aboutsummaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_init.c (follow)
AgeCommit message (Expand)AuthorFilesLines
2022-02-15ima: define ima_max_digest_data struct without a flexible array variableMimi Zohar1-4/+1
2021-07-23ima: Add digest and digest_len params to the functions to measure a bufferRoberto Sassu1-1/+2
2021-05-21evm: Load EVM key in ima_load_x509() to avoid appraisalRoberto Sassu1-0/+4
2021-01-26IMA: Measure kernel version in early bootRaphael Gianotti1-0/+5
2020-06-03ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()Roberto Sassu1-1/+1
2020-04-19ima: Switch to ima_hash_algo for boot aggregateRoberto Sassu1-5/+17
2020-02-28integrity: Remove duplicate pr_fmt definitionsTushar Sugandhi1-2/+0
2020-01-23IMA: Defined delayed workqueue to free the queued keysLakshmi Ramasubramanian1-1/+7
2019-07-08Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrityLinus Torvalds1-3/+3
2019-06-19IMA: support for per policy rule template formatsMatthew Garrett1-1/+1
2019-06-14ima: Use designated initializers for struct ima_event_dataThiago Jung Bauermann1-2/+2
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner1-5/+1
2019-02-13tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()Roberto Sassu1-0/+4
2018-12-12security: audit and remove any unnecessary uses of module.hPaul Gortmaker1-1/+1
2018-10-10security/integrity: constify some read-only dataEric Biggers1-1/+1
2018-07-28ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL insteadStefan Berger1-5/+2
2018-07-28ima: Use tpm_default_chip() and call TPM functions with a tpm_chipStefan Berger1-7/+4
2018-01-08tpm: use struct tpm_chip for tpm_chip_find_get()Jarkko Sakkinen1-1/+1
2016-12-20ima: on soft reboot, restore the measurement listMimi Zohar1-0/+2
2016-11-13ima: include the reason for TPM-bypass modeMimi Zohar1-1/+2
2016-06-30ima: include pcr for each measurement log entryEric Richter1-1/+2
2016-02-18ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin1-1/+1
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin1-1/+1
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu1-1/+1
2015-05-21ima: wrap event related data to the new ima_event_data structureRoberto Sassu1-2/+3
2015-05-21ima: remove definition of IMA_X509_PATHDmitry Kasatkin1-7/+1
2014-11-17ima: load x509 certificate from the kernelDmitry Kasatkin1-0/+17
2014-09-17ima: return an error code from ima_add_boot_aggregate()Roberto Sassu1-6/+15
2014-09-17ima: move keyring initialization to ima_init()Dmitry Kasatkin1-0/+4
2014-03-07security: integrity: Use a more current logging styleJoe Perches1-1/+4
2014-03-07ima: use static const char array definitionsMimi Zohar1-2/+2
2013-12-02ima: properly free ima_template_entry structuresRoberto Sassu1-1/+1
2013-12-02ima: Do not free 'entry' before it is initializedChristoph Paasch1-1/+0
2013-10-31ima: extend the measurement list to include the file signatureMimi Zohar1-1/+1
2013-10-25ima: new templates management mechanismRoberto Sassu1-0/+4
2013-10-25ima: define new function ima_alloc_init_template() to APIRoberto Sassu1-11/+13
2013-10-25ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu1-1/+2
2013-10-25ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin1-1/+9
2013-10-25ima: differentiate between template hash and file data hash sizesMimi Zohar1-1/+1
2013-02-06ima: use new crypto_shash API instead of old crypto_hashDmitry Kasatkin1-0/+3
2012-07-02ima: remove unused cleanup functionsDmitry Kasatkin1-5/+0
2010-05-06Merge branch 'master' into nextJames Morris1-0/+1
2010-04-23IMA: include the word IMA in printk messagesEric Paris1-1/+1
2010-03-30include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.hTejun Heo1-0/+1
2009-05-22IMA: Add __init notation to ima functionsEric Paris1-2/+2
2009-02-12integrity: audit updateMimi Zohar1-1/+1
2009-02-06integrity: IMA displayMimi Zohar1-1/+7
2009-02-06integrity: IMA as an integrity service providerMimi Zohar1-0/+90