index
:
drm-intel
core-for-ci
drm-intel-fixes
drm-intel-gt-next
drm-intel-gt-next-backup
drm-intel-next
drm-intel-next-fixes
drm-intel-next-queued
drm-intel-testing
for-linux-next
for-linux-next-fixes
for-linux-next-gt
i915-orig
main
maintainer-tools
topic/core-for-CI
topic/drm-intel-gem-next
topic/thunderbolt-next
Linux driver for Intel graphics
UNKNOWN
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Age
Commit message (
Expand
)
Author
Files
Lines
2018-02-22
X.509: fix NULL dereference when restricting key with unsupported_sig
Eric Biggers
1
-8
/
+13
2018-02-22
X.509: fix BUG_ON() when hash algorithm is unsupported
Eric Biggers
1
-1
/
+3
2018-02-22
PKCS#7: fix direct verification of SignerInfo signature
Eric Biggers
1
-0
/
+1
2018-02-22
PKCS#7: fix certificate blacklisting
Eric Biggers
1
-4
/
+6
2018-02-22
PKCS#7: fix certificate chain verification
Eric Biggers
1
-1
/
+1
2017-12-08
X.509: fix comparisons of ->pkey_algo
Eric Biggers
2
-2
/
+2
2017-12-08
X.509: use crypto_shash_digest()
Eric Biggers
1
-5
/
+1
2017-12-08
KEYS: be careful with error codes in public_key_verify_signature()
Eric Biggers
1
-2
/
+5
2017-12-08
pkcs7: use crypto_shash_digest()
Eric Biggers
1
-5
/
+2
2017-12-08
pkcs7: fix check for self-signed certificate
Eric Biggers
1
-1
/
+1
2017-12-08
pkcs7: return correct error code if pkcs7_check_authattrs() fails
Eric Biggers
1
-1
/
+3
2017-12-08
X.509: reject invalid BIT STRING for subjectPublicKey
Eric Biggers
1
-0
/
+2
2017-11-15
pkcs7: Set the module licence to prevent tainting
David Howells
4
-0
/
+9
2017-11-14
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...
Linus Torvalds
1
-24
/
+4
2017-11-03
crypto: move pub key to generic async completion
Gilad Ben-Yossef
1
-24
/
+4
2017-11-02
License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Greg Kroah-Hartman
2
-0
/
+2
2017-10-18
pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.
Eric Sesterhenn
1
-0
/
+3
2017-10-18
KEYS: checking the input id parameters before finding asymmetric key
Chun-Yi Lee
1
-0
/
+2
2017-10-18
KEYS: Fix the wrong index when checking the existence of second id
Chun-Yi Lee
1
-1
/
+1
2017-06-09
crypto : asymmetric_keys : verify_pefile:zero memory content before freeing
Loganaden Velvindron
1
-2
/
+2
2017-06-09
X.509: Fix error code in x509_cert_parse()
Dan Carpenter
1
-0
/
+1
2017-05-23
crypto: asymmetric_keys - handle EBUSY due to backlog correctly
Gilad Ben-Yossef
1
-1
/
+1
2017-04-04
KEYS: Keyring asymmetric key restrict method with chaining
Mat Martineau
2
-45
/
+144
2017-04-04
KEYS: Restrict asymmetric key linkage using a specific keychain
Mat Martineau
2
-1
/
+105
2017-04-04
KEYS: Add a lookup_restriction function for the asymmetric key type
Mat Martineau
1
-8
/
+44
2017-04-03
KEYS: Split role of the keyring pointer for keyring restrict functions
Mat Martineau
1
-3
/
+5
2017-04-03
PKCS#7: Handle blacklisted certificates
David Howells
2
-8
/
+25
2017-04-03
X.509: Allow X.509 certs to be blacklisted
David Howells
2
-0
/
+16
2016-12-15
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...
Linus Torvalds
1
-0
/
+1
2016-12-14
crypto: asymmetric_keys - set error code on failure
Pan Bian
1
-0
/
+1
2016-11-25
X.509: Fix double free in x509_cert_parse() [ver #3]
Andrey Ryabinin
1
-1
/
+0
2016-07-18
KEYS: Fix for erroneous trust of incorrectly signed X.509 certs
Mat Martineau
1
-1
/
+1
2016-07-18
pefile: Fix the failure of calculation for digest
Lans Zhang
1
-1
/
+6
2016-07-18
PKCS#7: Fix panic when referring to the empty AKID when DEBUG defined
Lans Zhang
1
-1
/
+1
2016-05-30
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...
Linus Torvalds
1
-0
/
+1
2016-05-19
crypto: public_key: select CRYPTO_AKCIPHER
Arnd Bergmann
1
-0
/
+1
2016-05-11
KEYS: The PKCS#7 test key type should use the secondary keyring
David Howells
1
-1
/
+1
2016-04-11
KEYS: Move the point of trust determination to __key_link()
David Howells
3
-56
/
+33
2016-04-11
KEYS: Make the system trusted keyring depend on the asymmetric key type
David Howells
1
-1
/
+1
2016-04-11
X.509: Move the trust validation code out to its own file
David Howells
4
-80
/
+116
2016-04-11
X.509: Use verify_signature() if we have a struct key * to use
David Howells
1
-2
/
+1
2016-04-11
KEYS: Generalise x509_request_asymmetric_key()
David Howells
4
-35
/
+33
2016-04-11
KEYS: Move x509_request_asymmetric_key() to asymmetric_type.c
David Howells
2
-89
/
+89
2016-04-06
PKCS#7: Make trust determination dependent on contents of trust keyring
David Howells
5
-19
/
+5
2016-04-06
KEYS: Generalise system_verify_data() to provide access to internal content
David Howells
6
-104
/
+59
2016-04-06
X.509: Fix self-signed determination
David Howells
1
-0
/
+9
2016-04-06
X.509: Extract signature digest and make self-signed cert checks earlier
David Howells
4
-71
/
+110
2016-04-06
PKCS#7: Make the signature a pointer rather than embedding it
David Howells
4
-48
/
+55
2016-04-06
X.509: Retain the key verification data
David Howells
5
-66
/
+67
2016-04-06
KEYS: Add identifier pointers to public_key_signature struct
David Howells
1
-0
/
+4
[next]