linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-01 10:29:09 to 2021-04-22 16:12:10 UTC [more...]

[PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure
 2021-04-22 16:12 UTC  (12+ messages)
` [PATCH v2 1/6] xattr: Complete constify ->name member of "struct xattr"
` [PATCH v2 2/6] reiserfs: Add missing calls to reiserfs_security_free()
` [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
` [PATCH v2 4/6] security: Support multiple LSMs implementing "
` [PATCH v2 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH v2 6/6] evm: Support multiple LSMs providing an xattr

[PATCH] ima: require CONFIG_MODULES for IMA_APPRAISE_MODSIG
 2021-04-22 13:29 UTC 

[PATCH] KEYS: trusted: fix TPM trusted keys for generic framework
 2021-04-22  4:57 UTC  (2+ messages)

[PATCH v9 0/4] Introduce TEE based Trusted Keys support
 2021-04-22  4:47 UTC  (6+ messages)
` [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework

[PATCH] KEYS: trusted: Fix TPM reservation for seal/unseal
 2021-04-21 23:11 UTC  (2+ messages)

[PATCH v3 0/2] Add support for ECDSA-signed kernel modules
 2021-04-21 19:43 UTC  (3+ messages)
` [PATCH v3 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v3 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v2 0/2] Add support for ECDSA-signed kernel modules
 2021-04-21 12:58 UTC  (12+ messages)
` [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH 000/141] Fix fall-through warnings for Clang
 2021-04-20 22:17 UTC  (5+ messages)
` [PATCH 010/141] ima: "

[PATCH 0/3] ima-evm-utils: Implement function to only create IMA signature
 2021-04-20 18:30 UTC  (4+ messages)
` [PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
` [PATCH 2/3] tests: Add program to create IMA signature with new API call
` [PATCH 3/3] libimaevm: Have sign_hash_v2 call sign_hash_v2_pkey after reading key file

[PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
 2021-04-20 16:09 UTC  (12+ messages)
` [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
` [PATCH 2/5] security: Support multiple LSMs implementing the inode_init_security hook
` [PATCH 3/5] security: Pass xattrs allocated by LSMs to "
` [PATCH 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH 5/5] evm: Support multiple LSMs providing an xattr

[PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
 2021-04-20  3:10 UTC 

[RFC PATCH] integrity: fix null ptr dereference in integrity_inode_free()
 2021-04-19 18:18 UTC 

[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
 2021-04-19 15:22 UTC  (8+ messages)
` [PATCH 1/6] libimaevm: Properly check for error returned by EVP_DigestUpdate
` [PATCH 2/6] libimaevm: Remove unused off variable
` [PATCH 3/6] libimaevm: Rename variable returned from readlink to len
` [PATCH 4/6] libimaevm: Rename variable from cr to newline
` [PATCH 5/6] libimaevm: Report unsupported filetype using log_err
` [PATCH 6/6] libimaevm: Use function parameter algo for name of hash

linux-next: Tree for Apr 16 (IMA appraise causing build error)
 2021-04-16 20:32 UTC  (3+ messages)

[PATCH] KEYS: trusted: fix a couple error pointer dereferences
 2021-04-16 14:08 UTC  (5+ messages)

[PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
 2021-04-15 16:28 UTC  (4+ messages)
` [PATCH v3 2/2] tests/install-swtpm.sh: Add tar option --no-same-owner

[PATCH 1/1] travis: Add Docker Hub pull rate limit workaround
 2021-04-15 12:56 UTC 

null-ptr-deref in integrity_inode_free()
 2021-04-14 20:36 UTC  (4+ messages)

[GIT PULL] TPM DEVICE DRIVER updates for v5.13
 2021-04-14 13:58 UTC 

[PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
 2021-04-14 11:07 UTC  (6+ messages)

Bug: TPM returned invalid status
 2021-04-14 11:05 UTC  (8+ messages)
          ` Aw: "
            `  "

[PATCH] security: keys: trusted: prevent memory leak in error path
 2021-04-13 20:13 UTC 

[PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
 2021-04-13 12:49 UTC  (3+ messages)

[PATCH v6 24/40] fs: make helpers idmap mount aware
 2021-04-13  8:26 UTC  (3+ messages)

[PATCH -next] KEYS: trusted: Switch to kmemdup_nul()
 2021-04-12 16:00 UTC 

[PATCH v2] integrity: Add declarations to init_once void arguments
 2021-04-10  3:19 UTC  (4+ messages)

[PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
 2021-04-09 18:48 UTC  (5+ messages)
` [PATCH v4 1/3] keys: cleanup build time module signing keys
` [PATCH v4 2/3] ima: enable signing of modules with build time generated key
` [PATCH v4 3/3] ima: enable loading of build time generated key on .ima keyring

[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-04-09 17:15 UTC  (3+ messages)

[PATCH 0/7] ima/evm: Small enhancements
 2021-04-09 11:43 UTC  (8+ messages)
` [PATCH 1/7] ima: Avoid measurement and audit if access to the file will be denied
` [PATCH 2/7] ima: Add meta_immutable appraisal type
` [PATCH 3/7] ima: Introduce exec_tcb and tmpfs policies
` [PATCH 4/7] ima: Introduce appraise_exec_tcb and appraise_tmpfs policies
` [PATCH 5/7] ima: Introduce appraise_exec_immutable policy
` [PATCH 6/7] evm: Allow choice of hash algorithm for HMAC
` [PATCH 7/7] evm: Extend evm= with allow_metadata_writes and complete values

[PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
 2021-04-09  5:50 UTC  (2+ messages)

Question about the available tests for IMA apprise
 2021-04-08 18:34 UTC  (2+ messages)

[PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
 2021-04-08 16:31 UTC  (2+ messages)

[PATCH v4 0/4] crypto: add rsa pss support for x509
 2021-04-08 13:12 UTC  (6+ messages)
` [PATCH v4 1/4] x509: add support for rsa-pss
` [PATCH v4 2/4] crypto: support rsa-pss encoding
` [PATCH v4 3/4] crypto: add rsa pss test vector
` [PATCH v4 4/4] ima: add support for rsa pss verification

[PATCH 0/5] crypto: add rsa pss support for x509
 2021-04-08  7:41 UTC  (6+ messages)
` [PATCH v2 1/4] x509: add support for rsa-pss
` [PATCH v2 2/4] crypto: support rsa-pss encoding
` [PATCH v2 3/4] crypto: add rsa pss test vector
` [PATCH v2 4/4] ima: add support for rsa pss verification

[PATCH 0/2] Add support for ECDSA-signed kernel modules
 2021-04-07 20:15 UTC  (7+ messages)
` [PATCH 1/2] certs: Trigger recreation of module signing key if it's not an RSA key
` [PATCH 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v5 00/12] evm: Improve usability of portable signatures
 2021-04-07 19:28 UTC  (20+ messages)
` [PATCH v5 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
` [PATCH v5 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
` [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
` [PATCH v5 05/12] evm: Introduce evm_status_revalidate()
` [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
` [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
` [PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
` [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
    ` [RESEND][PATCH "
` [PATCH v5 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
` [PATCH v5 11/12] ima: Introduce template field evmsig and write to field sig as fallback
` [PATCH v5 12/12] ima: Don't remove security.ima if file must not be appraised

[PATCH v7 0/5] Enable root to update the blacklist keyring
 2021-04-07 17:21 UTC  (2+ messages)

[PATCH 0/5] crypto: add rsa pss support for x509
 2021-04-07  8:54 UTC  (10+ messages)
` [PATCH 1/5] x509: add support for rsa-pss
` [PATCH 2/5] crypto: support rsa-pss encoding
` [PATCH 3/5] crypto: add rsa pss test vector
` [PATCH 4/5] crypto: ecdsa ima support
` [PATCH 5/5] ima: add support for rsa pss verification
  ` [PATCH 0/5] crypto: add rsa pss support for x509(Internet mail)

[PATCH v3 0/4] crypto: add rsa pss support for x509
 2021-04-07  8:40 UTC  (6+ messages)
` [PATCH v3 1/4] x509: add support for rsa-pss
` [PATCH v3 2/4] crypto: support rsa-pss encoding
` [PATCH v3 3/4] crypto: add rsa pss test vector
` [PATCH v3 4/4] ima: add support for rsa pss verification

[PATCH v2 0/4] crypto: add rsa pss support for x509
 2021-04-07  3:03 UTC 

[PATCH] rsa: add pss encoding support
 2021-04-06 13:32 UTC 

[PATCH v3 0/3] ima: kernel build support for loading the kernel module signing key
 2021-04-02 11:29 UTC  (5+ messages)
` [PATCH v3 2/3] ima: enable signing of modules with build time generated key
` [PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring

[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-04-02  1:49 UTC  (33+ messages)
  ` [PATCH v1 3/3] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).