messages from 2021-03-31 02:56:38 to 2021-04-21 16:20:09 UTC [more...]
[PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure
2021-04-21 16:19 UTC (2+ messages)
` [PATCH v2 1/6] xattr: Complete constify ->name member of "struct xattr"
[PATCH v2 0/2] Add support for ECDSA-signed kernel modules
2021-04-21 12:58 UTC (12+ messages)
` [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH v9 0/4] Introduce TEE based Trusted Keys support
2021-04-21 11:08 UTC (4+ messages)
` [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
[PATCH 000/141] Fix fall-through warnings for Clang
2021-04-20 22:17 UTC (5+ messages)
` [PATCH 010/141] ima: "
[PATCH 0/3] ima-evm-utils: Implement function to only create IMA signature
2021-04-20 18:30 UTC (4+ messages)
` [PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
` [PATCH 2/3] tests: Add program to create IMA signature with new API call
` [PATCH 3/3] libimaevm: Have sign_hash_v2 call sign_hash_v2_pkey after reading key file
[PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
2021-04-20 16:09 UTC (12+ messages)
` [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
` [PATCH 2/5] security: Support multiple LSMs implementing the inode_init_security hook
` [PATCH 3/5] security: Pass xattrs allocated by LSMs to "
` [PATCH 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH 5/5] evm: Support multiple LSMs providing an xattr
[PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
2021-04-20 3:10 UTC
[RFC PATCH] integrity: fix null ptr dereference in integrity_inode_free()
2021-04-19 18:18 UTC
[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
2021-04-19 15:22 UTC (8+ messages)
` [PATCH 1/6] libimaevm: Properly check for error returned by EVP_DigestUpdate
` [PATCH 2/6] libimaevm: Remove unused off variable
` [PATCH 3/6] libimaevm: Rename variable returned from readlink to len
` [PATCH 4/6] libimaevm: Rename variable from cr to newline
` [PATCH 5/6] libimaevm: Report unsupported filetype using log_err
` [PATCH 6/6] libimaevm: Use function parameter algo for name of hash
linux-next: Tree for Apr 16 (IMA appraise causing build error)
2021-04-16 20:32 UTC (3+ messages)
[PATCH] KEYS: trusted: fix a couple error pointer dereferences
2021-04-16 14:08 UTC (5+ messages)
[PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
2021-04-15 16:28 UTC (4+ messages)
` [PATCH v3 2/2] tests/install-swtpm.sh: Add tar option --no-same-owner
[PATCH 1/1] travis: Add Docker Hub pull rate limit workaround
2021-04-15 12:56 UTC
null-ptr-deref in integrity_inode_free()
2021-04-14 20:36 UTC (4+ messages)
[GIT PULL] TPM DEVICE DRIVER updates for v5.13
2021-04-14 13:58 UTC
[PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
2021-04-14 11:07 UTC (6+ messages)
Bug: TPM returned invalid status
2021-04-14 11:05 UTC (8+ messages)
` Aw: "
` "
[PATCH] security: keys: trusted: prevent memory leak in error path
2021-04-13 20:13 UTC
[PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
2021-04-13 12:49 UTC (3+ messages)
[PATCH v6 24/40] fs: make helpers idmap mount aware
2021-04-13 8:26 UTC (3+ messages)
[PATCH -next] KEYS: trusted: Switch to kmemdup_nul()
2021-04-12 16:00 UTC
[PATCH v2] integrity: Add declarations to init_once void arguments
2021-04-10 3:19 UTC (4+ messages)
[PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
2021-04-09 18:48 UTC (5+ messages)
` [PATCH v4 1/3] keys: cleanup build time module signing keys
` [PATCH v4 2/3] ima: enable signing of modules with build time generated key
` [PATCH v4 3/3] ima: enable loading of build time generated key on .ima keyring
[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-04-09 17:15 UTC (3+ messages)
[PATCH 0/7] ima/evm: Small enhancements
2021-04-09 11:43 UTC (8+ messages)
