linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-01-29 16:52:27 to 2021-02-05 17:28:35 UTC [more...]

[PATCH v3 0/2] TPM fixes
 2021-02-05 17:25 UTC  (19+ messages)
` [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
` [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid

[PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
 2021-02-05 12:24 UTC  (14+ messages)
` [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
` [PATCH v7 2/4] x509: Detect sm2 keys by their parameters OID
` [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
` [PATCH v7 4/4] ima: Support EC keys for signature verification

[PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
 2021-02-05  8:41 UTC 

[PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
 2021-02-05  7:50 UTC  (2+ messages)

[PATCH] tpm/ppi: Constify static struct attribute_group
 2021-02-05  2:04 UTC  (2+ messages)

[PATCH v16 00/12] Carry forward IMA measurement log on kexec on ARM64
 2021-02-04 23:42 UTC  (18+ messages)
` [PATCH v16 01/12] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
` [PATCH v16 02/12] of: Add a common kexec FDT setup function
` [PATCH v16 03/12] arm64: Use common of_kexec_setup_new_fdt()
` [PATCH v16 04/12] powerpc: "
` [PATCH v16 05/12] powerpc: Move ima buffer fields to struct kimage
` [PATCH v16 06/12] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
` [PATCH v16 07/12] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
` [PATCH v16 08/12] powerpc: Delete unused function delete_fdt_mem_rsv()
` [PATCH v16 09/12] of: Define functions to allocate and free FDT
` [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
` [PATCH v16 11/12] powerpc: Use OF alloc and free "
` [PATCH v16 12/12] arm64: Enable passing IMA log to next kernel on kexec

[PATCH v2 1/2] ima: Free IMA measurement buffer on error
 2021-02-04 17:49 UTC  (2+ messages)
` [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall

[PATCH] vio: make remove callback return void
 2021-02-04 16:08 UTC  (4+ messages)

[PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
 2021-02-04 13:08 UTC  (5+ messages)
` [PATCH v2 1/2] ima_evm_utils: Fix calculation of keyid for older distros
` [PATCH v2 2/2] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1

Migration to trusted keys: sealing user-provided key?
 2021-02-04  5:30 UTC  (18+ messages)

[PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
 2021-02-04  0:05 UTC  (9+ messages)

[PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
 2021-02-03 23:24 UTC  (29+ messages)
` [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
  ` [PATCH v3] "
    ` [PATCH v4] "

[PATCH v2 0/3] TPM fixes
 2021-02-03 21:43 UTC  (11+ messages)
` [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
` [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
` [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid

[RFC] Persist ima logs to disk
 2021-02-03 18:45 UTC  (17+ messages)

[PATCH 1/2] ima: Free IMA measurement buffer on error
 2021-02-03 17:47 UTC  (6+ messages)
` [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall

[PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
 2021-02-03  0:01 UTC  (13+ messages)

[PATCH v2] tpm: WARN_ONCE() -> dev_warn_once() in tpm_tis_status()
 2021-02-02 22:21 UTC 

[PATCH v5 0/3] KEYS, trusted: a bunch of bug fixes
 2021-02-02 16:29 UTC  (8+ messages)
` [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
` [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations

[PATCH 2/2] dm crypt: support using trusted keys
 2021-02-02 15:12 UTC  (5+ messages)

[GIT PULL] tpmdd updates for v5.12-rc1
 2021-02-02 15:15 UTC  (7+ messages)

[PATCH v5 1/4] crypto: Add support for ECDSA signature verification
 2021-02-02 10:16 UTC  (12+ messages)
    ` [PATCH v5 4/4] ima: Support EC keys for "
  ` [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID

[PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
 2021-02-02  2:52 UTC  (2+ messages)

[PATCH v15 00/10] Carry forward IMA measurement log on kexec on ARM64
 2021-02-01 18:58 UTC  (8+ messages)
` [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer

[PATCH v5 0/5] Enable root to update the blacklist keyring
 2021-02-01 17:08 UTC  (5+ messages)

[PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
 2021-02-01 13:04 UTC  (10+ messages)
` [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
` [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
` [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
` [PATCH v6 4/4] ima: Support EC keys for signature verification

[PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
 2021-02-01 12:31 UTC  (6+ messages)

[PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
 2021-01-30 21:14 UTC  (4+ messages)

[PATCH v4 00/10] Enable root to update the blacklist keyring
 2021-01-30 19:39 UTC  (3+ messages)

[PATCH v15 0/5] TPM 2.0 trusted key rework
 2021-01-30 17:12 UTC  (4+ messages)
` [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs

[PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
 2021-01-30 10:24 UTC  (4+ messages)

[PATCH 0/3] support for duplicate measurement of integrity critical data
 2021-01-30  0:45 UTC  (4+ messages)
` [PATCH 1/3] IMA: add policy condition to measure duplicate "
` [PATCH 2/3] IMA: update functions to read allow_dup policy condition
` [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook

AW: TPM V2: kernel panic on linux reboot
 2021-01-29 23:25 UTC  (4+ messages)
  `  "

[PATCH v2] selinux: measure state and policy capabilities
 2021-01-29 16:49 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).