Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | rc = 0 should be return 0 for database not ownder by root. | Dave Brolley | 2009-09-04 | 1 | -1/+1 |
| | |||||
* | It is not an error or warning if the local database of authorized signing | Dave Brolley | 2009-08-10 | 1 | -0/+5 |
| | | | | certificates does not exist. It just means that the signed module is untrusted. | ||||
* | 2009-08-06 Dave Brolley <brolley@redhat.com> | Dave Brolley | 2009-08-06 | 1 | -95/+73 |
| | | | | | | | | | | | | | | | | | | | * modverify.c (staprun.h): #include it. (verify_it): Now accepts module data and signature data as arguments. Don't open and read the signature here. Don't read the module here. (verify_module): Now accepts module data as argument. Read the signature once here. * modverify.h (verify_module): Now accepts module data as argument. * staprun.c (main): Don't call check_permissions here. * staprun.h (check_permissions): Prototype removed. * staprun_funcs.c (check_permissions): Now static. Accepts module data as argument. Pass module data to check_signature. (insert_module): Canonicalize the module path early here. Call check_permissions here, passing it the mapped module data. (check_signature): Now accepts module data as argument. Pass the module data to verify_module. (check_path): Use the already-canonicalized module path. | ||||
* | Only sign modules if --unprivileged is specified. | Dave Brolley | 2009-06-11 | 1 | -5/+1 |
| | | | | | | Don't generate an error message for unsigned modules. Make sure module signature exists before attempting to copy to the cache. Allow timer p[robes for unprivileged users. | ||||
* | Add Vim modelines for new C/C++ sources | Josh Stone | 2009-05-05 | 1 | -0/+2 |
| | |||||
* | Module signing and verification using a separate file for the module signature. | Dave Brolley | 2009-05-04 | 1 | -0/+389 |