On Wed, May 15, 2024 at 12:10 AM Jarkko Sakkinen wrote:
>
> On Sat May 4, 2024 at 1:16 AM EEST, Ignat Korchagin wrote:
> > Derived keys are similar to user keys, but their payload is derived from the
> > primary TPM seed and some metadata of the requesting process. This way every
>
> What is exact
On Tue, 2024-05-14 at 14:22 -0400, Stefan Berger wrote:
> The 1st patch fixes an issue on Ubuntu 24.04 due to which an OpenSSL
> provider could not be used.
>
> The 2nd patch passes --engine pkcs11 or --provider pkcs11 options via
> EVNCTL_ENGINE variable so that the proper values are used on the
Hi Linus,
Two IMA changes, one EVM change, a use after free bug fix, and a code cleanup to
address "-Wflex-array-member-not-at-end" warnings:
- The existing IMA {ascii, binary}_runtime_measurements lists include a hard
coded SHA1 hash. To address this limitation, define per TPM enabled hash
algo
On Wed May 15, 2024 at 9:44 AM EEST, Ignat Korchagin wrote:
> On Wed, May 15, 2024 at 12:44 AM Jarkko Sakkinen wrote:
> >
> > On Wed May 15, 2024 at 2:10 AM EEST, Jarkko Sakkinen wrote:
> > > On Sat May 4, 2024 at 1:16 AM EEST, Ignat Korchagin wrote:
> > > > Derived keys are similar to user keys,
On Wed May 15, 2024 at 3:00 PM EEST, Jarkko Sakkinen wrote:
> I did as much clarification as I possibly can.
>
> Also, if you look at confidential computing platforms there's exactly
> two assets that they use lock into machine:
>
> - Binary
> - CPU material
>
> Only carved into stone immutable mat
The pull request you sent on Wed, 15 May 2024 07:55:47 -0400:
> ssh://gitol...@ra.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git
> tags/integrity-v6.10
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/353ad6c0839431146fdee3ff16f9dd17a2809ee4
Thank you!