` [PATCH 1/7] ima: Avoid measurement and audit if access to the file will be denied
` [PATCH 2/7] ima: Add meta_immutable appraisal type
` [PATCH 3/7] ima: Introduce exec_tcb and tmpfs policies
` [PATCH 4/7] ima: Introduce appraise_exec_tcb and appraise_tmpfs policies
` [PATCH 5/7] ima: Introduce appraise_exec_immutable policy
` [PATCH 6/7] evm: Allow choice of hash algorithm for HMAC
` [PATCH 7/7] evm: Extend evm= with allow_metadata_writes and complete values
[PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
2021-04-09 5:50 UTC (2+ messages)
Question about the available tests for IMA apprise
2021-04-08 18:34 UTC (2+ messages)
[PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
2021-04-08 16:31 UTC (2+ messages)
[PATCH v4 0/4] crypto: add rsa pss support for x509
2021-04-08 13:12 UTC (6+ messages)
` [PATCH v4 1/4] x509: add support for rsa-pss
` [PATCH v4 2/4] crypto: support rsa-pss encoding
` [PATCH v4 3/4] crypto: add rsa pss test vector
` [PATCH v4 4/4] ima: add support for rsa pss verification
[PATCH 0/5] crypto: add rsa pss support for x509
2021-04-08 7:41 UTC (6+ messages)
` [PATCH v2 1/4] x509: add support for rsa-pss
` [PATCH v2 2/4] crypto: support rsa-pss encoding
` [PATCH v2 3/4] crypto: add rsa pss test vector
` [PATCH v2 4/4] ima: add support for rsa pss verification
[PATCH 0/2] Add support for ECDSA-signed kernel modules
2021-04-07 20:15 UTC (7+ messages)
` [PATCH 1/2] certs: Trigger recreation of module signing key if it's not an RSA key
` [PATCH 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH v5 00/12] evm: Improve usability of portable signatures
2021-04-07 19:28 UTC (20+ messages)
` [PATCH v5 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
` [PATCH v5 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
` [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
` [PATCH v5 05/12] evm: Introduce evm_status_revalidate()
` [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
` [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
` [PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
` [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
` [RESEND][PATCH "
` [PATCH v5 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
` [PATCH v5 11/12] ima: Introduce template field evmsig and write to field sig as fallback
` [PATCH v5 12/12] ima: Don't remove security.ima if file must not be appraised
[PATCH v7 0/5] Enable root to update the blacklist keyring
2021-04-07 17:21 UTC (2+ messages)
[PATCH 0/5] crypto: add rsa pss support for x509
2021-04-07 8:54 UTC (10+ messages)
` [PATCH 1/5] x509: add support for rsa-pss
` [PATCH 2/5] crypto: support rsa-pss encoding
` [PATCH 3/5] crypto: add rsa pss test vector
` [PATCH 4/5] crypto: ecdsa ima support
` [PATCH 5/5] ima: add support for rsa pss verification
` [PATCH 0/5] crypto: add rsa pss support for x509(Internet mail)
[PATCH v3 0/4] crypto: add rsa pss support for x509
2021-04-07 8:40 UTC (6+ messages)
` [PATCH v3 1/4] x509: add support for rsa-pss
` [PATCH v3 2/4] crypto: support rsa-pss encoding
` [PATCH v3 3/4] crypto: add rsa pss test vector
` [PATCH v3 4/4] ima: add support for rsa pss verification
[PATCH v2 0/4] crypto: add rsa pss support for x509
2021-04-07 3:03 UTC
[PATCH] rsa: add pss encoding support
2021-04-06 13:32 UTC
[PATCH v3 0/3] ima: kernel build support for loading the kernel module signing key
2021-04-02 11:29 UTC (7+ messages)
` [PATCH v3 1/3] keys: cleanup build time module signing keys
` [PATCH v3 2/3] ima: enable signing of modules with build time generated key
` [PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring
[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-04-02 1:49 UTC (54+ messages)
` [PATCH v1 3/3] "
Bidding invitation
2021-03-31 7:12 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).