| Commit message (Expand) | Author | Age | Files | Lines |
* | X.509: unpack RSA signatureValue field from BIT STRING | Maciej S. Szmigiero | 2018-06-25 | 1 | -0/+9 |
* | docs: Fix some broken references | Mauro Carvalho Chehab | 2018-06-15 | 2 | -2/+2 |
* | kbuild: rename *-asn1.[ch] to *.asn1.[ch] | Masahiro Yamada | 2018-04-07 | 4 | -16/+16 |
* | kbuild: clean up *-asn1.[ch] patterns from top-level Makefile | Masahiro Yamada | 2018-04-07 | 1 | -7/+0 |
* | .gitignore: move *-asn1.[ch] patterns to the top-level .gitignore | Masahiro Yamada | 2018-04-07 | 1 | -1/+0 |
* | X.509: fix NULL dereference when restricting key with unsupported_sig | Eric Biggers | 2018-02-22 | 1 | -8/+13 |
* | X.509: fix BUG_ON() when hash algorithm is unsupported | Eric Biggers | 2018-02-22 | 1 | -1/+3 |
* | PKCS#7: fix direct verification of SignerInfo signature | Eric Biggers | 2018-02-22 | 1 | -0/+1 |
* | PKCS#7: fix certificate blacklisting | Eric Biggers | 2018-02-22 | 1 | -4/+6 |
* | PKCS#7: fix certificate chain verification | Eric Biggers | 2018-02-22 | 1 | -1/+1 |
* | X.509: fix comparisons of ->pkey_algo | Eric Biggers | 2017-12-08 | 2 | -2/+2 |
* | X.509: use crypto_shash_digest() | Eric Biggers | 2017-12-08 | 1 | -5/+1 |
* | KEYS: be careful with error codes in public_key_verify_signature() | Eric Biggers | 2017-12-08 | 1 | -2/+5 |
* | pkcs7: use crypto_shash_digest() | Eric Biggers | 2017-12-08 | 1 | -5/+2 |
* | pkcs7: fix check for self-signed certificate | Eric Biggers | 2017-12-08 | 1 | -1/+1 |
* | pkcs7: return correct error code if pkcs7_check_authattrs() fails | Eric Biggers | 2017-12-08 | 1 | -1/+3 |
* | X.509: reject invalid BIT STRING for subjectPublicKey | Eric Biggers | 2017-12-08 | 1 | -0/+2 |
* | pkcs7: Set the module licence to prevent tainting | David Howells | 2017-11-15 | 4 | -0/+9 |
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert... | Linus Torvalds | 2017-11-14 | 1 | -24/+4 |
|\ |
|
| * | crypto: move pub key to generic async completion | Gilad Ben-Yossef | 2017-11-03 | 1 | -24/+4 |
* | | License cleanup: add SPDX GPL-2.0 license identifier to files with no license | Greg Kroah-Hartman | 2017-11-02 | 2 | -0/+2 |
* | | pkcs7: Prevent NULL pointer dereference, since sinfo is not always set. | Eric Sesterhenn | 2017-10-18 | 1 | -0/+3 |
* | | KEYS: checking the input id parameters before finding asymmetric key | Chun-Yi Lee | 2017-10-18 | 1 | -0/+2 |
* | | KEYS: Fix the wrong index when checking the existence of second id | Chun-Yi Lee | 2017-10-18 | 1 | -1/+1 |
|/ |
|
* | crypto : asymmetric_keys : verify_pefile:zero memory content before freeing | Loganaden Velvindron | 2017-06-09 | 1 | -2/+2 |
* | X.509: Fix error code in x509_cert_parse() | Dan Carpenter | 2017-06-09 | 1 | -0/+1 |
* | crypto: asymmetric_keys - handle EBUSY due to backlog correctly | Gilad Ben-Yossef | 2017-05-23 | 1 | -1/+1 |
* | KEYS: Keyring asymmetric key restrict method with chaining | Mat Martineau | 2017-04-04 | 2 | -45/+144 |
* | KEYS: Restrict asymmetric key linkage using a specific keychain | Mat Martineau | 2017-04-04 | 2 | -1/+105 |
* | KEYS: Add a lookup_restriction function for the asymmetric key type | Mat Martineau | 2017-04-04 | 1 | -8/+44 |
* | KEYS: Split role of the keyring pointer for keyring restrict functions | Mat Martineau | 2017-04-03 | 1 | -3/+5 |
* | PKCS#7: Handle blacklisted certificates | David Howells | 2017-04-03 | 2 | -8/+25 |
* | X.509: Allow X.509 certs to be blacklisted | David Howells | 2017-04-03 | 2 | -0/+16 |
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert... | Linus Torvalds | 2016-12-15 | 1 | -0/+1 |
|\ |
|
| * | crypto: asymmetric_keys - set error code on failure | Pan Bian | 2016-12-14 | 1 | -0/+1 |
* | | X.509: Fix double free in x509_cert_parse() [ver #3] | Andrey Ryabinin | 2016-11-25 | 1 | -1/+0 |
|/ |
|
* | KEYS: Fix for erroneous trust of incorrectly signed X.509 certs | Mat Martineau | 2016-07-18 | 1 | -1/+1 |
* | pefile: Fix the failure of calculation for digest | Lans Zhang | 2016-07-18 | 1 | -1/+6 |
* | PKCS#7: Fix panic when referring to the empty AKID when DEBUG defined | Lans Zhang | 2016-07-18 | 1 | -1/+1 |
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert... | Linus Torvalds | 2016-05-31 | 1 | -0/+1 |
|\ |
|
| * | crypto: public_key: select CRYPTO_AKCIPHER | Arnd Bergmann | 2016-05-19 | 1 | -0/+1 |
| * | PKCS#7: fix missing break on OID_sha224 case | Colin Ian King | 2016-04-05 | 1 | -0/+1 |
* | | KEYS: The PKCS#7 test key type should use the secondary keyring | David Howells | 2016-05-11 | 1 | -1/+1 |
* | | KEYS: Move the point of trust determination to __key_link() | David Howells | 2016-04-11 | 3 | -56/+33 |
* | | KEYS: Make the system trusted keyring depend on the asymmetric key type | David Howells | 2016-04-11 | 1 | -1/+1 |
* | | X.509: Move the trust validation code out to its own file | David Howells | 2016-04-11 | 4 | -80/+116 |
* | | X.509: Use verify_signature() if we have a struct key * to use | David Howells | 2016-04-11 | 1 | -2/+1 |
* | | KEYS: Generalise x509_request_asymmetric_key() | David Howells | 2016-04-11 | 4 | -35/+33 |
* | | KEYS: Move x509_request_asymmetric_key() to asymmetric_type.c | David Howells | 2016-04-11 | 2 | -89/+89 |
* | | PKCS#7: Make trust determination dependent on contents of trust keyring | David Howells | 2016-04-06 | 5 | -19/+5 |