Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v2 6/6] evm: Support multiple LSMs providing an xattr
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 4/6] security: Support multiple LSMs implementing the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 2/6] reiserfs: Add missing calls to reiserfs_security_free()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 1/6] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
[PATCH 3/3] libimaevm: Have sign_hash_v2 call sign_hash_v2_pkey after reading key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 2/3] tests: Add program to create IMA signature with new API call
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/3] ima-evm-utils: Implement function to only create IMA signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
[PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
[RFC PATCH] integrity: fix null ptr dereference in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/6] libimaevm: Rename variable returned from readlink to len
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 6/6] libimaevm: Use function parameter algo for name of hash
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 4/6] libimaevm: Rename variable from cr to newline
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 5/6] libimaevm: Report unsupported filetype using log_err
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 3/6] libimaevm: Rename variable returned from readlink to len
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/6] libimaevm: Properly check for error returned by EVP_DigestUpdate
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 2/6] libimaevm: Remove unused off variable
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
RE: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 1/1] travis: Add Docker Hub pull rate limit workaround
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 2/2] tests/install-swtpm.sh: Add tar option --no-same-owner
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
[PATCH 5/5] evm: Support multiple LSMs providing an xattr
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 3/5] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/5] security: Support multiple LSMs implementing the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.13
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: Re: Bug: TPM returned invalid status
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH] security: keys: trusted: prevent memory leak in error path
From
: Muhammad Usama Anjum <musamaanjum@xxxxxxxxx>
Re: [PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Colin Ian King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH -next] KEYS: trusted: Switch to kmemdup_nul()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Anton Altaparmakov <anton@xxxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: bauen1 <j2468h@xxxxxxxxxxxxxx>
[PATCH v4 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 1/3] keys: cleanup build time module signing keys
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 2/3] ima: enable signing of modules with build time generated key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 6/7] evm: Allow choice of hash algorithm for HMAC
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 7/7] evm: Extend evm= with allow_metadata_writes and complete values
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 5/7] ima: Introduce appraise_exec_immutable policy
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 4/7] ima: Introduce appraise_exec_tcb and appraise_tmpfs policies
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/7] ima: Add meta_immutable appraisal type
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 3/7] ima: Introduce exec_tcb and tmpfs policies
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/7] ima: Avoid measurement and audit if access to the file will be denied
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/7] ima/evm: Small enhancements
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Aw: Re: Bug: TPM returned invalid status
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
[PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: Question about the available tests for IMA apprise
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
Re: Bug: TPM returned invalid status
From
: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
Re: [PATCH v2 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[RESEND][PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
RE: [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v4 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
Re: [PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 12/12] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 05/12] evm: Introduce evm_status_revalidate()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 00/12] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 0/5] crypto: add rsa pss support for x509(Internet mail)
From
: herberthbli(李弘博) <herberthbli@xxxxxxxxxxx>
Re: [PATCH v3 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/5] crypto: add rsa pss support for x509
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 0/5] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
[PATCH 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/2] certs: Trigger recreation of module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 2/5] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/5] x509: add support for rsa-pss
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] rsa: add pss encoding support
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 5/5] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 4/5] crypto: ecdsa ima support
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 3/5] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 2/5] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 1/5] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 0/5] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
Re: [PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 2/3] ima: enable signing of modules with build time generated key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Question about the available tests for IMA apprise
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v3 1/3] keys: cleanup build time module signing keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] IMA: Fix error in comment
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] ima: Fix function name error in comment.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
[PATCH v3 0/3] ima: kernel build support for loading the kernel module signing key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 2/3] ima: enable signing of modules with build time generated key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 1/3] keys: cleanup build time module signing keys
