messages from 2019-10-22 23:38:42 to 2019-11-04 14:40:03 UTC [more...]
[PATCH] tpm: remove tpm_dev_wq_lock
2019-11-04 14:39 UTC (7+ messages)
[Patch v3 0/7] Introduce TEE based Trusted Keys support
2019-11-04 6:58 UTC (12+ messages)
` [Patch v3 1/7] tee: optee: allow kernel pages to register as shm
` [Patch v3 2/7] tee: enable support to register kernel memory
` [Patch v3 3/7] tee: add private login method for kernel clients
` [Patch v3 4/7] KEYS: trusted: Add generic trusted keys framework
` [Patch v3 5/7] KEYS: trusted: Introduce TEE based Trusted Keys
` [Patch v3 6/7] doc: keys: Document usage of "
` [Patch v3 7/7] MAINTAINERS: Add entry for "
[PATCH v4] tpm: Add tpm_version_major sysfs file
2019-10-31 21:35 UTC (3+ messages)
[PATCH v2] tpm: Add major_version sysfs file
2019-10-31 21:04 UTC (10+ messages)
[PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
2019-10-31 21:03 UTC (13+ messages)
[PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
2019-10-31 17:22 UTC (12+ messages)
` [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
` [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
` [PATCH v10 3/9] powerpc: detect the trusted boot state of the system
` [PATCH v10 4/9] powerpc/ima: define trusted boot policy
` [PATCH v10 5/9] ima: make process_buffer_measurement() generic
` [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
` [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
` [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
` [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
[PATCH v3 0/9] KEYS: Measure keys when they are created or updated
2019-10-31 15:42 UTC (22+ messages)
` [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
` [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
` [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
` [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling "
` [PATCH v3 5/9] KEYS: Updated ima_get_action() to return keyrings if specified in the policy
` [PATCH v3 6/9] KEYS: Measure key if the IMA policy allows measurement for the given keyring
` [PATCH v3 7/9] KEYS: Queue key for measurement if IMA is not yet initialized. Measure queued keys when IMA initialization is completed
` [PATCH v3 8/9] KEYS: Added a boolean flag for IMA initialization status
` [PATCH v3 9/9] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
[PATCH] x86/ima: update IMA arch policy to support appended signatures
2019-10-31 3:54 UTC
[PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-30 16:35 UTC (29+ messages)
` [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v9 4/8] powerpc/ima: define trusted boot policy
` [PATCH v9 5/8] ima: make process_buffer_measurement() generic
` [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist
[PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
2019-10-29 11:49 UTC (10+ messages)
[PATCH] tpm: Add major_version sysfs file
2019-10-29 9:14 UTC (10+ messages)
[PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
2019-10-28 20:54 UTC (2+ messages)
[PATCH] ima: skip verifying TPM 2.0 PCR values
2019-10-28 20:51 UTC (18+ messages)
` [LTP] "
[PATCH v2] tpm: Switch to platform_get_irq_optional()
2019-10-28 20:47 UTC (3+ messages)
[PATCH] tpm: Switch to platform_get_irq_optional()
2019-10-28 20:47 UTC (14+ messages)
[PATCH v2 0/4] KEYS: measure keys when they are created or updated
2019-10-28 17:08 UTC (14+ messages)
` [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
` [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
` [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
` [PATCH v2 4/4] KEYS: Enabled ima policy "
[PATCH v3] tpm: Add version_major sysfs file
2019-10-27 18:38 UTC
[PATCH V4 0/2] Add support for arm64 to carry ima measurement
2019-10-25 17:39 UTC (9+ messages)
[PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
2019-10-25 16:02 UTC (2+ messages)
[PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace
2019-10-25 15:58 UTC (6+ messages)
` [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v5 3/4] x86/efi: move common keyring handler functions to new file
Tests to run to validate ima related changes
2019-10-25 15:32 UTC
[PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
2019-10-25 14:13 UTC (8+ messages)
IMA test information
2019-10-24 21:45 UTC
Measure ima policy
2019-10-24 1:27 UTC
[PATCH v1 0/6] KEYS: measure keys when they are created or updated
2019-10-23 18:49 UTC (16+ messages)
` [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
` [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
` [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
` [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
` [PATCH v1 5/6] KEYS: measure queued keys
` [PATCH v1 6/6] KEYS: measure keys when they are created or updated
[PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs
2019-10-23 13:23 UTC
[Patch v8 0/4] Create and consolidate trusted keys subsystem
2019-10-23 11:49 UTC (3+ messages)
[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-22 23:38 UTC (3+ messages)
` [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).