messages from 2023-12-15 11:07:06 to 2024-01-08 17:15:35 UTC [more...]
[RFC V2] IMA Log Snapshotting Design Proposal
2024-01-08 17:15 UTC (18+ messages)
[PATCH v4 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
2024-01-08 9:57 UTC (5+ messages)
` [PATCH v4 1/4] arch/x86: Move UAPI setup structures into setup_data.h
` [PATCH v4 2/4] arch/x86: Move internal setup_data "
` [PATCH v4 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
` [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
[PATCH v3 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
2024-01-08 9:03 UTC (7+ messages)
` [PATCH v3 1/4] arch/x86: Move UAPI setup structures into setup_data.h
` [PATCH v3 2/4] arch/x86: Move internal setup_data "
` [PATCH v3 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
` [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
[PATCH v3 0/7] ima: kexec: measure events between kexec load and execute
2024-01-07 17:00 UTC (19+ messages)
` [PATCH v3 1/7] ima: define and call ima_alloc_kexec_file_buf
` [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
` [PATCH v3 3/7] ima: kexec: map IMA buffer source pages to image after kexec load
` [PATCH v3 4/7] kexec: update kexec_file_load syscall to alloc ima buffer after load
` [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
` [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
` [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
[PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
2024-01-05 16:02 UTC (9+ messages)
` "
[PATCH v6 00/20] add integrity and security to TPM2 transactions
2024-01-05 15:36 UTC (39+ messages)
` [PATCH v6 01/20] tpm: Remove unused tpm_buf_tag()
` [PATCH v6 02/20] tpm: Remove tpm_send()
` [PATCH v6 03/20] tpm: Move buffer handling from static inlines to real functions
` [PATCH v6 04/20] tpm: Update struct tpm_buf documentation comments
` [PATCH v6 05/20] tpm: Store the length of the tpm_buf data separately
` [PATCH v6 06/20] tpm: TPM2B formatted buffers
` [PATCH v6 07/20] tpm: Add tpm_buf_read_{u8,u16,u32}
` [PATCH v6 08/20] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
` [PATCH v6 09/20] crypto: lib - implement library version of AES in CFB mode
` [PATCH v6 10/20] tpm: add buffer function to point to returned parameters
` [PATCH v6 11/20] tpm: export the context save and load commands
` [PATCH v6 12/20] tpm: Add NULL primary creation
` [PATCH v6 13/20] tpm: Add HMAC session start and end functions
` [PATCH v6 14/20] tpm: Add HMAC session name/handle append
` [PATCH v6 15/20] tpm: Add the rest of the session HMAC API
` [PATCH v6 16/20] tpm: add hmac checks to tpm2_pcr_extend()
` [PATCH v6 17/20] tpm: add session encryption protection to tpm2_get_random()
` [PATCH v6 18/20] KEYS: trusted: Add session encryption protection to the seal/unseal path
` [PATCH v6 19/20] tpm: add the null key name as a sysfs export
` [PATCH v6 20/20] Documentation: add tpm-security.rst
[PATCH] dt-bindings: tpm: Add compatible string atmel,attpm20p
2024-01-04 19:11 UTC (5+ messages)
[ima-evm-utils PATCH v3 00/13] Address non concurrency-safe libimaevm global variables
2024-01-04 19:05 UTC (14+ messages)
` [ima-evm-utils PATCH v3 01/13] Rename "public_keys" to "g_public_keys"
` [ima-evm-utils PATCH v3 02/13] Free public keys list
` [ima-evm-utils PATCH v3 03/13] Update library function definitions to include a "public_keys" parameter
` [ima-evm-utils PATCH v3 04/13] Update imaevm_verify_hash() definition to include "hash_algo" parameter
` [ima-evm-utils PATCH v3 05/13] Update cmd_verify_ima() to define and use a local list of public keys
` [ima-evm-utils PATCH v3 06/13] Update cmd_verify_evm "
` [ima-evm-utils PATCH v3 07/13] Update ima_measurements "
` [ima-evm-utils PATCH v3 08/13] Define library ima_calc_hash2() function with a hash algorithm parameter
` [ima-evm-utils PATCH v3 09/13] Use a local hash algorithm variable when verifying file signatures
` [ima-evm-utils PATCH v3 10/13] Update EVM signature verification to use a local hash algorithm variable
` [ima-evm-utils PATCH v3 11/13] Use a file specific hash algorithm variable for signing files
` [ima-evm-utils PATCH v3 12/13] Update sign_hash_v*() definition to include the key password
