messages from 2021-02-01 15:23:53 to 2021-02-24 17:01:21 UTC [more...]
[PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
2021-02-24 16:58 UTC (15+ messages)
[PATCH v8 0/4] Add support for x509 certs with NIST p256 and p192 keys
2021-02-24 13:35 UTC (17+ messages)
` [PATCH v8 1/4] crypto: Add support for ECDSA signature verification
` [PATCH v8 2/4] x509: Detect sm2 keys by their parameters OID
` [PATCH v8 3/4] x509: Add support for parsing x509 certs with ECDSA keys
` [PATCH v8 4/4] ima: Support EC keys for signature verification
` [PATCH 1/3] add params and ids to support nist_p384
` [PATCH 2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
` [PATCH 3/3] add nist_p384 register and unregister to support nist_p384
` [PATCH v2 1/3] add params and ids "
` [PATCH v2 2/3] adds math to support nist_p384 fast and changes routines to pass forward ecc_curve
` [PATCH v2 3/3] adds nist_p384 register and unregister to support nist_p384 and tests
[PATCH] cert: Add kconfig dependency for validate_trust
2021-02-24 12:40 UTC (6+ messages)
[PATCH v4 0/4] Check codeSigning extended key usage extension
2021-02-24 9:27 UTC (7+ messages)
` [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
` [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
` [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
` [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
[GIT PULL] keys: Collected minor fixes and cleanups
2021-02-24 0:32 UTC (2+ messages)
[GIT PULL] Add EFI_CERT_X509_GUID support for dbx/mokx entries
2021-02-23 17:44 UTC (3+ messages)
[PATCH v6 0/5] Enable root to update the blacklist keyring
2021-02-22 17:41 UTC (9+ messages)
` [PATCH v6 1/5] tools/certs: Add print-cert-tbs-hash.sh
` [PATCH v6 2/5] certs: Check that builtin blacklist hashes are valid
` [PATCH v6 3/5] certs: Make blacklist_vet_description() more strict
` [PATCH v6 4/5] certs: Factor out the blacklist hash creation
` [PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
[PATCH] certs: Add support for using elliptic curve keys for signing modules
2021-02-22 13:33 UTC (3+ messages)
[PATCH 0/9] Enable hibernation when Lockdown is enabled
2021-02-22 7:41 UTC (20+ messages)
` [PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs
` [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
` [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
` [PATCH 4/9] security: keys: trusted: Store the handle of a loaded key
` [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
` [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image
` [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
` [PATCH 8/9] pm: hibernate: Verify the digest encryption key
` [PATCH 9/9] pm: hibernate: seal the encryption key with a PCR policy
[PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
2021-02-20 2:39 UTC (8+ messages)
` [PATCH v15 0/5] TPM 2.0 trusted key rework
[PATCH] watch_queue: rectify kernel-doc for init_watch()
2021-02-19 17:47 UTC (2+ messages)
[PATCH v2 0/5] ima: kernel build support for loading the kernel module signing key
2021-02-19 15:25 UTC (12+ messages)
` [PATCH v2 1/5] keys: cleanup build time module signing keys
` [PATCH v2 2/5] keys: generate self-signed module signing key using CSR
` [PATCH v2 3/5] ima: update kernel module signing process during build
` [PATCH v2 4/5] keys: define build time generated ephemeral kernel CA key
` [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
[PATCH 17/18] certs: Fix blacklist flag type confusion
2021-02-19 9:50 UTC (9+ messages)
` [PATCH 00/18] keys: Miscellaneous fixes
[PATCH 0/5] ima: kernel build support for loading the kernel module signing key
2021-02-18 22:02 UTC (18+ messages)
` [PATCH 1/5] keys: cleanup build time module signing keys
` [PATCH 2/5] keys: generate self-signed module signing key using CSR
` [PATCH 3/5] ima: update kernel module signing process during build
` [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
` [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
[PATCH v2] sign-file: add openssl engine support
2021-02-18 10:32 UTC
[PATCH v8 0/4] Introduce TEE based Trusted Keys support
2021-02-15 13:15 UTC (8+ messages)
` [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
[PATCH v3 1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
2021-02-12 12:27 UTC (3+ messages)
` [PATCH 2/2] keys: X.509 public key issuer lookup without AKID
[PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
2021-02-12 11:49 UTC (17+ messages)
` Conflict with Mickaël Salaün's blacklist patches [was [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries]
` "
[PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
2021-02-11 17:30 UTC (15+ messages)
` [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
` [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
` [PATCH v7 4/4] ima: Support EC keys for signature verification
[PATCH v3] keys: X.509 public key issuer lookup without AKID
2021-02-10 21:52 UTC (3+ messages)
[PATCH] sign-file: add openssl engine support
2021-02-10 14:59 UTC (4+ messages)
(no subject)
2021-02-10 14:57 UTC
Migration to trusted keys: sealing user-provided key?
2021-02-09 7:16 UTC (19+ messages)
[RFC][PATCH 0/2] keys: request_key() interception in containers
2021-02-07 23:55 UTC (9+ messages)
` [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
` [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
[PATCH] certs: include prototype for load_certificate_list
2021-02-04 14:54 UTC (2+ messages)
[PATCH 2/2] dm crypt: support using trusted keys
2021-02-02 15:12 UTC (5+ messages)
[PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
2021-02-02 15:16 UTC (5+ messages)
` [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
[PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
2021-02-02 10:16 UTC (10+ messages)
[PATCH v5 0/5] Enable root to update the blacklist keyring
2021-02-01 17:08 UTC (4+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).