)]}'
{
  "commit": "c7c8bb237fdbff932b5e431aebee5ce862ea07d1",
  "tree": "4cdbc7c250dd4418b47ab45dd1108848b50f8cff",
  "parents": [
    "3fe78ca2fb1d61ea598e63fcbf38aec76b36b3a8"
  ],
  "author": {
    "name": "Dmitry Kasatkin",
    "email": "d.kasatkin@samsung.com",
    "time": "Thu Apr 25 10:43:56 2013 +0300"
  },
  "committer": {
    "name": "Mimi Zohar",
    "email": "zohar@linux.vnet.ibm.com",
    "time": "Fri Oct 25 17:16:58 2013 -0400"
  },
  "message": "ima: provide support for arbitrary hash algorithms\n\nIn preparation of supporting more hash algorithms with larger hash sizes\nneeded for signature verification, this patch replaces the 20 byte sized\ndigest, with a more flexible structure.  The new structure includes the\nhash algorithm, digest size, and digest.\n\nChangelog:\n- recalculate filedata hash for the measurement list, if the signature\n  hash digest size is greater than 20 bytes.\n- use generic HASH_ALGO_\n- make ima_calc_file_hash static\n- scripts lindent and checkpatch fixes\n\nSigned-off-by: Dmitry Kasatkin \u003cd.kasatkin@samsung.com\u003e\nSigned-off-by: Mimi Zohar \u003czohar@linux.vnet.ibm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "04c81bd0f3f27b8a71042acc8ca575047900ccfd",
      "old_mode": 33188,
      "old_path": "crypto/asymmetric_keys/x509_parser.h",
      "new_id": "87d9cc26f630625d7c57e3309456de2a356a46b5",
      "new_mode": 33188,
      "new_path": "crypto/asymmetric_keys/x509_parser.h"
    },
    {
      "type": "modify",
      "old_id": "0a6bfad5491680db7b618f55f52a4fdf3ca72857",
      "old_mode": 33188,
      "old_path": "crypto/asymmetric_keys/x509_public_key.c",
      "new_id": "f83300b6e8c13033e5e239be8d48e7fb379668de",
      "new_mode": 33188,
      "new_path": "crypto/asymmetric_keys/x509_public_key.c"
    },
    {
      "type": "modify",
      "old_id": "39196abaff0d69d7d600ecd53847ba62b8cebed1",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/Kconfig",
      "new_id": "e6628e783df14a3eb923ef59a25ad233272a4d0b",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/Kconfig"
    },
    {
      "type": "modify",
      "old_id": "b3dd616560f72054e13ddeaedaa39017585c2e5c",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima.h",
      "new_id": "eb86032f4f1e5d05fef175467163bbcf2aba5dc0",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima.h"
    },
    {
      "type": "modify",
      "old_id": "1c03e8f1e0e125cc948854e033d689a2aab22303",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima_api.c",
      "new_id": "e531fe22e582476885b454ae5538b0c05004fce6",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima_api.c"
    },
    {
      "type": "modify",
      "old_id": "e3230d6a8d96080040351ba0db76bf9f11e9d573",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima_appraise.c",
      "new_id": "3833b0fa71084576eda8562187baaaa08a52c9a5",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima_appraise.c"
    },
    {
      "type": "modify",
      "old_id": "a02e0791cf15c7add98bd922ebcc08cd3db0f725",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima_crypto.c",
      "new_id": "2fd1786514671c2f6d8683e4456933b8ef000fef",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima_crypto.c"
    },
    {
      "type": "modify",
      "old_id": "0f359df6344caa8b89262c4fa5690786b844541a",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima_main.c",
      "new_id": "7708c2120d9c8b7398f6389f7981028d2fcc4918",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima_main.c"
    },
    {
      "type": "modify",
      "old_id": "f86731649f5414242b884f2cbce9ebde010ec5b8",
      "old_mode": 33188,
      "old_path": "security/integrity/integrity.h",
      "new_id": "0b02ea868e30ba49234e2268a757cb1ff7d2947f",
      "new_mode": 33188,
      "new_path": "security/integrity/integrity.h"
    }
  ]
}
