Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v4 ima-evm-utils 1/2] set default hash algorithm in configuration time, (continued)
- [PATCH v3 ima-evm-utils 0/2] make default hash algorithm dynamic,
Bruno Meneguele
- [PATCH v4 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
- [PATCH] IMA: set a default value for unknown digsig algorithms,
THOBY Simon
- [PATCH v3 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
- [syzbot] UBSAN: array-index-out-of-bounds in ima_inode_setxattr, syzbot
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.,
liqiong
- [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords,
Vitaly Chikunov
- [PATCH v4 00/12] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v4 06/12] KEYS: add a reference to mok keyring, Eric Snowberg
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys, Eric Snowberg
- [PATCH v4 03/12] KEYS: CA link restriction, Eric Snowberg
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK), Eric Snowberg
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring, Eric Snowberg
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca, Eric Snowberg
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init, Eric Snowberg
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys, Eric Snowberg
- [PATCH v4 10/12] integrity: store reference to mok keyring, Eric Snowberg
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK, Jarkko Sakkinen
- [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm,
Bruno Meneguele
- [PATCH] libimaevm: make SHA-256 the default hash algorithm, Bruno Meneguele
- [PATCH v2 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
- [PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password,
Bruno Meneguele
- [PATCH v8 0/6] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
- [PATCH 1/1] ima: check control characters in policy file path,
Tianxing Zhang
- [PATCH 0/1] ima: check control characters in policy path,
Tianxing Zhang
- [PATCH 0/6] updates to device mapper target measurement using ima,
Tushar Sugandhi
- [PATCH ima-evm-utils] Improve memory handling for private keys and passwords,
Vitaly Chikunov
- [PATCH v3 00/14] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca, Eric Snowberg
- [PATCH v3 08/14] KEYS: add a reference to mok keyring, Eric Snowberg
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys, Eric Snowberg
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK), Eric Snowberg
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v3 04/14] integrity: add add_to_mok_keyring, Eric Snowberg
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys, Eric Snowberg
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok, Eric Snowberg
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist, Eric Snowberg
- [PATCH v3 02/14] KEYS: CA link restriction, Eric Snowberg
- [PATCH v3 13/14] integrity: store reference to mok keyring, Eric Snowberg
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys, Eric Snowberg
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init, Eric Snowberg
- [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
- [PATCH ima-evm-utils] evmctl: fix memory leak in get_password,
Bruno Meneguele
- [PATCH v2 0/8] ima-evm-utils: Add support for signing with pkcs11 URIs,
Stefan Berger
- [PATCH v4 0/2] ibmvtpm: Avoid error message when process gets signal while waiting,
Stefan Berger
- [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
- [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support,
Ross Philipson
- [PATCH v3 10/14] x86: Secure Launch SMP bringup support, Ross Philipson
- [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures, Ross Philipson
- [PATCH v3 11/14] kexec: Secure Launch kexec SEXIT support, Ross Philipson
- [PATCH v3 01/14] x86/boot: Fix memremap of setup_indirect structures, Ross Philipson
- [PATCH v3 04/14] Documentation/x86: Secure Launch kernel documentation, Ross Philipson
- [PATCH v3 05/14] x86: Secure Launch Kconfig, Ross Philipson
- [PATCH v3 03/14] x86/boot: Place kernel_info at a fixed offset, Ross Philipson
- [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch, Ross Philipson
- [PATCH v3 09/14] x86: Secure Launch kernel late boot stub, Ross Philipson
- [PATCH v3 12/14] reboot: Secure Launch SEXIT support on reboot paths, Ross Philipson
- [PATCH v3 06/14] x86: Secure Launch main header file, Ross Philipson
- [PATCH v3 07/14] x86: Add early SHA support for Secure Launch early measurements, Ross Philipson
- [PATCH v3 08/14] x86: Secure Launch kernel early boot stub, Ross Philipson
- [PATCH v3 13/14] x86: Secure Launch late initcall platform module, Ross Philipson
- Re: [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support, Jarkko Sakkinen
- [PATCH 0/4] ima-evm-utils: Add support for signing with pkcs11 URIs,
Stefan Berger
- [PATCH v2] fscrypt: support trusted keys,
Ahmad Fatoum
