keyrings.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-29 07:29:51 to 2021-06-03 15:30:20 UTC [more...]

[PATCH] integrity: Load mokx certs from the EFI MOK config table
 2021-06-03 15:29 UTC  (3+ messages)

[PATCH] crypto: sm2 - fix a memory leak in sm2
 2021-06-03 12:34 UTC 

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-03 12:32 UTC  (5+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-01 17:58 UTC  (4+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules

[RFC PATCH 0/3] Add additional MOK vars
 2021-06-01 15:24 UTC  (15+ messages)
` [RFC PATCH 1/3] keys: Add ability to trust the platform keyring
` [RFC PATCH 2/3] keys: Trust platform keyring if MokTrustPlatform found
` [RFC PATCH 3/3] ima: Enable IMA SB Policy if MokIMAPolicy found

[PATCH v8 0/4] Check codeSigning extended key usage extension
 2021-06-01 14:19 UTC  (9+ messages)
` [PATCH v8,1/4] X.509: Add CodeSigning extended key usage parsing
` [PATCH v8,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
` [PATCH v8,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
` [PATCH v8,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

[PATCH] crypto: sm2 - fix a memory leak in sm2
 2021-06-01 13:04 UTC  (4+ messages)

[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
 2021-05-31 16:12 UTC  (5+ messages)
` [PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH] crypto: fix a memory leak in sm2
 2021-05-31 14:09 UTC  (2+ messages)

[PATCH v2 0/7] crypto: add eddsa support for x509
 2021-05-31 12:43 UTC  (10+ messages)
` [PATCH v2 1/7] crypto: fix a memory leak in sm2
` [PATCH v2 2/7] lib/mpi: use kcalloc in mpi_resize
` [PATCH v2 3/7] lib/mpi: export some common function
` [PATCH v2 4/7] x509: add support for eddsa
` [PATCH v2 5/7] crypto: move common code in sm2 to ec_mpi.c and ec_mpi.h
` [PATCH v2 6/7] crypto: ed25519 cert verification
` [PATCH v2 7/7] crypto: add eddsa test vector

[RESEND][PATCH 1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
 2021-05-25 17:36 UTC  (4+ messages)
` [RESEND][PATCH 2/2] keys: X.509 public key issuer lookup without AKID

[PATCH v2 0/1] draft RFC for TPM key format
 2021-05-24 22:20 UTC  (2+ messages)
` [PATCH v2 1/1] doc: add draft RFC for TPM Key format

[PATCH 0/1] draft RFC for TPM key format
 2021-05-24 11:48 UTC  (5+ messages)
` [PATCH 1/1] doc: add draft RFC for TPM Key format

[PATCH] certs: Fix kernel-doc
 2021-05-24 10:19 UTC 

Documentation/admin-guide/module-signing.rst: Does the function of adding a key to ‘Builtin_trusted_key’ work?
 2021-05-24  9:02 UTC 

[PATCH 0/4] Trusted Key policy for TPM 2.0
 2021-05-22 22:45 UTC  (15+ messages)
` [PATCH 1/4] security: keys: trusted: add PCR policy to TPM2 keys
` [PATCH 2/4] security: keys: trusted: add ability to specify arbitrary policy
` [PATCH 3/4] security: keys: trusted: implement counter/timer policy
` [PATCH 4/4] security: keys: trusted: implement authorization policy

[PATCH v7 0/4] Check codeSigning extended key usage extension
 2021-05-22 18:55 UTC  (7+ messages)
` [PATCH v7,1/4] X.509: Add CodeSigning extended key usage parsing
` [PATCH v7,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
` [PATCH v7,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
` [PATCH v7,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

[PATCH v5 0/4] Check codeSigning extended key usage extension
 2021-05-21  9:47 UTC  (5+ messages)
` [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

[PATCH 0/7] crypto: add eddsa support for x509
 2021-05-18 13:57 UTC  (17+ messages)
` [PATCH 1/7] crypto: fix a memory leak in sm2
` [PATCH 2/7] lib/mpi: use kcalloc in mpi_resize
      ` [PATCH 2/7] lib/mpi: use kcalloc in mpi_resize(Internet mail)
` [PATCH 3/7] lib/mpi: export some common function
` [PATCH 4/7] x509: add support for eddsa
` [PATCH 5/7] crypto: move common code in sm2 to ec_mpi.c and ec_mpi.h
` [PATCH 6/7] crypto: ed25519 cert verification
` [PATCH 7/7] crypto: add eddsa test vector
    ` [PATCH 0/7] crypto: add eddsa support for x509(Internet mail)

[PATCH] integrity: add informational messages when revoking certs
 2021-05-18  8:57 UTC  (2+ messages)
` [PATCH v2] "

[PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
 2021-05-15 12:02 UTC  (14+ messages)
` [PATCH v2 23/40] docs: security: keys: trusted-encrypted.rst: "

[PATCH v3 00/18] Implement RSASSA-PSS signature verification
 2021-05-14 10:45 UTC  (3+ messages)
` [PATCH v3 13/18] crypto: rsa-psspad: Get signature parameters from a given signature

[PATCH] sign-file: Fix confusing error messages
 2021-05-14  9:33 UTC 

[PATCH] pkcs7: make parser enable SM2 and SM3 algorithms combination
 2021-05-14  8:59 UTC 

[PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
 2021-05-12 14:23 UTC  (2+ messages)

[PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
 2021-05-12 10:22 UTC  (25+ messages)
` [PATCH 06/53] docs: admin-guide: avoid using UTF-8 chars
` [PATCH 32/53] docs: security: keys: trusted-encrypted.rst: "

[PATCH v2 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-05-11 23:58 UTC  (7+ messages)
` [PATCH v2 1/1] "

[PATCH] Keys: Remove redundant initialization of cred
 2021-05-11 10:50 UTC  (3+ messages)

Project
 2021-05-10 16:40 UTC 

'make O=' indigestion with module signing
 2021-05-10 12:41 UTC  (10+ messages)

[PATCH 0/9] Enable hibernation when Lockdown is enabled
 2021-05-05 18:18 UTC  (7+ messages)
` [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image

[PATCH 4/4] integrity: Load mokx variables into the blacklist keyring
 2021-05-05 10:00 UTC  (9+ messages)
` [PATCH 0/4] keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries

[syzbot] KCSAN: data-race in assoc_array_apply_edit / search_nested_keyrings
 2021-05-04 17:01 UTC  (3+ messages)

[PATCH v7 0/5] Enable root to update the blacklist keyring
 2021-05-04 10:31 UTC  (3+ messages)

[PATCH] KEYS: trusted: fix memory leak
 2021-05-03 14:56 UTC  (4+ messages)

[PATCH] KEYS: trusted: Fix memory leak on object td
 2021-05-03 14:55 UTC  (4+ messages)

[RESEND][PATCH 1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
 2021-04-30 23:27 UTC  (2+ messages)
` [RESEND][PATCH 2/2] keys: X.509 public key issuer lookup without AKID

[PATCH v2] .gitignore: prefix local generated files with a slash
 2021-04-30 18:41 UTC  (3+ messages)

[PATCH 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-04-29 19:08 UTC  (5+ messages)
` [PATCH 1/1] "

[bug report] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
 2021-04-29 18:50 UTC  (2+ messages)

[PATCH v6,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
 2021-04-29 13:04 UTC  (2+ messages)

[PATCH v6 0/4] Check codeSigning extended key usage extension
 2021-04-29  7:28 UTC  (2+ messages)
` [PATCH v6,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).