messages from 2024-03-24 02:14:42 to 2024-04-12 07:36:47 UTC [more...]
[ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
2024-04-12 7:36 UTC (4+ messages)
[PATCH v8 0/6] DCP as trusted keys backend
2024-04-12 6:26 UTC (14+ messages)
` [PATCH v8 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
` [PATCH v8 2/6] KEYS: trusted: improve scalability of trust source config
` [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
` [EXT] "
` [PATCH v8 4/6] MAINTAINERS: add entry for DCP-based "
` [PATCH v8 5/6] docs: document DCP-backed trusted keys kernel params
` [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
` [EXT] "
TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
2024-04-11 23:21 UTC (8+ messages)
[PATCH 0/2] TPM documentation updates
2024-04-11 10:50 UTC (4+ messages)
` [PATCH 1/2] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
` [PATCH 2/2] Documentation: tpm_tis
[PATCH][next] tpm/eventlog: remove redundant assignment to variabel ret
2024-04-11 8:49 UTC
[PATCH v6] ima: add crypto agility support for template-hash algorithm
2024-04-10 14:13 UTC (4+ messages)
[PATCH 00/34] address all -Wunused-const warnings
2024-04-10 8:02 UTC (11+ messages)
` [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
` (subset) [PATCH 00/34] address all -Wunused-const warnings
[PATCH v3 00/10] evm: Support signatures on stacked filesystem
2024-04-09 21:29 UTC (2+ messages)
[GIT PULL] security changes for v6.9-rc3
2024-04-09 20:14 UTC (12+ messages)
[PATCH v5] ima: add crypto agility support for template-hash algorithm
2024-04-08 16:01 UTC (4+ messages)
[PATCH 0/1] char: tpm: Handle HAS_IOPORT dependencies
2024-04-05 21:02 UTC (9+ messages)
` [PATCH 1/1] char: tpm: handle "
[PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
2024-04-05 14:17 UTC (5+ messages)
[PATCH RFC 0/8] Clavis LSM
2024-04-05 12:56 UTC (4+ messages)
` [PATCH RFC 1/8] certs: Introduce ability to link to a system key
[PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
2024-04-04 14:55 UTC (20+ messages)
` [PATCH v8 04/15] x86: Secure Launch Resource Table header file
` [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
[RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
2024-04-03 22:21 UTC (5+ messages)
[PATCH v7 00/21] add integrity and security to TPM2 transactions
2024-04-03 15:43 UTC (14+ messages)
` [PATCH v7 12/21] tpm: Add NULL primary creation
[PATCH v16 00/20] Integrity Policy Enforcement LSM (IPE)
2024-04-03 5:10 UTC (36+ messages)
` [PATCH v16 01/20] security: add ipe lsm
` [PATCH v16 02/20] ipe: add policy parser
` [PATCH v16 03/20] ipe: add evaluation loop
` [PATCH v16 04/20] ipe: add LSM hooks on execution and kernel read
` [PATCH v16 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
` [PATCH v16 06/20] ipe: introduce 'boot_verified' as a trust provider
` [PATCH v16 07/20] security: add new securityfs delete function
` [PATCH v16 08/20] ipe: add userspace interface
` [PATCH v16 09/20] uapi|audit|ipe: add ipe auditing support
` [PATCH v16 10/20] ipe: add permissive toggle
` [PATCH v16 11/20] block|security: add LSM blob to block_device
` [PATCH v16 12/20] dm: add finalize hook to target_type
` [PATCH v16 13/20] dm verity: consume root hash digest and signature data via LSM hook
` [PATCH v16 14/20] ipe: add support for dm-verity as a trust provider
` [PATCH v16 15/20] security: add security_inode_setintegrity() hook
` [PATCH v16 16/20] fsverity: consume fsverity built-in signatures via LSM hook
` [PATCH v16 17/20] ipe: enable support for fs-verity as a trust provider
` [PATCH v16 18/20] scripts: add boot policy generation program
` [PATCH v16 19/20] ipe: kunit test for parser
` [PATCH v16 20/20] documentation: add ipe documentation
[GIT PULL] security changes for v6.9-rc3
2024-04-02 12:15 UTC (2+ messages)
[PATCH v2] security: Handle dentries without inode in security_path_post_mknod()
2024-04-02 8:18 UTC
[PATCH v4][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
2024-04-01 18:42 UTC
[GIT PULL] tpmdd changes for v6.9-rc2
2024-04-01 13:17 UTC (6+ messages)
[PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
2024-03-29 19:56 UTC (10+ messages)
` [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
[PATCH] ima: Fix use-after-free on a dentry's dname.name
2024-03-29 1:02 UTC (2+ messages)
[PATCH v7 0/6] DCP as trusted keys backend
2024-03-28 18:50 UTC (13+ messages)
` [PATCH v7 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
` [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
` [PATCH v7 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
` [PATCH v7 4/6] MAINTAINERS: add entry for DCP-based "
` [PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
` [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
kernel crash in mknod
2024-03-28 13:03 UTC (19+ messages)
[PATCH] ima: define an init_module critical data record
2024-03-28 3:08 UTC (4+ messages)
Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
2024-03-25 16:05 UTC (3+ messages)
[PATCH v3 00/32] spi: get rid of some legacy macros
2024-03-25 2:13 UTC (3+ messages)
[PATCH v4] Documentation: tpm_tis
2024-03-24 2:14 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).