` [ima-evm-utils PATCH v3 13/13] Define and use a file specific "keypass" variable
[PATCH v3 0/4] dt-bindings: tpm: Clean all the things
2024-01-03 20:31 UTC (7+ messages)
` [PATCH v3 1/4] dt-bindings: tpm: Consolidate TCG TIS bindings
` [PATCH v3 2/4] dt-bindings: tpm: Convert Google Cr50 bindings to DT schema
` [PATCH v3 3/4] dt-bindings: tpm: Convert IBM vTPM "
` [PATCH v3 4/4] dt-bindings: tpm: Document Microsoft fTPM bindings
[PATCH] tpm_tis_spi: Add compatible string atmel,attpm20p
2024-01-03 16:10 UTC (4+ messages)
TPM interrupt patch on LTS
2024-01-03 14:08 UTC (2+ messages)
[PATCH v2 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
2024-01-03 13:45 UTC (10+ messages)
` [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
` [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
` [PATCH v2 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
[PATCH] tpm: cr50: fix kernel-doc warning and spelling
2024-01-03 13:43 UTC (2+ messages)
[PATCH v8] ARM: dts: aspeed: Adding Facebook Bletchley BMC
2024-01-03 3:21 UTC (3+ messages)
[PATCH v8 00/24] security: Move IMA and EVM to the LSM infrastructure
2024-01-02 17:44 UTC (25+ messages)
` [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
` [PATCH v8 13/24] security: Introduce file_release hook
` [PATCH v8 19/24] ima: Move to LSM infrastructure
` [PATCH v8 20/24] ima: Move IMA-Appraisal "
` [PATCH v8 21/24] evm: Move "
` [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
` [PATCH v8 23/24] ima: "
[ima-evm-utils PATCH v2 00/13] Address non concurrency-safe libimaevm global variables
2024-01-02 13:46 UTC (11+ messages)
` [ima-evm-utils PATCH v2 03/13] Update library function definitions to include a "public_keys" parameter
` [ima-evm-utils PATCH v2 05/13] Update cmd_verify_ima() to define and use a local list of public keys
` [ima-evm-utils PATCH v2 11/13] Use a file specific hash algorithm variable for signing files
` [ima-evm-utils PATCH v2 12/13] Update sign_hash_v*() definition to include the key password
` [ima-evm-utils PATCH v2 13/13] Define and use a file specific "keypass" variable
[RFC][PATCH] ima: add crypto agility support for template-hash algorithm
2023-12-27 14:03 UTC (7+ messages)
[PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
2023-12-21 10:09 UTC (9+ messages)
` [PATCH 2/2] "
[PATCH v2 0/3] evm: disable EVM on overlayfs
2023-12-20 14:19 UTC (9+ messages)
` [PATCH v2 1/3] evm: don't copy up 'security.evm' xattr
` [PATCH v2 2/3] evm: add support to disable EVM on unsupported filesystems
` [PATCH v2 3/3] overlay: disable EVM
[PATCH 0/2] evm: disable EVM on overlayfs
2023-12-19 14:47 UTC (5+ messages)
` [PATCH 1/2] evm: don't copy up 'security.evm' xattr
` [PATCH 2/2] evm: add support to disable EVM on unsupported filesystems
[PATCH v5 0/6] DCP as trusted keys backend
2023-12-19 0:45 UTC (8+ messages)
` [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
` [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
` [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
` [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based "
` [PATCH v5 5/6] docs: document DCP-backed trusted keys kernel params
` [PATCH v5 6/6] docs: trusted-encrypted: add DCP as new trust source
[PATCH v2 0/3] dt-bindings: tpm: Clean all the things
2023-12-18 21:01 UTC (7+ messages)
` [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
IMA performance regression in 5.10.194 when using overlayfs
2023-12-18 19:39 UTC (6+ messages)
[PATCH v2] tpm: tis_i2c: Add compatible string nuvoton,npct75x
2023-12-17 11:10 UTC
[RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
2023-12-16 9:47 UTC (3+ messages)
[PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
2023-12-15 22:16 UTC (5+ messages)
` [PATCH v39 10/42] LSM: Use lsmblob in security_current_getsecid
` [PATCH v39 11/42] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v39 13/42] LSM: Create new security_cred_getlsmblob LSM hook
` [PATCH v39 16/42] LSM: Ensure the correct LSM context releaser
[PATCH 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
2023-12-15 12:16 UTC (7+ messages)
` [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
` [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).