Linux Integrity
[Prev Page][Next Page]
- [PATCH v2 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure, (continued)
- [PATCH 0/3] ima-evm-utils: Implement function to only create IMA signature,
Stefan Berger
- [PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem,
Tian Tao
- [RFC PATCH] integrity: fix null ptr dereference in integrity_inode_free(), Mimi Zohar
- [PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes,
Stefan Berger
- Re: linux-next: Tree for Apr 16 (IMA appraise causing build error),
Randy Dunlap
- [PATCH 1/1] travis: Add Docker Hub pull rate limit workaround, Petr Vorel
- [PATCH v3 1/2] travis: Fix openSUSE Tumbleweed,
Petr Vorel
- [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
- Re: null-ptr-deref in integrity_inode_free(),
Mimi Zohar
[GIT PULL] TPM DEVICE DRIVER updates for v5.13,
Jarkko Sakkinen
[PATCH] KEYS: trusted: fix a couple error pointer dereferences,
Dan Carpenter
[PATCH] security: keys: trusted: prevent memory leak in error path, Muhammad Usama Anjum
[PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call,
Colin King
[PATCH -next] KEYS: trusted: Switch to kmemdup_nul(), Wei Yongjun
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware,
Anton Altaparmakov
[PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key,
Nayna Jain
[PATCH 0/7] ima/evm: Small enhancements,
Roberto Sassu
[PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv(),
Zhihao Cheng
[PATCH v2 0/2] Add support for ECDSA-signed kernel modules,
Stefan Berger
[PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv(),
Zhihao Cheng
[PATCH v4 0/4] crypto: add rsa pss support for x509,
Hongbo Li
[PATCH v5 00/12] evm: Improve usability of portable signatures,
Roberto Sassu
- [PATCH v5 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded, Roberto Sassu
- [PATCH v5 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal, Roberto Sassu
- [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded, Roberto Sassu
- [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks, Roberto Sassu
- [PATCH v5 05/12] evm: Introduce evm_status_revalidate(), Roberto Sassu
- [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures, Roberto Sassu
- [PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks, Roberto Sassu
- [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe, Roberto Sassu
- [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata, Roberto Sassu
- [PATCH v5 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures, Roberto Sassu
- [PATCH v5 11/12] ima: Introduce template field evmsig and write to field sig as fallback, Roberto Sassu
- [PATCH v5 12/12] ima: Don't remove security.ima if file must not be appraised, Roberto Sassu
[PATCH v3 0/4] crypto: add rsa pss support for x509,
Hongbo Li
[PATCH v2 0/4] crypto: add rsa pss support for x509, Hongbo Li
[PATCH v2] integrity: Add declarations to init_once void arguments.,
Jiele Zhao
[PATCH 0/2] Add support for ECDSA-signed kernel modules,
Stefan Berger
[PATCH] rsa: add pss encoding support, Hongbo Li
[PATCH 0/5] crypto: add rsa pss support for x509,
Hongbo Li
Question about the available tests for IMA apprise,
Fan Wu
[PATCH v3 0/3] ima: kernel build support for loading the kernel module signing key,
Nayna Jain
[PATCH] IMA: Fix error in comment,
Ricardo Ribalda
[GIT PULL] integrity subsystem fix for v5.12,
Mimi Zohar
[PATCH] ima: Fix function name error in comment.,
Jiele Zhao
5.10.y Kernel Panic while poweroff and reboot - Null Pointer Exception - with TPM-Module SLB 9670,
Paul Enuta
[PATCH v4] IMA: Allow only ima-buf template for key measurement,
Lakshmi Ramasubramanian
[PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded,
Mimi Zohar
[RFC PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded,
Mimi Zohar
[PATCH v2] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag,
Tian Tao
[PATCH] KEYS: trusted: tee: fix build error due to missing include,
Ahmad Fatoum
[PATCH] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag,
Tian Tao
[PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys,
Stefan Berger
- [PATCH v12 01/10] oid_registry: Add OIDs for ECDSA with SHA224/256/384/512, Stefan Berger
- [PATCH v12 07/10] x509: Add support for parsing x509 certs with ECDSA keys, Stefan Berger
