summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithmVitaly Chikunov2019-04-181-4/+22
* X.509: parse public key parameters from x509 for akcipherVitaly Chikunov2019-04-184-17/+97
* KEYS: do not kmemdup digest in {public,tpm}_key_verify_signatureVitaly Chikunov2019-04-182-17/+2
* crypto: akcipher - new verify API for public key algorithmsVitaly Chikunov2019-04-182-48/+20
* KEYS: asym_tpm: Add support for the sign operation [ver #2]Denis Kenzior2018-10-261-1/+155
* KEYS: asym_tpm: Implement tpm_sign [ver #2]Denis Kenzior2018-10-261-0/+87
* KEYS: asym_tpm: Implement signature verification [ver #2]Denis Kenzior2018-10-261-6/+100
* KEYS: asym_tpm: Implement the decrypt operation [ver #2]Denis Kenzior2018-10-261-1/+57
* KEYS: asym_tpm: Implement tpm_unbind [ver #2]Denis Kenzior2018-10-261-0/+82
* KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2]Denis Kenzior2018-10-261-0/+94
* KEYS: trusted: Expose common functionality [ver #2]Denis Kenzior2018-10-261-0/+1
* KEYS: asym_tpm: Implement encryption operation [ver #2]Denis Kenzior2018-10-261-0/+84
* KEYS: asym_tpm: Implement pkey_query [ver #2]Denis Kenzior2018-10-261-0/+135
* KEYS: Add parser for TPM-based keys [ver #2]Denis Kenzior2018-10-264-0/+127
* KEYS: asym_tpm: extract key size & public key [ver #2]Denis Kenzior2018-10-261-0/+112
* KEYS: asym_tpm: add skeleton for asym_tpm [ver #2]Denis Kenzior2018-10-263-0/+102
* KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]David Howells2018-10-264-0/+231
* KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]David Howells2018-10-261-1/+81
* KEYS: Allow the public_key struct to hold a private key [ver #2]David Howells2018-10-261-2/+12
* KEYS: Provide software public key query function [ver #2]David Howells2018-10-261-17/+82
* KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2]David Howells2018-10-262-12/+10
* KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]David Howells2018-10-263-0/+141
* Replace magic for trusting the secondary keyring with #defineYannik Sembritzki2018-08-161-1/+1
* X.509: unpack RSA signatureValue field from BIT STRINGMaciej S. Szmigiero2018-06-251-0/+9
* docs: Fix some broken referencesMauro Carvalho Chehab2018-06-152-2/+2
* kbuild: rename *-asn1.[ch] to *.asn1.[ch]Masahiro Yamada2018-04-074-16/+16
* kbuild: clean up *-asn1.[ch] patterns from top-level MakefileMasahiro Yamada2018-04-071-7/+0
* .gitignore: move *-asn1.[ch] patterns to the top-level .gitignoreMasahiro Yamada2018-04-071-1/+0
* X.509: fix NULL dereference when restricting key with unsupported_sigEric Biggers2018-02-221-8/+13
* X.509: fix BUG_ON() when hash algorithm is unsupportedEric Biggers2018-02-221-1/+3
* PKCS#7: fix direct verification of SignerInfo signatureEric Biggers2018-02-221-0/+1
* PKCS#7: fix certificate blacklistingEric Biggers2018-02-221-4/+6
* PKCS#7: fix certificate chain verificationEric Biggers2018-02-221-1/+1
* X.509: fix comparisons of ->pkey_algoEric Biggers2017-12-082-2/+2
* X.509: use crypto_shash_digest()Eric Biggers2017-12-081-5/+1
* KEYS: be careful with error codes in public_key_verify_signature()Eric Biggers2017-12-081-2/+5
* pkcs7: use crypto_shash_digest()Eric Biggers2017-12-081-5/+2
* pkcs7: fix check for self-signed certificateEric Biggers2017-12-081-1/+1
* pkcs7: return correct error code if pkcs7_check_authattrs() failsEric Biggers2017-12-081-1/+3
* X.509: reject invalid BIT STRING for subjectPublicKeyEric Biggers2017-12-081-0/+2
* pkcs7: Set the module licence to prevent taintingDavid Howells2017-11-154-0/+9
* Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2017-11-141-24/+4
|\
| * crypto: move pub key to generic async completionGilad Ben-Yossef2017-11-031-24/+4
* | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-022-0/+2
* | pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.Eric Sesterhenn2017-10-181-0/+3
* | KEYS: checking the input id parameters before finding asymmetric keyChun-Yi Lee2017-10-181-0/+2
* | KEYS: Fix the wrong index when checking the existence of second idChun-Yi Lee2017-10-181-1/+1
|/
* crypto : asymmetric_keys : verify_pefile:zero memory content before freeingLoganaden Velvindron2017-06-091-2/+2
* X.509: Fix error code in x509_cert_parse()Dan Carpenter2017-06-091-0/+1
* crypto: asymmetric_keys - handle EBUSY due to backlog correctlyGilad Ben-Yossef2017-05-231-1/+1