linux_old1/security/integrity/ima
Mimi Zohar 060bdebfb0 ima: prevent new digsig xattr from being replaced
Even though a new xattr will only be appraised on the next access,
set the DIGSIG flag to prevent a signature from being replaced with
a hash on file close.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2014-06-12 17:58:05 -04:00
..
Kconfig Revert "ima: define '_ima' as a builtin 'trusted' keyring" 2013-11-23 16:36:35 -08:00
Makefile ima: define template fields library and new helpers 2013-10-25 17:17:05 -04:00
ima.h ima: restore the original behavior for sending data with ima template 2014-03-07 11:32:29 -05:00
ima_api.c ima: audit log files opened with O_DIRECT flag 2014-06-03 14:21:50 -05:00
ima_appraise.c ima: prevent new digsig xattr from being replaced 2014-06-12 17:58:05 -04:00
ima_crypto.c ima: skip memory allocation for empty files 2014-03-07 12:15:48 -05:00
ima_fs.c integrity: fix checkpatch errors 2014-03-07 12:15:45 -05:00
ima_init.c security: integrity: Use a more current logging style 2014-03-07 12:15:21 -05:00
ima_main.c ima: audit log files opened with O_DIRECT flag 2014-06-03 14:21:50 -05:00
ima_policy.c ima: audit log files opened with O_DIRECT flag 2014-06-03 14:21:50 -05:00
ima_queue.c integrity: fix checkpatch errors 2014-03-07 12:15:45 -05:00
ima_template.c integrity: fix checkpatch errors 2014-03-07 12:15:45 -05:00
ima_template_lib.c ima: reduce memory usage when a template containing the n field is used 2014-03-07 11:32:30 -05:00
ima_template_lib.h ima: extend the measurement list to include the file signature 2013-10-31 20:19:35 -04:00