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH] IMA: Fix error in comment
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: Bug: TPM returned invalid status
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem fix for v5.12
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] integrity subsystem fix for v5.12
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix the error code for restoring the PCR value
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
RE: [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
RE: [PATCH] ima: Fix the error code for restoring the PCR value
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: 5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: 5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix the error code for restoring the PCR value
From
: Li Huafei <lihuafei1@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix function name error in comment.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: Fix function name error in comment.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
Re: [PATCH 2/2] IMA/ima_keys.sh: Require evmctl 1.3.2
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v4] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: 5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Paul Enuta <paulenuta@xxxxxxxxx>
Re: 5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Paul Enuta <paulenuta@xxxxxxxxx>
Re: 5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670
From
: Paul Enuta <paulenuta@xxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
[RFC PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[RFC PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: tee: fix build error due to missing include
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
Re: [PATCH] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: "tiantao (H)" <tiantao6@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: tee: fix build error due to missing include
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH] KEYS: trusted: tee: fix build error due to missing include
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 06/10] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 10/10] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 09/10] x509: Add OID for NIST P384 and extend parser for it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 05/10] ecdsa: Register NIST P384 and extend test suite
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 08/10] ima: Support EC keys for signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 03/10] crypto: Add NIST P384 curve parameters
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 04/10] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 02/10] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 07/10] x509: Add support for parsing x509 certs with ECDSA keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v12 01/10] oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v1 2/3] KEYS: trusted: implement fallback to kernel RNG
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v3] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] IMA/ima_keys.sh: Require evmctl 1.3.2
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH 2/2] IMA/ima_keys.sh: Require evmctl 1.3.2
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 1/2] IMA: Move check_evmctl to setup, add require_evmctl()
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Add test for selinux measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 4/5] certs: Factor out the blacklist hash creation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 02/40] fs: add id translation helpers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
[PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v7 4/5] certs: Factor out the blacklist hash creation
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v7 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 2/3] tpm: acpi: Check eventlog signature before using it
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 3/3] tpm: vtpm_proxy: Avoid reading host log when using a virtual device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 0/3] Fix bugs related to TPM2 event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
[PATCH v2 2/3] tpm: acpi: Check eventlog signature before using it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 3/3] tpm: vtpm_proxy: Avoid reading host log when using a virtual device
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 1/3] tpm: efi: Use local variable for calculating final log size
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 0/3] Fix bugs related to TPM2 event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/3] tpm: acpi: Check eventlog signature before using it
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/3] tpm: efi: Use local variable for calculating final log size
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: Fwd: TPM unaligned memory accesses
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v11 10/10] certs: Add support for using elliptic curve keys for signing modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 05/10] ecdsa: Register NIST P384 and extend test suite
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 03/10] crypto: Add NIST P384 curve parameters
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Fwd: TPM unaligned memory accesses
From
: Andrew James <ajames3254@xxxxxxxxx>
[PATCH v25 15/25] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH 3/3] tpm: vtpm_proxy: Avoid reading host log when using a virtual device
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/3] tpm: efi: Use local variable for calculating final log size
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 2/3] tpm: acpi: Check eventlog signature before using it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/3] Fix bugs related to TPM2 event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v11 02/10] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v11 09/10] x509: Add OID for NIST P384 and extend parser for it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 06/10] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 08/10] ima: Support EC keys for signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 10/10] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 05/10] ecdsa: Register NIST P384 and extend test suite
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 04/10] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 07/10] x509: Add support for parsing x509 certs with ECDSA keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 03/10] crypto: Add NIST P384 curve parameters
