linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-07 18:55:59 to 2019-06-14 18:04:47 UTC [more...]

[PATCH v4 00/14] ima: introduce IMA Digest Lists extension
 2019-06-14 17:55 UTC  (11+ messages)
` [PATCH v4 01/14] ima: read hash algorithm from security.ima even if appraisal is not enabled
` [PATCH v4 02/14] ima: generalize ima_read_policy()
` [PATCH v4 03/14] ima: generalize ima_write_policy() and raise uploaded data size limit
` [PATCH v4 04/14] ima: generalize policy file operations
` [PATCH v4 05/14] ima: use ima_show_htable_value to show violations and hash table data
` [PATCH v4 06/14] ima: add parser of compact digest list
` [PATCH v4 07/14] ima: restrict upload of converted digest lists
` [PATCH v4 08/14] ima: prevent usage of digest lists that are not measured/appraised
` [PATCH v4 09/14] ima: introduce new securityfs files
` [PATCH v4 10/14] ima: load parser digests and execute the parser at boot time

[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
 2019-06-14 17:52 UTC  (19+ messages)
` [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
` [PATCH V8 2/3] Define a new ima template field buf
` [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args

[RFC 0/7] Introduce TEE based Trusted Keys support
 2019-06-14 15:36 UTC  (25+ messages)
` [RFC 1/7] tee: optee: allow kernel pages to register as shm
` [RFC 2/7] tee: enable support to register kernel memory
` [RFC 3/7] tee: add private login method for kernel clients
` [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
` [RFC 5/7] KEYS: encrypted: Allow TEE based trusted master keys
` [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
` [RFC 7/7] MAINTAINERS: Add entry for "

[PATCH 0/8] tpm: Add driver for cr50
 2019-06-14 15:31 UTC  (16+ messages)
` [PATCH 1/8] tpm: block messages while suspended
` [PATCH 2/8] tpm_tis_core: add optional max xfer size check
` [PATCH 3/8] tpm_tis_spi: add max xfer size
` [PATCH 4/8] dt-bindings: tpm: document properties for cr50
` [PATCH 5/8] tpm: add driver for cr50 on SPI
` [PATCH 6/8] tpm: Add driver for cr50 on I2C
` [PATCH 7/8] tpm: add sysfs attributes for tpm2
` [PATCH 8/8] tpm: add legacy "

[PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
 2019-06-14 15:15 UTC  (5+ messages)

[PATCH v4 0/4] LTP reproducer on broken IMA on overlayfs
 2019-06-14 14:46 UTC  (10+ messages)
` [PATCH v4 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
` [PATCH v4 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
` [PATCH v4 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
` [PATCH v4 4/4] ima: Add overlay test + doc

[PATCH 0/2] powerpc/powernv: expose secure variables to userspace
 2019-06-14 13:13 UTC  (5+ messages)
` [PATCH 1/2] powerpc/powernv: add OPAL APIs for secure variables
` [PATCH 2/2] powerpc: expose secure variables via sysfs

[PATCH v4 0/2] fTPM: firmware TPM running in TEE
 2019-06-14 10:41 UTC  (8+ messages)
` [PATCH v4 1/2] "

[PATCH v4 0/5] ima-avm-utils: Convert sign v2 from RSA to EVP_PKEY API
 2019-06-14  1:59 UTC  (7+ messages)
` [PATCH v4 1/5] ima-avm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
` [PATCH v4 2/5] ima-avm-utils: Change read_pub_key to use EVP_PKEY API
` [PATCH v4 3/5] ima-avm-utils: Change read_priv_key "
` [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to "
` [PATCH v4 5/5] ima-avm-utils: Remove RSA_ASN1_templates

[PATCH v3 0/3] powerpc: Enabling IMA arch specific secure boot policies
 2019-06-12 23:04 UTC  (8+ messages)
` [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
` [PATCH v3 2/3] powerpc/powernv: detect the secure boot mode of the system
` [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules

[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-13  0:43 UTC  (2+ messages)
` [RFC PATCH v4 1/1] "

[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-13  1:06 UTC  (2+ messages)
` [RFC PATCH v4 1/1] "

[PATCH v3 0/2] ima/evm fixes for v5.2
 2019-06-13  8:51 UTC  (11+ messages)

[PATCH v3 0/4] LTP reproducer on broken IMA on overlayfs
 2019-06-13 16:10 UTC  (7+ messages)
` [PATCH v3 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
` [PATCH v3 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
` [PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
` [PATCH v3 4/4] ima: Add overlay test + doc

[PATCH -next] ima: Make arch_policy_entry static
 2019-06-13 15:38 UTC  (2+ messages)

[PATCH V2 1/2] Abstract out support for locating an EFI config table
 2019-06-13 14:23 UTC  (11+ messages)
` [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log

[PATCH] tpm: Fix null pointer dereference on chip register error path
 2019-06-12 20:57 UTC  (2+ messages)

[PATCH v2 1/2] LSM: switch to blocking policy update notifiers
 2019-06-12 20:55 UTC  (6+ messages)
` [PATCH v2 1/2] ima: use the lsm policy update notifier

[PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
 2019-06-12 18:32 UTC  (9+ messages)

[PATCH 0/2] Fix write leases on overlayfs
 2019-06-12 15:59 UTC  (9+ messages)
` [PATCH 1/2] vfs: replace i_readcount with a biased i_count
` [PATCH 2/2] locks: eliminate false positive conflicts for write lease

[PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
 2019-06-12 14:46 UTC  (6+ messages)

[PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
 2019-06-11 18:48 UTC  (3+ messages)

[PATCH v4 0/3] powerpc: Enabling IMA arch specific secure boot policies
 2019-06-11 17:06 UTC  (4+ messages)
` [PATCH v4 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
` [PATCH v4 2/3] powerpc/powernv: detect the secure boot mode of the system
` [PATCH v4 3/3] powerpc: Add support to initialize ima policy rules

[PATCH v11 00/13] Appended signatures support for IMA appraisal
 2019-06-11  6:28 UTC  (14+ messages)
` [PATCH v11 01/13] MODSIGN: Export module signature definitions
` [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
` [PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
` [PATCH v11 04/13] integrity: Introduce struct evm_xattr
` [PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
` [PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
` [PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
` [PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
` [PATCH v11 09/13] ima: Implement support for module-style appended signatures
` [PATCH v11 10/13] ima: Collect modsig
` [PATCH v11 11/13] ima: Define ima-modsig template
` [PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
` [PATCH v11 13/13] ima: Allow template= option for appraise rules as well

[RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-11  5:31 UTC  (7+ messages)
` [RFC PATCH v3 1/1] "

[PATCH] efi: Fix TPM code build failure on ARM
 2019-06-09 19:53 UTC  (2+ messages)

[PATCH 1/2] LSM: switch to blocking policy update notifiers
 2019-06-09 17:06 UTC  (9+ messages)

[PATCH] x86/ima: fix the Kconfig dependency for IMA_ARCH_POLICY
 2019-06-07 19:12 UTC 

[PATCH v3 11/20] docs: security: trusted-encrypted.rst: fix code-block tag
 2019-06-07 18:54 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).