-4/+15
2014-11-18ima: load x509 certificate from the kernelDmitry Kasatkin1-0/+8
2014-11-18integrity: provide a function to load x509 certificate from the kernelDmitry Kasatkin1-0/+2
2014-11-18integrity: define a new function integrity_read_file()Dmitry Kasatkin1-0/+4
2014-10-28ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin1-0/+1
2014-10-07integrity: add missing '__init' keyword for integrity_init_keyring()Dmitry Kasatkin1-1/+1
2014-10-07ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin1-3/+0
2014-09-09integrity: remove declaration of non-existing functionsDmitry Kasatkin1-1/+0
2014-09-09ima: provide flag to identify new empty filesDmitry Kasatkin1-0/+1
2014-07-25ima: add support for measuring and appraising firmwareMimi Zohar1-2/+7
2014-07-17ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar1-0/+5
2014-06-03ima: audit log files opened with O_DIRECT flagMimi Zohar1-0/+1
2013-11-24Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds1-7/+0
2013-11-01ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar1-0/+7
2013-10-27ima: provide hash algo info in the xattrDmitry Kasatkin1-1/+12
2013-10-26ima: use dynamically allocated hash storageDmitry Kasatkin1-2/+2
2013-10-26ima: pass full xattr with the signatureDmitry Kasatkin1-0/+1
2013-10-26ima: read and use signature hash algorithmDmitry Kasatkin1-0/+11
2013-10-26ima: provide support for arbitrary hash algorithmsDmitry Kasatkin1-3/+12
2013-10-25ima: fix script messagesDmitry Kasatkin1-1/+1
2013-06-20integrity: move integrity_audit_msg()Mimi Zohar1-0/+14
2013-02-07ima: digital signature verification using asymmetric keysDmitry Kasatkin1-0/+12
2013-01-23ima: per hook cache integrity appraisal statusMimi Zohar1-4/+22
2013-01-23ima: increase iint flag sizeMimi Zohar1-12/+12
2013-01-23ima: added policy support for 'security.ima' typeDmitry Kasatkin1-0/+2
2013-01-17integrity: reduce storage size for ima_status and evm_statusDmitry Kasatkin1-2/+2
2012-09-19ima: change flags container data typeDmitry Kasatkin1-1/+1
2012-09-13ima: audit log hashesPeter Moody1-2/+5
2012-09-13ima: generic IMA action flag handlingDmitry Kasatkin1-6/+12
2012-09-07ima: digital signature verification supportDmitry Kasatkin1-0/+1
2012-09-07ima: add support for different security.ima data typesMimi Zohar1-1/+1
2012-09-07ima: integrity appraisal extensionMimi Zohar1-2/+6
2012-01-18integrity: digital signature config option name changeDmitry Kasatkin1-2/+2
2011-11-09integrity: digital signature verification using multiple keyringsDmitry Kasatkin1-0/+21
2011-09-10integrity: sparse fix: move iint_initialized to integrity.hJames Morris1-0/+3
2011-07-18evm: replace hmac_status with evm_statusDmitry Kasatkin1-1/+1
2011-07-18evm: add support for different security.evm data typesDmitry Kasatkin1-0/+11
2011-07-18evm: re-releaseMimi Zohar1-0/+1
2011-07-18integrity: move ima inode integrity data managementMimi Zohar1-0/+35