Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
kernel
/
msm-4.19
/
96aec911482246a319bf457f39fa848ce436c8fd
/
crypto
/
asymmetric_keys
e7c87be
X.509: Don't strip leading 00's from key ID when constructing key description
by David Howells
· 9 years ago
07f081f
PKCS#7: Add OIDs for sha224, sha284 and sha512 hash algos and use them
by David Howells
· 9 years ago
772111a
PKCS#7: Add MODULE_LICENSE() to test module
by David Howells
· 9 years ago
99db443
PKCS#7: Appropriately restrict authenticated attributes and content type
by David Howells
· 9 years ago
f29299b4
KEYS: Add a name for PKEY_ID_PKCS7
by David Howells
· 9 years ago
fd19a3d
PKCS#7: Improve and export the X.509 ASN.1 time object decoder
by David Howells
· 9 years ago
60d65ca
PKCS#7: Support CMS messages also [RFC5652]
by David Howells
· 9 years ago
a4c6e57
X.509: Change recorded SKID & AKID to not include Subject or Issuer
by David Howells
· 9 years ago
2c7fd36
PKCS#7: Check content type and versions
by David Howells
· 9 years ago
4ebdb76f
PKCS#7: Allow detached data to be supplied for signature checking purposes
by David Howells
· 9 years ago
4573b64
X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifier
by David Howells
· 9 years ago
b92e657
X.509: Extract both parts of the AuthorityKeyIdentifier
by David Howells
· 9 years ago
9d86b41
Merge tag 'module-implicit-v4.1-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/paulg/linux
by Linus Torvalds
· 9 years ago
e22619a
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
by Linus Torvalds
· 9 years ago
2cdcc35
crypto: asymmetric_keys/rsa - Use non-conflicting variable name
by Guenter Roeck
· 10 years ago
8877558
crypto/asymmetric_keys: pkcs7_key_type needs module.h
by Paul Gortmaker
· 10 years ago
f2b3dee
KEYS: fix "ca_keys=" partial key matching
by Mimi Zohar
· 10 years ago
5e40d33
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
by Linus Torvalds
· 10 years ago
d401658
KEYS: output last portion of fingerprint in /proc/keys
by Dmitry Kasatkin
· 10 years ago
7a224e7
KEYS: strip 'id:' from ca_keyid
by Dmitry Kasatkin
· 10 years ago
8dd6098
KEYS: use swapped SKID for performing partial matching
by Dmitry Kasatkin
· 10 years ago
f1b731d
KEYS: Restore partial ID matching functionality for asymmetric keys
by Dmitry Kasatkin
· 10 years ago
dd2f6c4
X.509: If available, use the raw subjKeyId to form the key description
by David Howells
· 10 years ago
40b50e8
KEYS: handle error code encoded in pointer
by Dmitry Kasatkin
· 10 years ago
d1ac554
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
by David Howells
· 10 years ago
757932e
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
by David Howells
· 10 years ago
4155942
PKCS#7: Better handling of unsupported crypto
by David Howells
· 10 years ago
46963b7
KEYS: Overhaul key identification when searching for asymmetric keys
by David Howells
· 10 years ago
7901c1a
KEYS: Implement binary asymmetric key ID handling
by David Howells
· 10 years ago
0c903ab
KEYS: Make the key matching functions return bool
by David Howells
· 10 years ago
c06cfb0
KEYS: Remove key_type::match in favour of overriding default by match_preparse
by David Howells
· 10 years ago
614d8c3
KEYS: Remove key_type::def_lookup_type
by David Howells
· 10 years ago
4629195
KEYS: Preparse match data
by David Howells
· 10 years ago
1c9c115
Merge tag 'keys-next-fixes-20140916' into keys-next
by David Howells
· 10 years ago
68c45c7
Merge tag 'keys-fixes-20140916' into keys-next
by David Howells
· 10 years ago
cecf5d2e
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
by David Howells
· 10 years ago
3cd0920
PKCS#7: Provide a single place to do signed info block freeing
by David Howells
· 10 years ago
15155b9
PKCS#7: Add a missing static
by David Howells
· 10 years ago
c3ce6df
KEYS: Set pr_fmt() in asymmetric key signature handling
by David Howells
· 10 years ago
0aa0409
PEFILE: Relax the check on the length of the PKCS#7 cert
by David Howells
· 10 years ago
876c6e3
KEYS: Fix public_key asymmetric key subtype name
by David Howells
· 10 years ago
cf5b50f
X.509: Need to export x509_request_asymmetric_key()
by David Howells
· 10 years ago
412eccb
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
by David Howells
· 10 years ago
5ce43ad
PKCS#7: Use x509_request_asymmetric_key()
by David Howells
· 10 years ago
185de09
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
by David Howells
· 10 years ago
63d2551
PKCS#7: fix sparse non static symbol warning
by Wei Yongjun
· 10 years ago
8f3438c
PKCS#7: Missing inclusion of linux/err.h
by David Howells
· 10 years ago
633706a
Merge branch 'keys-fixes' into keys-next
by David Howells
· 10 years ago
64724cf
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
by David Howells
