summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)AuthorFilesLines
2018-08-16Replace magic for trusting the secondary keyring with #defineYannik Sembritzki1-1/+1
2018-06-25X.509: unpack RSA signatureValue field from BIT STRINGMaciej S. Szmigiero1-0/+9
2018-06-15docs: Fix some broken referencesMauro Carvalho Chehab2-2/+2
2018-04-07kbuild: rename *-asn1.[ch] to *.asn1.[ch]Masahiro Yamada4-16/+16
2018-04-07kbuild: clean up *-asn1.[ch] patterns from top-level MakefileMasahiro Yamada1-7/+0
2018-04-07.gitignore: move *-asn1.[ch] patterns to the top-level .gitignoreMasahiro Yamada1-1/+0
2018-02-22X.509: fix NULL dereference when restricting key with unsupported_sigEric Biggers1-8/+13
2018-02-22X.509: fix BUG_ON() when hash algorithm is unsupportedEric Biggers1-1/+3
2018-02-22PKCS#7: fix direct verification of SignerInfo signatureEric Biggers1-0/+1
2018-02-22PKCS#7: fix certificate blacklistingEric Biggers1-4/+6
2018-02-22PKCS#7: fix certificate chain verificationEric Biggers1-1/+1
2017-12-08X.509: fix comparisons of ->pkey_algoEric Biggers2-2/+2
2017-12-08X.509: use crypto_shash_digest()Eric Biggers1-5/+1
2017-12-08KEYS: be careful with error codes in public_key_verify_signature()Eric Biggers1-2/+5
2017-12-08pkcs7: use crypto_shash_digest()Eric Biggers1-5/+2
2017-12-08pkcs7: fix check for self-signed certificateEric Biggers1-1/+1
2017-12-08pkcs7: return correct error code if pkcs7_check_authattrs() failsEric Biggers1-1/+3
2017-12-08X.509: reject invalid BIT STRING for subjectPublicKeyEric Biggers1-0/+2
2017-11-15pkcs7: Set the module licence to prevent taintingDavid Howells4-0/+9
2017-11-14Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-24/+4
2017-11-03crypto: move pub key to generic async completionGilad Ben-Yossef1-24/+4
2017-11-02License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2-0/+2
2017-10-18pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.Eric Sesterhenn1-0/+3
2017-10-18KEYS: checking the input id parameters before finding asymmetric keyChun-Yi Lee1-0/+2
2017-10-18KEYS: Fix the wrong index when checking the existence of second idChun-Yi Lee1-1/+1
2017-06-09crypto : asymmetric_keys : verify_pefile:zero memory content before freeingLoganaden Velvindron1-2/+2
2017-06-09X.509: Fix error code in x509_cert_parse()Dan Carpenter1-0/+1
2017-05-23crypto: asymmetric_keys - handle EBUSY due to backlog correctlyGilad Ben-Yossef1-1/+1
2017-04-04KEYS: Keyring asymmetric key restrict method with chainingMat Martineau2-45/+144
2017-04-04KEYS: Restrict asymmetric key linkage using a specific keychainMat Martineau2-1/+105
2017-04-04KEYS: Add a lookup_restriction function for the asymmetric key typeMat Martineau1-8/+44
2017-04-03KEYS: Split role of the keyring pointer for keyring restrict functionsMat Martineau1-3/+5
2017-04-03PKCS#7: Handle blacklisted certificatesDavid Howells2-8/+25
2017-04-03X.509: Allow X.509 certs to be blacklistedDavid Howells2-0/+16
2016-12-15Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-0/+1
2016-12-14crypto: asymmetric_keys - set error code on failurePan Bian1-0/+1
2016-11-25X.509: Fix double free in x509_cert_parse() [ver #3]Andrey Ryabinin1-1/+0
2016-07-18KEYS: Fix for erroneous trust of incorrectly signed X.509 certsMat Martineau1-1/+1
2016-07-18pefile: Fix the failure of calculation for digestLans Zhang1-1/+6
2016-07-18PKCS#7: Fix panic when referring to the empty AKID when DEBUG definedLans Zhang1-1/+1
2016-05-30Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-0/+1
2016-05-19crypto: public_key: select CRYPTO_AKCIPHERArnd Bergmann1-0/+1
2016-05-11KEYS: The PKCS#7 test key type should use the secondary keyringDavid Howells1-1/+1
2016-04-11KEYS: Move the point of trust determination to __key_link()David Howells3-56/+33
2016-04-11KEYS: Make the system trusted keyring depend on the asymmetric key typeDavid Howells1-1/+1
2016-04-11X.509: Move the trust validation code out to its own fileDavid Howells4-80/+116
2016-04-11X.509: Use verify_signature() if we have a struct key * to useDavid Howells1-2/+1
2016-04-11KEYS: Generalise x509_request_asymmetric_key()David Howells4-35/+33
2016-04-11KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells2-89/+89
2016-04-06PKCS#7: Make trust determination dependent on contents of trust keyringDavid Howells5-19/+5