- [PATCH v12 02/10] crypto: Add support for ECDSA signature verification, Stefan Berger
- [PATCH v12 04/10] crypto: Add math to support fast NIST P384, Stefan Berger
- [PATCH v12 03/10] crypto: Add NIST P384 curve parameters, Stefan Berger
- [PATCH v12 08/10] ima: Support EC keys for signature verification, Stefan Berger
- [PATCH v12 05/10] ecdsa: Register NIST P384 and extend test suite, Stefan Berger
- [PATCH v12 09/10] x509: Add OID for NIST P384 and extend parser for it, Stefan Berger
- [PATCH v12 10/10] certs: Add support for using elliptic curve keys for signing modules, Stefan Berger
- [PATCH v12 06/10] x509: Detect sm2 keys by their parameters OID, Stefan Berger
- Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys, Stefan Berger
- Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys, Herbert Xu
[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
[PATCH v3] IMA: Allow only ima-buf template for key measurement, Lakshmi Ramasubramanian
[PATCH 1/2] IMA: Move check_evmctl to setup, add require_evmctl(),
Petr Vorel
[PATCH v2] IMA: Allow only ima-buf template for key measurement,
Lakshmi Ramasubramanian
[PATCH v7 0/5] Enable root to update the blacklist keyring,
Mickaël Salaün
[PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed,
Petr Vorel
[PATCH v2 0/3] Fix bugs related to TPM2 event log,
Stefan Berger
Fwd: TPM unaligned memory accesses,
Andrew James
[PATCH v25 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
[PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
[PATCH 0/3] Fix bugs related to TPM2 event log,
Stefan Berger
[PATCH v11 00/10] Add support for x509 certs with NIST P384/256/192 keys,
Stefan Berger
- [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512, Stefan Berger
- [PATCH v11 02/10] crypto: Add support for ECDSA signature verification, Stefan Berger
- [PATCH v11 03/10] crypto: Add NIST P384 curve parameters, Stefan Berger
- [PATCH v11 07/10] x509: Add support for parsing x509 certs with ECDSA keys, Stefan Berger
- [PATCH v11 04/10] crypto: Add math to support fast NIST P384, Stefan Berger
- [PATCH v11 05/10] ecdsa: Register NIST P384 and extend test suite, Stefan Berger
- [PATCH v11 10/10] certs: Add support for using elliptic curve keys for signing modules, Stefan Berger
- [PATCH v11 08/10] ima: Support EC keys for signature verification, Stefan Berger
- [PATCH v11 06/10] x509: Detect sm2 keys by their parameters OID, Stefan Berger
- [PATCH v11 09/10] x509: Add OID for NIST P384 and extend parser for it, Stefan Berger
[PATCH v4 00/11] evm: Improve usability of portable signatures,
Roberto Sassu
- [PATCH v4 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal, Roberto Sassu
- [PATCH v4 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded, Roberto Sassu
- [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks, Roberto Sassu
- [PATCH v4 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded, Roberto Sassu
- [PATCH v4 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures, Roberto Sassu
- [PATCH v4 06/11] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe, Roberto Sassu
- [PATCH v4 05/11] evm: Introduce evm_status_revalidate(), Roberto Sassu
- [PATCH v4 07/11] evm: Allow xattr/attr operations for portable signatures, Roberto Sassu
- [PATCH v4 08/11] evm: Allow setxattr() and setattr() for unmodified metadata, Roberto Sassu
- [PATCH v4 11/11] ima: Don't remove security.ima if file must not be appraised, Roberto Sassu
- [PATCH v4 10/11] ima: Introduce template field evmsig and write to field sig as fallback, Roberto Sassu
[PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys,
Stefan Berger
- [PATCH v10 6/9] x509: Add support for parsing x509 certs with ECDSA keys, Stefan Berger
- [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID, Stefan Berger
- [PATCH v10 1/9] crypto: Add support for ECDSA signature verification, Stefan Berger
- [PATCH v10 9/9] certs: Add support for using elliptic curve keys for signing modules, Stefan Berger
- [PATCH v10 7/9] ima: Support EC keys for signature verification, Stefan Berger
- [PATCH v10 2/9] crypto: Add NIST P384 curve parameters, Stefan Berger
- [PATCH v10 3/9] crypto: Add math to support fast NIST P384, Stefan Berger
- [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite, Stefan Berger