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 02/10] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 00/10] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 8/9] x509: Add OID for NIST P384 and extend parser for it
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 2/9] crypto: Add NIST P384 curve parameters
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 6/9] x509: Add support for parsing x509 certs with ECDSA keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] IMA: Allow only ima-buf template for key measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 10/11] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 11/11] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 07/11] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 05/11] evm: Introduce evm_status_revalidate()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 06/11] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 00/11] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 8/9] x509: Add OID for NIST P384 and extend parser for it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 3/9] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 2/9] crypto: Add NIST P384 curve parameters
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 7/9] ima: Support EC keys for signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 1/9] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v10 6/9] x509: Add support for parsing x509 certs with ECDSA keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.12-rc2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] IMA: Allow only ima-buf template for key measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 39/40] xfs: support idmapped mounts
From
: Christoph Hellwig <hch@xxxxxx>
[GIT PULL] TPM DEVICE DRIVER changes for v5.12-rc2
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] ima: Fix the error code for restoring the PCR value
From
: Li Huafei <lihuafei1@xxxxxxxxxx>
Re: [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 06/20] ima: Manual replacement of the deprecated strlcpy() with return values
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Replacing deprecated strlcpy with strscpy ~~~~~~~~~ Replace
From
: Palash Oswal <hello@xxxxxxxxxxxxxxx>
[PATCH] x86/sgx: Replace section->init_laundry_list with a temp list
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: yumeng <yumeng18@xxxxxxxxxx>
Re: [PATCH v9 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] tpm: Remove unintentional dump_stack() call
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Remove unintentional dump_stack() call
From
: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
Re: [PATCH v6 39/40] xfs: support idmapped mounts
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH v6 39/40] xfs: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v9 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v9 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v9 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v9 0/4] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Re: [PATCH] tpm: Add missing check in tpm_inf_recv
From
: dinghao.liu@xxxxxxxxxx
Re: [PATCH] tpm: Add missing check in tpm_inf_recv
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm/ppi: Constify static struct attribute_group
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] tpm: Remove unintentional dump_stack() call
From
: jarkko@xxxxxxxxxx
[PATCH] tpm: Add missing check in tpm_inf_recv
From
: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: yumeng <yumeng18@xxxxxxxxxx>
Re: [PATCH] tpm/ppi: Constify static struct attribute_group
From
: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
Re: [PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH 2/3] integrity: Allow specifying flags in integrity_load_cert
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 1/3] tpm: Add support for reading a TPM NV Index
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2] vio: make remove callback return void
From
: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] tpm: Add support for reading a TPM NV Index
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/3] tpm: Add support for reading a TPM NV Index
From
: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
[PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
From
: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
[PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
From
: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
[PATCH 2/3] integrity: Allow specifying flags in integrity_load_cert
From
: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
[PATCH v9 7/9] crypto: Add math to support fast NIST P384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 1/9] crypto: Add support for ECDSA signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 8/9] ecdsa: Register NIST P384 and extend test suite
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 6/9] crypto: Add NIST P384 curve parameters
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 5/9] x509: Add OID for NIST P384 and extend parser for it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 4/9] ima: Support EC keys for signature verification
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 3/9] x509: Add support for parsing x509 certs with ECDSA keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 0/9] Add support for x509 certs with NIST P384/256/192 keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] vio: make remove callback return void
From
: Arnd Bergmann <arnd@xxxxxxxxxx>
Re: [PATCH v2] vio: make remove callback return void
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/3] add params and ids to support nist_p384
From
: Saulo Alessandre de Lima <saulo.alessandre@xxxxxxxxx>
Re: [PATCH v2] vio: make remove callback return void
From
: Anatoly Pugachev <matorola@xxxxxxxxx>
[PATCH v2] vio: make remove callback return void
From
: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] IMA: Add test for dm-crypt measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v19 03/13] powerpc: Use ELF fields defined in 'struct kimage'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v19 02/13] arm64: Use ELF fields defined in 'struct kimage'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v19 01/13] kexec: Move ELF fields to struct kimage
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v3] IMA: support for duplicate measurement records
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] IMA: Add test for dm-crypt measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] IMA: support for duplicate measurement records
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 1/2] IMA: Generalize key measurement tests
