messages from 2021-09-13 18:44:45 to 2021-12-06 22:59:19 UTC [more...]
[PATCH 00/10] Add wrapped key support for Qualcomm ICE
2021-12-06 22:57 UTC (8+ messages)
` [PATCH 01/10] soc: qcom: new common library for ICE functionality
` [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
` [PATCH 03/10] qcom_scm: scm call for deriving a software secret
` [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
` [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
` [PATCH 06/10] soc: qcom: add wrapped key support for ICE
` [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
[RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
2021-12-06 10:57 UTC (63+ messages)
` [RFC PATCH v7 01/16] security: add ipe lsm & initial context creation
` [RFC PATCH v7 02/16] ipe: add policy parser
` [RFC PATCH v7 03/16] ipe: add evaluation loop
` [RFC PATCH v7 04/16] ipe: add userspace interface
` [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions
` [RFC PATCH v7 07/16] ipe: add auditing support
` [RFC PATCH v7 08/16] ipe: add permissive toggle
` [RFC PATCH v7 09/16] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v7 10/16] fs|dm-verity: add block_dev LSM blob and submit dm-verity data
` [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
` [RFC][PATCH] device mapper: Add builtin function dm_get_status()
` [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
` [RFC PATCH v7 13/16] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v7 14/16] scripts: add boot policy generation program
` [RFC PATCH v7 15/16] ipe: kunit tests
` [RFC PATCH v7 16/16] documentation: add ipe documentation
[PATCH v1 0/5] ima: support fs-verity signatures stored as
2021-12-02 22:55 UTC (13+ messages)
` [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
` [PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
` [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
` [PATCH v1 4/5] ima: support fs-verity file digest based signatures
` [PATCH v1 5/5] fsverity: update the documentation
[PATCH 0/4] ima: support fs-verity signatures stored as
2021-12-02 21:56 UTC (23+ messages)
` [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
` [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
` [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
` [PATCH 4/4] ima: support fs-verity file digest based signatures
[RFC][PATCH 0/5] shmem/fsverity: Prepare for mandatory integrity enforcement
2021-11-16 10:43 UTC (16+ messages)
` [RFC][PATCH 1/5] fsverity: Introduce fsverity_get_file_digest()
` [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
` [RFC][PATCH 3/5] fsverity: Do initialization earlier
` [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
` [RFC][PATCH 5/5] shmem: Add fsverity support
[RFC PATCH v4 0/3] Support for hardware-wrapped inline encryption keys
2021-11-16 3:32 UTC (4+ messages)
` [RFC PATCH v4 1/3] block: add basic hardware-wrapped key support
` [RFC PATCH v4 2/3] block: add ioctls to create and prepare hardware-wrapped keys
` [RFC PATCH v4 3/3] fscrypt: add support for "
[PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
2021-11-14 14:16 UTC (3+ messages)
[PATCH AUTOSEL 5.14 025/138] fscrypt: allow 256-bit master keys with AES-256-XTS
2021-11-08 17:44 UTC
[PATCH AUTOSEL 5.15 027/146] fscrypt: allow 256-bit master keys with AES-256-XTS
2021-11-08 17:42 UTC
[PATCH] generic/574: remove invalid test of read completely past EOF
2021-11-08 4:36 UTC
[PATCH 0/4] Adds wrapped key support for inline storage encryption
2021-11-05 0:08 UTC (10+ messages)
` [PATCH 1/4] ufs: move ICE functionality to a common library
` [PATCH 2/4] qcom_scm: scm call for deriving a software secret
` [PATCH 3/4] soc: qcom: add HWKM library for storage encryption
` [PATCH 4/4] soc: qcom: add wrapped key support for ICE
[GIT PULL] fscrypt updates for 5.16
2021-11-01 20:04 UTC (2+ messages)
Btrfs Fscrypt Design Document
2021-10-26 14:56 UTC (8+ messages)
[PATCH] fscrypt: improve a few comments
2021-10-26 2:10 UTC
[RFC PATCH v3 0/3] Support for hardware-wrapped inline encryption keys
2021-10-21 18:16 UTC (4+ messages)
` [RFC PATCH v3 1/3] block: add basic hardware-wrapped key support
` [RFC PATCH v3 2/3] block: add ioctls to create and prepare hardware-wrapped keys
` [RFC PATCH v3 3/3] fscrypt: add support for "
[GIT PULL] fsverity fix for 5.15-rc4
2021-09-28 15:01 UTC (3+ messages)
[RFC PATCH v2 0/5] Support for hardware-wrapped inline encryption keys
2021-09-27 18:12 UTC (10+ messages)
` [RFC PATCH v2 1/5] block: add basic hardware-wrapped key support
` [RFC PATCH v2 2/5] block: add ioctls to create and prepare hardware-wrapped keys
` [RFC PATCH v2 3/5] fscrypt: improve documentation for inline encryption
` [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
` [RFC PATCH v2 5/5] fscrypt: add support for hardware-wrapped keys
1.4: test suite does not build
2021-09-22 18:57 UTC (6+ messages)
` [fsverity-utils] "
[PATCH] fs-verity: fix signed integer overflow with i_size near S64_MAX
2021-09-22 17:22 UTC (2+ messages)
[PATCH] fscrypt: remove fscrypt_operations::max_namelen
2021-09-21 3:17 UTC (2+ messages)
[PATCH] fscrypt: clean up comments in bio.c
2021-09-21 3:17 UTC (2+ messages)
[PATCH v3] fscrypt: allow 256-bit master keys with AES-256-XTS
2021-09-21 3:03 UTC
[PATCH v5 0/4] tests for btrfs fsverity
2021-09-16 21:18 UTC (5+ messages)
` [PATCH v5 2/4] generic/574: corrupt btrfs merkle tree data
` [PATCH v5 3/4] btrfs: test verity orphans with dmlogwrites
` [PATCH v5 4/4] generic: test fs-verity EFBIG scenarios
[PATCH v6 0/3] btrfs: support fsverity
2021-09-15 23:14 UTC (13+ messages)
` [PATCH v6 2/3] btrfs: initial fsverity support
[RFC PATCH] fsverity: add enable sysctl
2021-09-15 0:16 UTC (4+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).