messages from 2019-10-11 22:34:55 to 2019-10-24 23:26:50 UTC [more...]
[PATCH] ima: skip verifying TPM 2.0 PCR values
2019-10-24 23:26 UTC (9+ messages)
` [LTP] "
IMA test information
2019-10-24 21:45 UTC
[PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
2019-10-24 19:24 UTC (2+ messages)
[PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
2019-10-24 19:15 UTC (7+ messages)
[PATCH] tpm: Switch to platform_get_irq_optional()
2019-10-24 19:11 UTC (12+ messages)
[PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-24 17:48 UTC (15+ messages)
` [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v9 4/8] powerpc/ima: define trusted boot policy
` [PATCH v9 5/8] ima: make process_buffer_measurement() generic
` [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist
Measure ima policy
2019-10-24 1:27 UTC
[PATCH v2 0/4] KEYS: measure keys when they are created or updated
2019-10-23 23:39 UTC (5+ messages)
` [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
` [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
` [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
` [PATCH v2 4/4] KEYS: Enabled ima policy "
[PATCH v1 0/6] KEYS: measure keys when they are created or updated
2019-10-23 18:49 UTC (16+ messages)
` [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
` [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
` [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
` [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
` [PATCH v1 5/6] KEYS: measure queued keys
` [PATCH v1 6/6] KEYS: measure keys when they are created or updated
[PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs
2019-10-23 13:23 UTC
[Patch v8 0/4] Create and consolidate trusted keys subsystem
2019-10-23 11:49 UTC (7+ messages)
` [Patch v8 1/4] tpm: Move tpm_buf code to include/linux/
` [Patch v8 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
` [Patch v8 3/4] KEYS: trusted: Create trusted keys subsystem
` [Patch v8 4/4] KEYS: trusted: Move TPM2 trusted keys code
[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-22 23:38 UTC (18+ messages)
` [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v8 5/8] ima: make process_buffer_measurement() generic
` [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist
[PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
2019-10-22 14:43 UTC (5+ messages)
[bug report] tpm: add support for nonblocking operation
2019-10-22 13:15 UTC
[PATCH V4 0/2] Add support for arm64 to carry ima measurement
2019-10-21 17:38 UTC (8+ messages)
[PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
2019-10-21 11:39 UTC (26+ messages)
[PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-19 18:30 UTC (16+ messages)
` [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
` [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
[PATCH v0 0/1] ima: Refactor process_buffer_measurement() to make it generic
2019-10-19 18:13 UTC (3+ messages)
` [PATCH v0 1/1] "
[PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:02 UTC (2+ messages)
` [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:05 UTC (2+ messages)
` [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:07 UTC (2+ messages)
` [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:09 UTC (2+ messages)
` [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:09 UTC (2+ messages)
` [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path
[PATCH v0] KEYS: Security LSM Hook for key_create_or_update
2019-10-18 20:38 UTC (3+ messages)
[PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
2019-10-17 18:06 UTC (3+ messages)
[PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
2019-10-17 16:21 UTC (10+ messages)
[PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
2019-10-16 23:25 UTC (8+ messages)
[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:50 UTC
[PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:51 UTC
[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:50 UTC (4+ messages)
` [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
` [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
` [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:50 UTC
[PATCH v0 0/1] KEYS: LSM Hook for key_create_or_update
2019-10-16 16:41 UTC (5+ messages)
` [PATCH v0 1/1] "
[PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
2019-10-16 16:31 UTC (3+ messages)
[PATCH v7 0/6] tpm: Add driver for cr50
2019-10-16 15:27 UTC (6+ messages)
[PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
2019-10-16 10:56 UTC (2+ messages)
[PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
2019-10-15 8:34 UTC (5+ messages)
` [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
[Patch v7 0/4] Create and consolidate trusted keys subsystem
2019-10-15 8:32 UTC (9+ messages)
` [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
[PATCH] ftpm: add shutdown call back
2019-10-14 20:17 UTC (3+ messages)
[PATCH] tpm: remove tpm_dev_wq_lock
2019-10-14 19:39 UTC (4+ messages)
[PATCH v2] tpm: use GFP kernel for tpm_buf allocations
2019-10-14 19:35 UTC (3+ messages)
[PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
2019-10-14 18:45 UTC (3+ messages)
[PATCH v0 0/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
2019-10-14 16:21 UTC (7+ messages)
` [PATCH v0 1/2] "
` [PATCH v0 2/2] KEYS: LSM Hook for key_create_or_update
[PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
2019-10-14 10:39 UTC (6+ messages)
` [PATCH v4 3/3] "
[PATCH v7] tpm_crb: fix fTPM on AMD Zen+ CPUs
2019-10-14 8:10 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).