- [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
- [PATCH v3 0/2] ibmvtpm: Avoid error message when process gets signal while waiting,
Stefan Berger
- [PATCH v3] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
- [PATCH v6 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
- [PATCH v5 ima-evm-utils 0/3] Add alternative calls to IBM TSS library,
Ken Goldman
- [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting,
Stefan Berger
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module,
Andreas Rammhold
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module,
Andreas Rammhold
- [PATCH v5 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
- [PATCH v2] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
- [PATCH v2 1/2] char: tpm: Kconfig: remove bad i2c cr50 select,
Adrian Ratiu
- [PATCH v4 0/5] IMA: restrict the accepted digest algorithms for,
THOBY Simon
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys,
Ahmad Fatoum
- [PATCH v3 0/4] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring, Eric Snowberg
- [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init, Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys, Eric Snowberg
- [PATCH RFC v2 12/12] integrity: store reference to mok keyring, Eric Snowberg
- [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca, Eric Snowberg
- [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK), Eric Snowberg
- [PATCH RFC v2 02/12] KEYS: CA link restriction, Eric Snowberg
- [PATCH RFC v2 09/12] KEYS: add a reference to mok keyring, Eric Snowberg
- [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring, Eric Snowberg
- [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist, Eric Snowberg
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK, Mimi Zohar
- [RFC][PATCH v2 00/12] integrity: Introduce DIGLIM,
Roberto Sassu
- [RFC][PATCH v2 01/12] diglim: Overview, Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions, Roberto Sassu
- [RFC][PATCH v2 04/12] diglim: Methods, Roberto Sassu
- [RFC][PATCH v2 03/12] diglim: Objects, Roberto Sassu
- [RFC][PATCH v2 08/12] diglim: Interfaces - digest_label, Roberto Sassu
- [RFC][PATCH v2 07/12] diglim: Interfaces - digest_lists_loaded, Roberto Sassu
- [RFC][PATCH v2 09/12] diglim: Interfaces - digest_query, Roberto Sassu
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count, Roberto Sassu
- [RFC][PATCH v2 11/12] diglim: Remote Attestation, Roberto Sassu
- [RFC][PATCH v2 12/12] diglim: Tests, Roberto Sassu
- [RFC][PATCH v2 05/12] diglim: Parser, Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del, Roberto Sassu
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob,
Colin King
- [PATCH ima-evm-utils v3] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen, Tianjia Zhang
- [PATCH 1/2] char: tpm: Kconfig: remove bad i2c cr50 select,
Adrian Ratiu
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob,
Colin King
- [PATCH v4 0/3] ima: Provide more info about buffer measurement,
Roberto Sassu
- [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen,
Tianjia Zhang
- [RFC][PATCH ima-evm-utils 0/7] ima-evm-utils: Add UML support and tests for EVM portable signatures,
Roberto Sassu
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper,
Ahmad Fatoum
- [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen,
Tianjia Zhang
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m,
Ahmad Fatoum
- [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
- [PATCH v2 0/3] IMA: restrict the accepted digest algorithms,
THOBY Simon
- [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
- Re: [syzbot] possible deadlock in mnt_want_write (2),
Miklos Szeredi
- Re: [syzbot] possible deadlock in mnt_want_write (2), Miklos Szeredi
[PATCH] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
[PATCH] evmctl: Remove left-over check S_ISDIR() for directory signing,
Stefan Berger
[PATCH ima-evm-utils v9 0/3] ima-evm-utils: Add --keyid option,
Vitaly Chikunov
[PATCH ima-evm-utils 1/3] Fix out-of-bounds read,
Mimi Zohar
[PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
[PATCH] KEYS: trusted: Fix trusted key backends when building as module,
Andreas Rammhold
Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec,
Vikas Gupta
[PATCH ima-evm-utils v3] CI: Add support for ALT Linux,
Vitaly Chikunov
[PATCH ima-evm-utils v2] CI: Add support for ALT Linux,
Vitaly Chikunov
[PATCH ima-evm-utils] tests: list crypto algorithm tests skipped, Mimi Zohar
[PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify,
Tianjia Zhang
[PATCH ima-evm-utils] Fix NULL pointer warning,
Mimi Zohar
[PATCH] IMA: add an option to restrict the accepted hash algorithms,
THOBY Simon
[PATCH 0/7] device mapper target measurements using IMA,
Tushar Sugandhi
[PATCH v8 0/5] Enable root to update the blacklist keyring,
Mickaël Salaün
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]