lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1582227963.19057.17.camel@kernel.org>
Date:   Thu, 20 Feb 2020 14:46:03 -0500
From:   Mimi Zohar <zohar@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity subsystem fixes for v5.6

Hi Linus,

Here are two bug fixes and an associated change for each.  The one
that adds SM3 to the IMA list of supported hash algorithms is a simple
change, but could be considered a new feature.

thanks,

Mimi


The following changes since commit bb6d3fb354c5ee8d6bde2d576eb7220ea09862b9:

  Linux 5.6-rc1 (2020-02-09 16:08:48 -0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next-integrity

for you to fetch changes up to 5780b9abd530982c2bb1018e2c52c05ab3c30b45:

  ima: add sm3 algorithm to hash algorithm configuration list (2020-02-18 07:35:49 -0500)

----------------------------------------------------------------
Ard Biesheuvel (1):
      x86/ima: use correct identifier for SetupMode variable

Javier Martinez Canillas (1):
      efi: Only print errors about failing to get certs if EFI vars are found

Tianjia Zhang (2):
      crypto: rename sm3-256 to sm3 in hash_algo_name
      ima: add sm3 algorithm to hash algorithm configuration list

 arch/x86/kernel/ima_arch.c                    |  6 ++--
 crypto/hash_info.c                            |  2 +-
 security/integrity/ima/Kconfig                |  5 ++++
 security/integrity/platform_certs/load_uefi.c | 40 +++++++++++++++++----------
 4 files changed, 34 insertions(+), 19 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