linux-stable/security/apparmor/include
John Johansen f8eb8a1324 apparmor: add the ability to report a sha1 hash of loaded policy
Provide userspace the ability to introspect a sha1 hash value for each
profile currently loaded.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Acked-by: Seth Arnold <seth.arnold@canonical.com>
2013-08-14 11:42:08 -07:00
..
apparmor.h apparmor: convert profile lists to RCU based locking 2013-08-14 11:42:06 -07:00
apparmorfs.h apparmor: add the ability to report a sha1 hash of loaded policy 2013-08-14 11:42:08 -07:00
audit.h apparmor: add interface files for profiles and namespaces 2013-08-14 11:42:07 -07:00
capability.h apparmor: export set of capabilities supported by the apparmor module 2013-08-14 11:42:07 -07:00
context.h apparmor: change how profile replacement update is done 2013-08-14 11:42:06 -07:00
crypto.h apparmor: add the ability to report a sha1 hash of loaded policy 2013-08-14 11:42:08 -07:00
domain.h AppArmor: functions for domain transitions 2010-08-02 15:35:14 +10:00
file.h apparmor: fix sparse warnings 2013-04-28 00:39:35 -07:00
ipc.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
match.h apparmor: move perm defines into policy_unpack 2013-04-28 00:37:04 -07:00
path.h AppArmor: Move path failure information into aa_get_name and rename 2012-03-14 06:15:25 -07:00
policy.h apparmor: add the ability to report a sha1 hash of loaded policy 2013-08-14 11:42:08 -07:00
policy_unpack.h apparmor: allow setting any profile into the unconfined state 2013-08-14 11:42:07 -07:00
procattr.h apparmor: remove "permipc" command 2013-04-28 00:36:32 -07:00
resource.h AppArmor: export known rlimit names/value mappings in securityfs 2012-02-27 11:38:19 -08:00
sid.h apparmor: remove sid from profiles 2013-04-28 00:37:13 -07:00