messages from 2021-06-22 12:38:48 to 2021-08-10 18:07:05 UTC [more...]
[PATCH v2] fscrypt: support trusted keys
2021-08-10 18:02 UTC (9+ messages)
[PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-08-10 11:29 UTC (15+ messages)
` [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH 2/4] KEYS: trusted: allow trust sources "
` [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
` [PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
[PATCH] crypto: public_key: fix overflow during implicit conversion
2021-08-10 6:39 UTC
[PATCH] asymmetric_keys: verify_pefile: fix kernel-doc notation
2021-08-08 20:52 UTC
[PATCH RFC v2 00/12] Enroll kernel keys thru MOK
2021-08-06 21:20 UTC (25+ messages)
` [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
` [PATCH RFC v2 02/12] KEYS: CA link restriction
` [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
` [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
` [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
` [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
` [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
` [PATCH RFC v2 09/12] KEYS: add a reference to "
` [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
` [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
` [PATCH RFC v2 12/12] integrity: store reference to mok keyring
[RFC PATCH v1 0/4] keys: introduce key_extract_material helper
2021-08-06 10:53 UTC (6+ messages)
` [RFC PATCH v1 1/4] "
` [RFC PATCH v1 2/4] dm: crypt: use new "
` [RFC PATCH v1 3/4] ubifs: auth: remove never hit key type error check
` [RFC PATCH v1 4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
[RFC PATCH 0/4] PCI/CMA and SPDM library
2021-08-05 16:43 UTC (6+ messages)
` [RFC PATCH 1/4] lib/asn1_encoder: Add a function to encode many byte integer values
` [RFC PATCH 2/4] spdm: Introduce a library for DMTF SPDM
` [RFC PATCH 3/4] PCI/CMA: Initial support for Component Measurement and Authentication ECN
` [RFC PATCH 4/4] cxl/pci: Add really basic CMA authentication support
[REGRESSION?] Simultaneous writes to a reader-less, non-full pipe can hang
2021-08-04 20:04 UTC (4+ messages)
[PATCH] X.509 asn1-encoder: Add linux/types.h include
2021-08-04 14:40 UTC
[PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
2021-07-30 6:21 UTC (9+ messages)
[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
2021-07-30 6:14 UTC (3+ messages)
[PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
2021-07-30 1:02 UTC (2+ messages)
[RFC PATCH v1] fscrypt: support encrypted and trusted keys
2021-07-29 18:28 UTC (9+ messages)
[syzbot] kernel BUG in assoc_array_insert (2)
2021-07-29 5:31 UTC
[PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
2021-07-27 3:13 UTC (2+ messages)
[PATCH] security: keys: trusted: Fix memory leaks on allocated blob
2021-07-27 3:05 UTC (5+ messages)
[PATCH] KEYS: trusted: Fix trusted key backends when building as module
2021-07-27 2:57 UTC (7+ messages)
[PATCH 0/3] DCP as trusted keys backend
2021-07-21 17:17 UTC (14+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-07-21 17:02 UTC (17+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
kernel BUG on public_key_verify_signature with CONFIG_VMAP_STACK and CONFIG_DEBUG_SG
2021-07-16 13:14 UTC
[PATCH v8 0/5] Enable root to update the blacklist keyring
2021-07-12 17:03 UTC (6+ messages)
` [PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
` [PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
` [PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
` [PATCH v8 4/5] certs: Factor out the blacklist hash creation
` [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
[PATCH] X.509: Support parsing certificate using SM2 algorithm
2021-07-12 8:13 UTC
[PATCH RFC 00/12] Enroll kernel keys thru MOK
2021-07-09 15:59 UTC (30+ messages)
` [PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
` [PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
` [PATCH RFC 03/12] KEYS: CA link restriction
` [PATCH RFC 04/12] integrity: add integrity_destroy_keyring
` [PATCH RFC 05/12] integrity: Introduce mok keyring
` [PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
` [PATCH RFC 07/12] integrity: add add_to_mok_keyring
` [PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
` [PATCH RFC 09/12] integrity: accessor function to get trust_moklist
` [PATCH RFC 10/12] integrity: add new keyring handler
` [PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
` [PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
[PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
2021-07-08 22:30 UTC (2+ messages)
[PATCH v3 00/18] Implement RSASSA-PSS signature verification
2021-07-05 9:39 UTC (4+ messages)
` [PATCH v3 13/18] crypto: rsa-psspad: Get signature parameters from a given signature
[PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
2021-07-03 2:07 UTC (2+ messages)
[PATCH v8 0/2] Add support for ECDSA-signed kernel modules
2021-07-02 6:50 UTC (6+ messages)
` [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH v7 0/2] Add support for ECDSA-signed kernel modules
2021-06-29 20:56 UTC (4+ messages)
` [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH] certs: Redirect openssl error message to null device
2021-06-29 20:26 UTC (4+ messages)
[PATCH 5.4 69/71] certs: Add EFI_CERT_X509_GUID support for dbx entries
2021-06-28 14:30 UTC (2+ messages)
` [PATCH 5.4 70/71] certs: Move load_system_certificate_list to a common function
[PATCH 5.10 097/101] certs: Add EFI_CERT_X509_GUID support for dbx entries
2021-06-28 14:26 UTC (4+ messages)
` [PATCH 5.10 098/101] certs: Move load_system_certificate_list to a common function
` [PATCH 5.10 099/101] certs: Add ability to preload revocation certs
` [PATCH 5.10 100/101] integrity: Load mokx variables into the blacklist keyring
[PATCH 5.12 106/110] certs: Add EFI_CERT_X509_GUID support for dbx entries
2021-06-28 14:18 UTC (4+ messages)
` [PATCH 5.12 107/110] certs: Move load_system_certificate_list to a common function
` [PATCH 5.12 108/110] certs: Add ability to preload revocation certs
` [PATCH 5.12 109/110] integrity: Load mokx variables into the blacklist keyring
[PATCH v2] sign-file: Fix confusing error messages
2021-06-24 10:48 UTC
[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
2021-06-22 12:45 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).