keyrings.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-30 12:35:39 to 2019-08-15 13:15:35 UTC [more...]

[RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
 2019-08-15 13:15 UTC  (8+ messages)
` [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
` [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
` [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
` [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
` [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework

[PATCH 0/2] keys: ACLs
 2019-08-14 22:41 UTC  (7+ messages)
` [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL

[PATCH v8 00/20] fscrypt: key management improvements
 2019-08-14 22:37 UTC  (34+ messages)
` [PATCH v8 01/20] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
` [PATCH v8 02/20] fscrypt: use FSCRYPT_ prefix for uapi constants
` [PATCH v8 03/20] fscrypt: use FSCRYPT_* definitions, not FS_*
` [PATCH v8 04/20] fscrypt: add ->ci_inode to fscrypt_info
` [PATCH v8 05/20] fscrypt: rename fscrypt_master_key to fscrypt_direct_key
` [PATCH v8 06/20] fscrypt: refactor key setup code in preparation for v2 policies
` [PATCH v8 07/20] fscrypt: move v1 policy key setup to keysetup_v1.c
` [PATCH v8 08/20] fscrypt: rename keyinfo.c to keysetup.c
` [PATCH v8 09/20] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
` [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
` [PATCH v8 11/20] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
` [PATCH v8 12/20] fscrypt: add an HKDF-SHA512 implementation
` [PATCH v8 13/20] fscrypt: v2 encryption policy support
` [PATCH v8 14/20] fscrypt: allow unprivileged users to add/remove keys for v2 policies
` [PATCH v8 15/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl
` [PATCH v8 16/20] fscrypt: require that key be added when setting a v2 encryption policy
` [PATCH v8 17/20] ext4: wire up new fscrypt ioctls
` [PATCH v8 18/20] f2fs: "
` [PATCH v8 19/20] ubifs: "
` [PATCH v8 20/20] fscrypt: document the new ioctls and policy version

