summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* X.509: unpack RSA signatureValue field from BIT STRINGMaciej S. Szmigiero2018-06-251-0/+9
* docs: Fix some broken referencesMauro Carvalho Chehab2018-06-152-2/+2
* kbuild: rename *-asn1.[ch] to *.asn1.[ch]Masahiro Yamada2018-04-074-16/+16
* kbuild: clean up *-asn1.[ch] patterns from top-level MakefileMasahiro Yamada2018-04-071-7/+0
* .gitignore: move *-asn1.[ch] patterns to the top-level .gitignoreMasahiro Yamada2018-04-071-1/+0
* X.509: fix NULL dereference when restricting key with unsupported_sigEric Biggers2018-02-221-8/+13
* X.509: fix BUG_ON() when hash algorithm is unsupportedEric Biggers2018-02-221-1/+3
* PKCS#7: fix direct verification of SignerInfo signatureEric Biggers2018-02-221-0/+1
* PKCS#7: fix certificate blacklistingEric Biggers2018-02-221-4/+6
* PKCS#7: fix certificate chain verificationEric Biggers2018-02-221-1/+1
* X.509: fix comparisons of ->pkey_algoEric Biggers2017-12-082-2/+2
* X.509: use crypto_shash_digest()Eric Biggers2017-12-081-5/+1
* KEYS: be careful with error codes in public_key_verify_signature()Eric Biggers2017-12-081-2/+5
* pkcs7: use crypto_shash_digest()Eric Biggers2017-12-081-5/+2
* pkcs7: fix check for self-signed certificateEric Biggers2017-12-081-1/+1
* pkcs7: return correct error code if pkcs7_check_authattrs() failsEric Biggers2017-12-081-1/+3
* X.509: reject invalid BIT STRING for subjectPublicKeyEric Biggers2017-12-081-0/+2
* pkcs7: Set the module licence to prevent taintingDavid Howells2017-11-154-0/+9
* Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2017-11-141-24/+4
|\
| * crypto: move pub key to generic async completionGilad Ben-Yossef2017-11-031-24/+4
* | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-022-0/+2
* | pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.Eric Sesterhenn2017-10-181-0/+3
* | KEYS: checking the input id parameters before finding asymmetric keyChun-Yi Lee2017-10-181-0/+2
* | KEYS: Fix the wrong index when checking the existence of second idChun-Yi Lee2017-10-181-1/+1
|/
* crypto : asymmetric_keys : verify_pefile:zero memory content before freeingLoganaden Velvindron2017-06-091-2/+2
* X.509: Fix error code in x509_cert_parse()Dan Carpenter2017-06-091-0/+1
* crypto: asymmetric_keys - handle EBUSY due to backlog correctlyGilad Ben-Yossef2017-05-231-1/+1
* KEYS: Keyring asymmetric key restrict method with chainingMat Martineau2017-04-042-45/+144
* KEYS: Restrict asymmetric key linkage using a specific keychainMat Martineau2017-04-042-1/+105
* KEYS: Add a lookup_restriction function for the asymmetric key typeMat Martineau2017-04-041-8/+44
* KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau2017-04-031-3/+5
* PKCS#7: Handle blacklisted certificatesDavid Howells2017-04-032-8/+25
* X.509: Allow X.509 certs to be blacklistedDavid Howells2017-04-032-0/+16
* Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2016-12-151-0/+1
|\
| * crypto: asymmetric_keys - set error code on failurePan Bian2016-12-141-0/+1
* | X.509: Fix double free in x509_cert_parse() [ver #3]Andrey Ryabinin2016-11-251-1/+0
|/
* KEYS: Fix for erroneous trust of incorrectly signed X.509 certsMat Martineau2016-07-181-1/+1
* pefile: Fix the failure of calculation for digestLans Zhang2016-07-181-1/+6
* PKCS#7: Fix panic when referring to the empty AKID when DEBUG definedLans Zhang2016-07-181-1/+1
* Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2016-05-311-0/+1
|\
| * crypto: public_key: select CRYPTO_AKCIPHERArnd Bergmann2016-05-191-0/+1
| * PKCS#7: fix missing break on OID_sha224 caseColin Ian King2016-04-051-0/+1
* | KEYS: The PKCS#7 test key type should use the secondary keyringDavid Howells2016-05-111-1/+1
* | KEYS: Move the point of trust determination to __key_link()David Howells2016-04-113-56/+33
* | KEYS: Make the system trusted keyring depend on the asymmetric key typeDavid Howells2016-04-111-1/+1
* | X.509: Move the trust validation code out to its own fileDavid Howells2016-04-114-80/+116
* | X.509: Use verify_signature() if we have a struct key * to useDavid Howells2016-04-111-2/+1
* | KEYS: Generalise x509_request_asymmetric_key()David Howells2016-04-114-35/+33
* | KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells2016-04-112-89/+89
* | PKCS#7: Make trust determination dependent on contents of trust keyringDavid Howells2016-04-065-19/+5