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 0/2] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2 1/2] IMA: generalize key measurement tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Add test for selinux measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Add test for selinux measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] docs: ABI: testing: ima_policy: Fixed missing bracket
From
: Jonathan Corbet <corbet@xxxxxxx>
Re: [PATCH v2 1/3] add params and ids to support nist_p384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] IMA: generalize key measurement tests
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/3] adds math to support nist_p384 fast and changes routines to pass forward ecc_curve
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
[PATCH v2 3/3] adds nist_p384 register and unregister to support nist_p384 and tests
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
[PATCH v2 1/3] add params and ids to support nist_p384
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
Re: [PATCH v6 0/5] Enable root to update the blacklist keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 00/20] Manual replacement of all strlcpy in favor of strscpy
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
[PATCH 06/20] ima: Manual replacement of the deprecated strlcpy() with return values
From
: Romain Perier <romain.perier@xxxxxxxxx>
[PATCH 00/20] Manual replacement of all strlcpy in favor of strscpy
From
: Romain Perier <romain.perier@xxxxxxxxx>
Re: [PATCH] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] IMA: support for duplicate data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] IMA: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH] IMA: Check for ima-buf template is not required for keys tests
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
From
: Guenter Roeck <linux@xxxxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.12
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] integrity subsystem updates for v5.12
From
: pr-tracker-bot@xxxxxxxxxx
[PATCH 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 3/4] tpm: Fix test for interrupts
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 4/4] tpm: Only enable supported irqs
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 2/4] tpm: get locality before writing to TPM chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 0/4] Fixes for TPM interrupt handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v7] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v7] TPM fixes
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH v19 06/13] arm64: Use common of_kexec_alloc_and_setup_fdt()
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 05/13] of: Add a common kexec FDT setup function
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 07/13] powerpc: Use common of_kexec_alloc_and_setup_fdt()
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 10/13] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 09/13] powerpc: Enable passing IMA log to next kernel on kexec
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 08/13] powerpc: Move ima buffer fields to struct kimage
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 11/13] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 13/13] arm64: Enable passing IMA log to next kernel on kexec
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 12/13] powerpc: Delete unused function delete_fdt_mem_rsv()
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 02/13] arm64: Use ELF fields defined in 'struct kimage'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 03/13] powerpc: Use ELF fields defined in 'struct kimage'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v19 01/13] kexec: Move ELF fields to struct kimage
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 2/2] tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 4/9] security: keys: trusted: Store the handle of a loaded key
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 1/2] tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 9/9] pm: hibernate: seal the encryption key with a PCR policy
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 8/9] pm: hibernate: Verify the digest encryption key
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 4/9] security: keys: trusted: Store the handle of a loaded key
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH 0/9] Enable hibernation when Lockdown is enabled
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 1/3] add params and ids to support nist_p384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 3/3] add nist_p384 register and unregister to support nist_p384
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 3/3] add nist_p384 register and unregister to support nist_p384
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
[PATCH 2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
[PATCH 1/3] add params and ids to support nist_p384
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
[PATCH 1/3] add params and ids to support nist_p384
From
: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH] ima: Replacing deprecated strlcpy with strscpy ~~~~~~~~~ Replace
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] certs: Add support for using elliptic curve keys for signing modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 4/5] keys: define build time generated ephemeral kernel CA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 3/5] ima: update kernel module signing process during build
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/5] keys: generate self-signed module signing key using CSR
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/5] keys: cleanup build time module signing keys
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] ima: Replacing deprecated strlcpy with strscpy
From
: Palash Oswal <hello@xxxxxxxxxxxxxxx>
Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v3] IMA: support for duplicate measurement records
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] of: error: 'const struct kimage' has no member named 'arch'
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] IMA: support for duplicate data measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v2 4/5] keys: define build time generated ephemeral kernel CA key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 3/5] ima: update kernel module signing process during build
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 2/5] keys: generate self-signed module signing key using CSR
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 1/5] keys: cleanup build time module signing keys
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 0/5] ima: kernel build support for loading the kernel module signing key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]