· 10 years ago
6204e00
Merge tag 'keys-pefile-20140709' into keys-next
by David Howells
· 10 years ago
1ca72c9
Merge tag 'keys-pkcs7-20140708' into keys-next
by David Howells
· 10 years ago
fc7c70e
KEYS: struct key_preparsed_payload should have two payload pointers
by David Howells
· 10 years ago
6a09d17
KEYS: Provide a generic instantiation function
by David Howells
· 10 years ago
26c1821
RSA: Don't select non-existent symbol
by Jean Delvare
· 10 years ago
32c4741
KEYS: validate certificate trust only with builtin keys
by Dmitry Kasatkin
· 11 years ago
ffb70f6
KEYS: validate certificate trust only with selected key
by Dmitry Kasatkin
· 11 years ago
b342682
KEYS: make partial key id matching as a dedicated function
by Dmitry Kasatkin
· 11 years ago
3be4bea
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
98801c0
pefile: Validate PKCS#7 trust chain
by David Howells
· 10 years ago
af316fc
pefile: Digest the PE binary and compare to the PKCS#7 data
by David Howells
· 10 years ago
dd7d66f
pefile: Handle pesign using the wrong OID
by Vivek Goyal
· 10 years ago
4c0b4b1
pefile: Parse the "Microsoft individual code signing" data blob
by David Howells
· 10 years ago
3968280
pefile: Parse the presumed PKCS#7 content of the certificate blob
by David Howells
· 10 years ago
09dacbb
pefile: Strip the wrapper off of the cert data block
by David Howells
· 10 years ago
26d1164
pefile: Parse a PE binary to find a key and a signature contained therein
by David Howells
· 10 years ago
4520698
KEYS: X.509: Fix a spelling mistake
by David Howells
· 10 years ago
22d01af
PKCS#7: Provide a key type for testing PKCS#7
by David Howells
· 10 years ago
08815b6
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
by David Howells
· 10 years ago
8c76d79
PKCS#7: Verify internal certificate chain
by David Howells
· 10 years ago
a473035
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
by David Howells
· 10 years ago
9f0d331
PKCS#7: Digest the data in a signed-data message
by David Howells
· 10 years ago
2e3fadb
PKCS#7: Implement a parser [RFC 2315]
by David Howells
· 10 years ago
ace0107
X.509: Export certificate parse and free functions
by David Howells
· 10 years ago
84aabd4
X.509: Add bits needed for PKCS#7
by David Howells
· 10 years ago
4c1cc40
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
by Linus Torvalds
· 11 years ago
26b265c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
by Linus Torvalds
· 11 years ago
dbed714
KEYS: The RSA public key algorithm needs to select MPILIB
by David Howells
· 11 years ago
c7c8bb2
ima: provide support for arbitrary hash algorithms
by Dmitry Kasatkin
· 12 years ago
3fe78ca
keys: change asymmetric keys to use common hash definitions
by Dmitry Kasatkin
· 12 years ago
6bf37e5
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
by James Yonan
· 11 years ago
e19aaa7
X.509: add module description and license
by Konstantin Khlebnikov
· 11 years ago
09fbc47
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
cd0421d
KEYS: Set the asymmetric-key type default search method
by David Howells
· 11 years ago
124df92
X.509: Remove certificate date checks
by David Howells
· 12 years ago
17334ca
X.509: Handle certificates that lack an authorityKeyIdentifier field
by David Howells
· 11 years ago
2ecdb23
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
by David Howells
· 11 years ago
b426beb
X.509: Embed public_key_signature struct and create filler function
by David Howells
· 11 years ago
57be4a7
X.509: struct x509_certificate needs struct tm declaring
by David Howells
· 11 years ago
3d167d6
KEYS: Split public_key_verify_signature() and make available
by David Howells
· 11 years ago
67f7d60b
KEYS: Store public key algo ID in public_key struct
by David Howells
· 11 years ago
206ce59
KEYS: Move the algorithm pointer array from x509 to public_key.c
by David Howells
· 11 years ago
9abc4e6
KEYS: Rename public key parameter name arrays
by David Howells
· 11 years ago
04b00bd
X.509: Support parse long form of length octets in Authority Key Identifier
by Chun-Yi Lee
· 12 years ago
2f1c4fe
X.509: Convert some printk calls to pr_devel
by David Howells
· 12 years ago
cf75446
asymmetric keys: fix printk format warning
by Randy Dunlap
· 12 years ago
a5752d1
MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking
by David Howells
· 12 years ago
c26fd69
X.509: Add a crypto key parser for binary (DER) X.509 certificates
by David Howells
· 12 years ago
0b1568a
RSA: Fix signature verification for shorter signatures
by David Howells
· 12 years ago
612e0fe
RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]
by David Howells
· 12 years ago
4ae71c1
KEYS: Provide signature verification with an asymmetric key
by David Howells
· 12 years ago
Next »