linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-01-25 19:50:51 to 2022-02-07 07:54:37 UTC [more...]

[PATCH 0/2] Fix bugs in public_key_verify_signature()
 2022-02-07  7:45 UTC  (9+ messages)
` [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
` [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding

[GIT PULL] integrity: subsystem fixes for v5.17
 2022-02-06 23:32 UTC 

[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
 2022-02-06 17:20 UTC  (38+ messages)
` [PATCH v10 01/27] ima: Remove ima_policy file before directory
` [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
` [PATCH v10 04/27] securityfs: rework dentry creation
` [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
` [PATCH v10 07/27] ima: Move ima_htable "
` [PATCH v10 08/27] ima: Move measurement list related variables "
` [PATCH v10 09/27] ima: Move some IMA policy and filesystem "
` [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
  ` [PATCH] ima: fix semicolon.cocci warnings
` [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v10 17/27] ima: Add functions for creating and "
` [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v10 19/27] integrity: Add optional callback function to integrity_inode_free()
` [PATCH v10 20/27] ima: Namespace audit status flags
` [PATCH v10 21/27] ima: Remove unused iints from the integrity_iint_cache
` [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
` [PATCH v10 23/27] ima: Setup securityfs for IMA namespace
` [PATCH v10 24/27] ima: Introduce securityfs file to activate an "
` [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
` [PATCH v10 27/27] ima: Enable IMA namespaces

[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
 2022-02-06 10:36 UTC  (2+ messages)

[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-02-04  6:27 UTC  (5+ messages)

[PATCH v5 0/6] KEXEC_SIG with appended signature
 2022-02-03 10:49 UTC  (11+ messages)
` [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification
` [PATCH v5 4/6] module: strip the signature marker in the verification function
` [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
` [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig

[RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
 2022-02-03  3:42 UTC  (8+ messages)

[PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
 2022-02-02 23:53 UTC  (4+ messages)
` [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser

Koszty instalacji fotowoltaicznej
 2022-02-01  9:17 UTC 

[PATCH v3 0/8] ima: support fs-verity digests and signatures
 2022-02-01 19:20 UTC  (15+ messages)
` [PATCH v3 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
` [PATCH v3 2/8] ima: define ima_max_digest_data struct without a flexible array variable
` [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
` [PATCH v3 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
` [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
` [PATCH v3 6/8] ima: define signature version 3
` [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
` [PATCH v3 8/8] fsverity: update the documentation

[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
 2022-01-31 23:43 UTC  (65+ messages)
` [PATCH v9 01/23] ima: Remove ima_policy file before directory
` [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
` [PATCH v9 03/23] securityfs: rework dentry creation
` [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
` [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
` [PATCH v9 07/23] ima: Move ima_htable "
` [PATCH v9 08/23] ima: Move measurement list related variables "
` [PATCH v9 09/23] ima: Move some IMA policy and filesystem "
` [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
` [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v9 17/23] ima: Add functions for creating and "
` [PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v9 19/23] ima: Namespace audit status flags
` [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
` [PATCH v9 21/23] ima: Introduce securityfs file to activate an "
` [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v9 23/23] ima: Enable IMA namespaces

[RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
 2022-01-31 20:51 UTC  (15+ messages)
` [RFC][PATCH v3a 06/11] fsverity: Introduce fsverity_get_formatted_digest()
` [RFC][PATCH v3a 07/11] fsverity: Introduce fsverity_get_signature()
` [RFC][PATCH v3a 08/11] fsverity: Completely disable signature verification if not requested
` [RFC][PATCH v3a 09/11] ima: Add support for fsverity signatures
` [RFC][PATCH v3a 10/11] evm: Include fsverity formatted digest in the HMAC/digest calculation

[PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
 2022-01-31 19:20 UTC  (2+ messages)

[PATCH v8 0/5] Enable root to update the blacklist keyring
 2022-01-31 11:33 UTC  (8+ messages)

[RESEND][PATCH] Documentation: added order requirement for ima_hash=
 2022-01-28 16:01 UTC  (18+ messages)

[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
 2022-01-27 14:52 UTC  (3+ messages)
` [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/

[PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-01-27  5:42 UTC  (2+ messages)

[PATCH v4] integrity: check the return value of audit_log_start()
 2022-01-27  2:19 UTC  (2+ messages)

[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-01-26 20:21 UTC  (2+ messages)

[PATCH][next] tpm: xen-tpmfront: Use struct_size() helper
 2022-01-26 14:38 UTC  (2+ messages)

[PATCH ima-evm-utils] Signing fs-verity file digest based on existing evmctl commands
 2022-01-26  0:13 UTC 

[PATCH v3 1/1] ci/travis: Replace groovy -> impish
 2022-01-25 23:16 UTC  (3+ messages)

[PATCH v4 0/6] KEXEC_SIG with appended signature
 2022-01-25 19:50 UTC  (3+ messages)
` [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).