- [PATCH v10 8/9] x509: Add OID for NIST P384 and extend parser for it, Stefan Berger
- Re: [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys, Stefan Berger
[PATCH] IMA: Allow only ima-buf template for key measurement,
Lakshmi Ramasubramanian
[GIT PULL] TPM DEVICE DRIVER changes for v5.12-rc2,
Jarkko Sakkinen
[PATCH] ima: Fix the error code for restoring the PCR value,
Li Huafei
[PATCH] x86/sgx: Replace section->init_laundry_list with a temp list, Jarkko Sakkinen
[PATCH v9 0/4] Introduce TEE based Trusted Keys support,
Sumit Garg
[PATCH] tpm: Remove unintentional dump_stack() call,
jarkko
[PATCH] tpm: Add missing check in tpm_inf_recv,
Dinghao Liu
[PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring,
Patrick Uiterwijk
[PATCH v9 0/9] Add support for x509 certs with NIST P384/256/192 keys,
Stefan Berger
[PATCH v2] vio: make remove callback return void,
Uwe Kleine-König
[PATCH v3 0/2] IMA: Add test for dm-crypt measurement,
Petr Vorel
[PATCH 00/20] Manual replacement of all strlcpy in favor of strscpy,
Romain Perier
[PATCH] IMA: Add test for selinux measurement,
Lakshmi Ramasubramanian
[PATCH] IMA: Check for ima-buf template is not required for keys tests,
Lakshmi Ramasubramanian
[PATCH 0/4] Fixes for TPM interrupt handling,
Lino Sanfilippo
[PATCH v7] TPM fixes,
Lino Sanfilippo
[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64,
Lakshmi Ramasubramanian
- [PATCH v19 01/13] kexec: Move ELF fields to struct kimage, Lakshmi Ramasubramanian
- [PATCH v19 03/13] powerpc: Use ELF fields defined in 'struct kimage', Lakshmi Ramasubramanian
- [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage', Lakshmi Ramasubramanian
- [PATCH v19 02/13] arm64: Use ELF fields defined in 'struct kimage', Lakshmi Ramasubramanian
- [PATCH v19 12/13] powerpc: Delete unused function delete_fdt_mem_rsv(), Lakshmi Ramasubramanian
- [PATCH v19 13/13] arm64: Enable passing IMA log to next kernel on kexec, Lakshmi Ramasubramanian
- [PATCH v19 11/13] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT, Lakshmi Ramasubramanian
- [PATCH v19 08/13] powerpc: Move ima buffer fields to struct kimage, Lakshmi Ramasubramanian
- [PATCH v19 09/13] powerpc: Enable passing IMA log to next kernel on kexec, Lakshmi Ramasubramanian
- [PATCH v19 10/13] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c, Lakshmi Ramasubramanian
- [PATCH v19 07/13] powerpc: Use common of_kexec_alloc_and_setup_fdt(), Lakshmi Ramasubramanian
- [PATCH v19 05/13] of: Add a common kexec FDT setup function, Lakshmi Ramasubramanian
- [PATCH v19 06/13] arm64: Use common of_kexec_alloc_and_setup_fdt(), Lakshmi Ramasubramanian
- Re: [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64, Rob Herring
[PATCH 2/2] tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality(), Jarkko Sakkinen
[PATCH 1/2] tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality(), Jarkko Sakkinen
[PATCH 0/9] Enable hibernation when Lockdown is enabled,
Matthew Garrett
- [PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs, Matthew Garrett
- [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob, Matthew Garrett
- [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use, Matthew Garrett
- [PATCH 4/9] security: keys: trusted: Store the handle of a loaded key, Matthew Garrett
- [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity, Matthew Garrett
- [PATCH 8/9] pm: hibernate: Verify the digest encryption key, Matthew Garrett
- [PATCH 9/9] pm: hibernate: seal the encryption key with a PCR policy, Matthew Garrett
- [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image, Matthew Garrett
- [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data, Matthew Garrett
- Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled, Evan Green
Re: [PATCH] ima: Replacing deprecated strlcpy with strscpy ~~~~~~~~~ Replace,
Jarkko Sakkinen
[PATCH] certs: Add support for using elliptic curve keys for signing modules,
Stefan Berger
[PATCH] ima: Replacing deprecated strlcpy with strscpy, Palash Oswal
[PATCH v3] IMA: support for duplicate measurement records,
Tushar Sugandhi
[PATCH] of: error: 'const struct kimage' has no member named 'arch',
Lakshmi Ramasubramanian
[PATCH v2 0/5] ima: kernel build support for loading the kernel module signing key,
Nayna Jain
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]