linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-11-19 19:56:32 to 2018-12-04 12:19:12 UTC [more...]

[RFC v1 PATCH 0/6] hardening: statically allocated protected memory
 2018-12-04 12:18 UTC  (4+ messages)
` [PATCH 3/6] rodata_test: refactor tests
` [PATCH 5/6] __wr_after_init: test write rare functionality
` [PATCH 6/6] __wr_after_init: lkdtm test

[PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-04  8:21 UTC  (8+ messages)
` [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
` [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
` [PATCH v6 3/7] tpm: rename and export tpm2_digest and tpm2_algorithms
` [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
` [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
` [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
` [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()

TPM legacy
 2018-12-03 18:15 UTC  (14+ messages)
      ` Aw: "
        `  "

[PATCH v5 0/7] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-03 17:31 UTC  (21+ messages)
` [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
` [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size

[PATCH v3 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
 2018-12-03 13:03 UTC  (8+ messages)
` [PATCH v3 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
` [PATCH v3 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
` [PATCH v3 4/7] ima-evm-utils: Allow using Streebog hash function
` [PATCH v3 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
` [PATCH v3 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
` [PATCH v3 7/7] ima-evm-utils: Try to load digest by its alias

[PATCH] docs: Extend trusted keys documentation for TPM 2.0
 2018-12-02 23:04 UTC  (7+ messages)

[PATCH] ima-evm-utils: libimaevm: get key description out of verbose condition
 2018-12-02 16:17 UTC  (2+ messages)

[PATCH v2 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
 2018-12-02 14:47 UTC  (13+ messages)
` [PATCH v2 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
` [PATCH v2 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
` [PATCH v2 4/7] ima-evm-utils: Allow using Streebog hash function
` [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
` [PATCH v2 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
` [PATCH v2 7/7] ima-evm-utils: Try to load digest by its alias

[PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
 2018-12-02 14:47 UTC  (5+ messages)

notebook TPM2 not woking
 2018-12-01  8:22 UTC 

[PATCH] libimaevm: get key description out of verbose condition
 2018-11-30 20:12 UTC  (2+ messages)

[PATCH v6 00/10] x86/alternative: text_poke() fixes
 2018-11-30  2:32 UTC  (16+ messages)
` [PATCH v6 01/10] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
` [PATCH v6 02/10] x86/jump_label: Use text_poke_early() during early init
` [PATCH v6 03/10] x86/mm: temporary mm struct
` [PATCH v6 04/10] fork: provide a function for copying init_mm
` [PATCH v6 05/10] x86/alternative: initializing temporary mm for patching
` [PATCH v6 06/10] x86/alternative: use temporary mm for text poking
` [PATCH v6 07/10] x86/kgdb: avoid redundant comparison of patched code
` [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
` [PATCH v6 09/10] x86/jump-label: remove support for custom poker
` [PATCH v6 10/10] x86/alternative: remove the return value of text_poke_*()

[PATCH v8 00/14] Appended signatures support for IMA appraisal
 2018-11-29 20:59 UTC  (3+ messages)
` [PATCH v8 04/14] integrity: Introduce struct evm_xattr

[PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
 2018-11-28 16:45 UTC  (11+ messages)
` [PATCH 1/7] integrity: Define a trusted platform keyring
` [PATCH 2/7] integrity: Load certs to the "
` [PATCH 3/7] efi: Add EFI signature data types
` [PATCH 4/7] efi: Add an EFI signature blob parser
` [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
` [PATCH 6/7] efi: Allow the "db" UEFI variable to be suppressed
` [PATCH 7/7] ima: Support platform keyring for kernel appraisal

[BUG] Nuvoton NCPT650 TPM 2.0 mode not working
 2018-11-28 15:04 UTC  (16+ messages)

[PATCH v9 00/17] Removed nested TPM operations
 2018-11-27 23:41 UTC  (11+ messages)
` [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
` [PATCH v9 05/17] tpm: declare struct tpm_header

[PATCH v6] tpm: add support for partial reads
 2018-11-27 23:36 UTC  (3+ messages)

[PATCH] selftests: add TPM 2.0 tests
 2018-11-27 23:15 UTC  (7+ messages)

[PATCH] IMA: Mask O_RDWR if FMODE_READ is set
 2018-11-27 14:14 UTC  (4+ messages)

[PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
 2018-11-27 13:33 UTC  (9+ messages)
` [PATCH 2/3] ima-evm-utils: Add --xattr-user option for testing
` [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function

[RFC][PATCH] fs: set xattrs in initramfs from regular files
 2018-11-26 18:14 UTC  (11+ messages)

[RFC v1 PATCH 00/17] prmem: protected memory
 2018-11-22 20:53 UTC  (23+ messages)
` [PATCH 10/17] prmem: documentation

Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
 2018-11-21  9:14 UTC  (31+ messages)
                          ` EXTERNAL: "

[PATCH v5] tpm: add support for partial reads
 2018-11-21  6:45 UTC  (8+ messages)

[PATCH v5 00/10] x86/alternative: text_poke() fixes
 2018-11-20 18:52 UTC  (8+ messages)
` [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init

[PATCH 0/3] selftest/ima: fail kexec_load syscall
 2018-11-19 19:56 UTC  (4+ messages)
` [PATCH 1/3] ima: add error mesage to kexec_load
` [PATCH 2/3] selftests/ima: kexec_load syscall test
` [PATCH 3/3] x86/ima: retry detecting secure boot mode


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).