Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v8 6/6] IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] libimaevm: make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v2 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 3/6] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 5/6] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 4/6] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 2/6] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 0/6] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 6/6] IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 1/6] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 0/1] ima: check control characters in policy path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] ima: check control characters in policy file path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- [PATCH 0/1] ima: check control characters in policy path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- [PATCH 6/6] dm ima: update dm documentation for ima measurement support
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] dm ima: update dm target attributes for ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] dm ima: add a warning in dm_init if duplicate ima events are not measured
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] dm ima: prefix ima event name related to device mapper with dm_
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] dm ima: add version info to dm related events in ima log
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] dm ima: prefix dm table hashes in ima log with hash algorithm
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] updates to device mapper target measurement using ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 13/14] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/14] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/14] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 08/14] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 ima-evm-utils 3/3] Create alternative tpm2_pcr_read() that uses IBM TSS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/8] evmctl: Extend libimaevm_params with ENGINE field and use it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/8] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/8] evmctl: Setup the pkcs11 engine if key has pkcs11: prefix
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 7/8] tests: Extend sign_verify test with pkcs11-specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/8] evmctl: Move code setting up engine to own funtion
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/8] evmctl: Handle engine initialization properly
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/8] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 13/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 08/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 07/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 06/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 12/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 09/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 03/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 05/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 01/14] x86/boot: Fix memremap of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 11/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 10/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] tests: Extend sign_verify test with pkcs11 specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 2/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 02/12] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v6 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v6 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v6 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v6 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v6 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 ima-evm-utils 3/3] Create alternative tpm2_pcr_read() that uses IBM TSS
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v5 ima-evm-utils 2/3] Change PCR iterator from int to uint32_t
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v5 ima-evm-utils 1/3] Expand the INSTALL instructions.
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v5 ima-evm-utils 0/3] Add alternative calls to IBM TSS library
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- Re: [PATCH v2] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Aw: Re: [PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] dm: measure data on table load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Alasdair G Kergon <agk@xxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v5 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v5 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v5 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v5 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v5 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v5 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [RFC][PATCH v2 11/12] diglim: Remote Attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [RFC][PATCH v2 11/12] diglim: Remote Attestation
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC][PATCH v2 05/12] diglim: Parser
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [RFC][PATCH v2 04/12] diglim: Methods
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 04/12] diglim: Methods
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [RFC][PATCH v2 03/12] diglim: Objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH v2 01/12] diglim: Overview
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 03/12] diglim: Objects
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [RFC][PATCH v2 01/12] diglim: Overview
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v2] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- RE: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Alasdair G Kergon <agk@xxxxxxxxxx>
- Re: [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v4 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] IMA: restrict the accepted digest algorithms for
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/2] char: tpm: cr50_i2c: convert to new probe interface
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- [PATCH v2 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v4 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v4 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v4 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v4 0/5] IMA: restrict the accepted digest algorithms for
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v4 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v3 3/4] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/4] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- [PATCH v3 4/4] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 3/4] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 2/4] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 1/4] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 0/4] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] char: tpm: cr50_i2c: convert to new probe interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 7/7] dm: add documentation for IMA measurement support
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 02/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 12/12] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 05/12] diglim: Parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 12/12] diglim: Tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 09/12] diglim: Interfaces - digest_query
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 07/12] diglim: Interfaces - digest_lists_loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 08/12] diglim: Interfaces - digest_label
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 03/12] diglim: Objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 04/12] diglim: Methods
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 02/12] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 01/12] diglim: Overview
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH v2 00/12] integrity: Introduce DIGLIM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 7/7] dm: add documentation for IMA measurement support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: block writes of the security.ima xattr with weak hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: block writes of the security.ima xattr with weak hash algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH ima-evm-utils v3] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] dm: add documentation for IMA measurement support
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] char: tpm: cr50_i2c: convert to new probe interface
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- [PATCH 1/2] char: tpm: Kconfig: remove bad i2c cr50 select
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: block writes of the security.ima xattr with weak hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: add policy support for restricting the accepted hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 7/7] Add tests for EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 6/7] Introduce TST_LIST variable to select a test to execute
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 5/7] Signal failures of tests executed by UML kernel with unclean shutdown
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 3/7] Add additional options to the container engine