Merge resolution for fscrypt and keyrings trees
 2019-08-14 22:28 UTC 

PLEASE CONFIRM PURCHASE ORDER
 2019-08-14  7:51 UTC 

[PATCHv2 00/59] Intel MKTME enabling
 2019-08-13 13:07 UTC  (68+ messages)
` [PATCHv2 01/59] mm: Do no merge VMAs with different encryption KeyIDs
` [PATCHv2 02/59] mm: Add helpers to setup zero page mappings
` [PATCHv2 03/59] mm/ksm: Do not merge pages with different KeyIDs
` [PATCHv2 04/59] mm/page_alloc: Unify alloc_hugepage_vma()
` [PATCHv2 05/59] mm/page_alloc: Handle allocation for encrypted memory
` [PATCHv2 06/59] mm/khugepaged: Handle encrypted pages
` [PATCHv2 07/59] x86/mm: Mask out KeyID bits from page table entry pfn
` [PATCHv2 08/59] x86/mm: Introduce helpers to read number, shift and mask of KeyIDs
` [PATCHv2 09/59] x86/mm: Store bitmask of the encryption algorithms supported by MKTME
` [PATCHv2 10/59] x86/mm: Preserve KeyID on pte_modify() and pgprot_modify()
` [PATCHv2 11/59] x86/mm: Detect MKTME early
` [PATCHv2 12/59] x86/mm: Add a helper to retrieve KeyID for a page
` [PATCHv2 13/59] x86/mm: Add a helper to retrieve KeyID for a VMA
` [PATCHv2 14/59] x86/mm: Add hooks to allocate and free encrypted pages
` [PATCHv2 15/59] x86/mm: Map zero pages into encrypted mappings correctly
` [PATCHv2 16/59] x86/mm: Rename CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING
` [PATCHv2 17/59] x86/mm: Allow to disable MKTME after enumeration
` [PATCHv2 18/59] x86/mm: Calculate direct mapping size
` [PATCHv2 19/59] x86/mm: Implement syncing per-KeyID direct mappings
` [PATCHv2 20/59] x86/mm: Handle encrypted memory in page_to_virt() and __pa()
` [PATCHv2 21/59] mm/page_ext: Export lookup_page_ext() symbol
` [PATCHv2 22/59] mm/rmap: Clear vma->anon_vma on unlink_anon_vmas()
` [PATCHv2 23/59] x86/pconfig: Set an activated algorithm in all MKTME commands
` [PATCHv2 24/59] keys/mktme: Introduce a Kernel Key Service for MKTME
` [PATCHv2 25/59] keys/mktme: Preparse the MKTME key payload
` [PATCHv2 26/59] keys/mktme: Instantiate MKTME keys
` [PATCHv2 27/59] keys/mktme: Destroy "
` [PATCHv2 28/59] keys/mktme: Move the MKTME payload into a cache aligned structure
` [PATCHv2 29/59] keys/mktme: Set up PCONFIG programming targets for MKTME keys
` [PATCHv2 30/59] keys/mktme: Program MKTME keys into the platform hardware
` [PATCHv2 31/59] keys/mktme: Set up a percpu_ref_count for MKTME keys
` [PATCHv2 32/59] keys/mktme: Clear the key programming from the MKTME hardware
` [PATCHv2 33/59] keys/mktme: Require CAP_SYS_RESOURCE capability for MKTME keys
` [PATCHv2 34/59] acpi: Remove __init from acpi table parsing functions
` [PATCHv2 35/59] acpi/hmat: Determine existence of an ACPI HMAT
` [PATCHv2 36/59] keys/mktme: Require ACPI HMAT to register the MKTME Key Service
` [PATCHv2 37/59] acpi/hmat: Evaluate topology presented in ACPI HMAT for MKTME
` [PATCHv2 38/59] keys/mktme: Do not allow key creation in unsafe topologies
` [PATCHv2 39/59] keys/mktme: Support CPU hotplug for MKTME key service
` [PATCHv2 40/59] keys/mktme: Block memory hotplug additions when MKTME is enabled
` [PATCHv2 41/59] mm: Generalize the mprotect implementation to support extensions
` [PATCHv2 42/59] syscall/x86: Wire up a system call for MKTME encryption keys
` [PATCHv2 43/59] x86/mm: Set KeyIDs in encrypted VMAs for MKTME
` [PATCHv2 44/59] mm: Add the encrypt_mprotect() system call "
` [PATCHv2 45/59] x86/mm: Keep reference counts on hardware key usage "
` [PATCHv2 46/59] mm: Restrict MKTME memory encryption to anonymous VMAs
` [PATCHv2 47/59] kvm, x86, mmu: setup MKTME keyID to spte for given PFN
` [PATCHv2 48/59] iommu/vt-d: Support MKTME in DMA remapping
` [PATCHv2 49/59] x86/mm: introduce common code for mem encryption
` [PATCHv2 50/59] x86/mm: Use common code for DMA memory encryption
` [PATCHv2 51/59] x86/mm: Disable MKTME on incompatible platform configurations
` [PATCHv2 52/59] x86/mm: Disable MKTME if not all system memory supports encryption
` [PATCHv2 53/59] x86: Introduce CONFIG_X86_INTEL_MKTME
` [PATCHv2 54/59] x86/mktme: Overview of Multi-Key Total Memory Encryption
` [PATCHv2 55/59] x86/mktme: Document the MKTME provided security mitigations
` [PATCHv2 56/59] x86/mktme: Document the MKTME kernel configuration requirements
` [PATCHv2 57/59] x86/mktme: Document the MKTME Key Service API
` [PATCHv2 58/59] x86/mktme: Document the MKTME API for anonymous memory encryption
` [PATCHv2 59/59] x86/mktme: Demonstration program using the MKTME APIs

[RFC/RFT v3 0/3] KEYS: trusted: Add generic trusted keys framework
 2019-08-13  7:59 UTC  (12+ messages)
` [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
` [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
` [RFC/RFT v3 3/3] KEYS: trusted: Add generic trusted keys framework

Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
 2019-08-13  6:57 UTC  (2+ messages)

[PATCH v7 00/16] fscrypt: key management improvements
 2019-08-12 14:16 UTC  (17+ messages)
` [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
          ` [f2fs-dev] "
` [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
      ` [f2fs-dev] "

[PATCH] KEYS: pass expiry from X.509 cert to key structure
 2019-08-10 18:29 UTC 

[PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
 2019-08-09 15:50 UTC  (4+ messages)

[RFC v2 0/6] Introduce TEE based Trusted Keys support
 2019-08-09  5:48 UTC  (24+ messages)
` [RFC v2 2/6] tee: enable support to register kernel memory
  ` [Tee-dev] "
` [RFC v2 5/6] doc: keys: Document usage of TEE based Trusted Keys
` [RFC v2 6/6] MAINTAINERS: Add entry for "
          ` [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support

[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
 2019-08-05 22:11 UTC  (23+ messages)

[RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
 2019-08-05 20:59 UTC  (7+ messages)
` [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem

[PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
 2019-08-05 14:28 UTC  (4+ messages)

[PATCH v12 00/11] Appended signatures support for IMA appraisal
 2019-08-05 14:25 UTC  (10+ messages)
` [PATCH v12 01/11] MODSIGN: Export module signature definitions

[PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
 2019-08-02 16:15 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).