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 4/7] Add functions to the testing library to run a test script with UML
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 1/7] Download UML kernel and signing key
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 0/7] ima-evm-utils: Add UML support and tests for EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH ima-evm-utils 2/7] Download mount-idmapped
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v1 2/4] dm: crypt: use new key_extract_material helper
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [RFC PATCH v1 1/4] keys: introduce key_extract_material helper
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [RFC PATCH v1 4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [RFC PATCH v1 3/4] ubifs: auth: remove never hit key type error check
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] dm: measure data on table load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] dm: measure data on table load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] dm: measure data on table load
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] dm: add documentation for IMA measurement support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] dm: measure data on table load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] device mapper target measurements using IMA
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] IMA: add policy support for restricting the accepted hash algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v2 3/3] IMA: honor the appraise_hash policy option
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v2 1/3] IMA: block writes of the security.ima xattr with weak hash algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v2 0/3] IMA: restrict the accepted digest algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] ima: Support euid keyword for buffer measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: andreas@xxxxxxxxxxx
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] evmctl: Remove left-over check S_ISDIR() for directory signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] CI: Add support for ALT Linux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v9 0/3] ima-evm-utils: Add --keyid option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: add an option to restrict the accepted hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] evmctl: Remove left-over check S_ISDIR() for directory signing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH ima-evm-utils v9 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v9 2/3] Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v9 1/3] Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v9 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/3] Fix out-of-bounds read
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/3] Remove unnecessary NULL pointer test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/3] Address "ignoring number of bytes read" messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: add an option to restrict the accepted hash algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: add an option to restrict the accepted hash algorithms
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Vikas Gupta <vikas.gupta@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v3] CI: Add support for ALT Linux
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] CI: Add support for ALT Linux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] CI: Add support for ALT Linux
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] IMA: add an option to restrict the accepted hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils] tests: list crypto algorithm tests skipped
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] dm: update target specific status functions to measure data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/3] CI: Do not install swtpm if it cannot work anyway
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 0/7] device mapper target measurements using IMA
- From: Thore Sommer <public@xxxxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Fix NULL pointer warning
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Fix NULL pointer warning
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] IMA: add an option to restrict the accepted hash algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v8 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/7] dm: update target specific status functions to measure data
- From: Alasdair G Kergon <agk@xxxxxxxxxx>
- [PATCH 7/7] dm: add documentation for IMA measurement support
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/7] dm: update target specific status functions to measure data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/7] dm: measure data on device rename
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/7] dm: measure data on table clear
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/7] dm: measure data on device remove
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/7] dm: measure data on table load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] dm: measure data on device resume
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/7] device mapper target measurements using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v8 0/3] ima-evm-utils: Add --keyid option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v8 4/5] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v8 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v8 3/3] Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v8 2/3] Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v8 1/3] Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v8 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/3] CI: Add support for ALT Linux
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/3] CI: Do not use sudo when it does not needed
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/3] CI: Do not install swtpm if it cannot work anyway
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] CI: Add GitHub Actions for ALT Linux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] CI: Add GitHub Actions for ALT Linux
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] CI: Add GitHub Actions for ALT Linux
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: vtpm_proxy: Fix race in init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: vtpm_proxy: Fix race in init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Vacation weeks 28, 29
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [no subject]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v2] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH ima-evm-utils v2 3/4] libimaevm: Remove calculation of a digest over a directory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 1/4] evmctl: Remove filtering support for file types unsupported by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 2/4] libimaevm: Remove calculation of a digest over a device file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 0/4] libimaevm: Remove digest calculations not supported by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 4/4] libimaevm: Remove calculation of a digest over a symbolic link
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 0/3] ima-evm-utils: Add --keyid option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] char: tpm: vtpm_proxy: Fix race in init
- From: Saubhik Mukherjee <saubhik.mukherjee@xxxxxxxxx>
- [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: Weak hash algorithms allowed with DIGEST_NG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Weak hash algorithms allowed with DIGEST_NG
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: Weak hash algorithms allowed with DIGEST_NG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: check control characters in policy path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- Weak hash algorithms allowed with DIGEST_NG
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH] ima: Support euid keyword for buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v2] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH RFC 10/12] integrity: add new keyring handler
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 07/12] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 04/12] integrity: add integrity_destroy_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 09/12] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 05/12] integrity: Introduce mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <i.zhbanov@xxxxxx>
- [PATCH 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <i.zhbanov@xxxxxx>
- Re: [PATCH v7 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima: Support euid keyword for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] libimaevm: Remove digest calculations not supported by IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/3] ima-evm-utils: Add --keyid option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 2/2] Add test for using sign_hash API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v7 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 2/2] Add test for using sign_hash API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 0/2] Fix use of sign_hash via API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 1/2] Fix sign_hash not observing the hashalgo argument
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH] ima: Support euid keyword for buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]