index
:
op-kernel-dev
raptor-dma-dev-4.18-pre
raptor-dma-dev-current
Development kernel branch for OpenPOWER systems
Raptor Engineering, LLC
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Commit message (
Expand
)
Author
Age
Files
Lines
*
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...
Linus Torvalds
2015-06-27
3
-11
/
+35
|
\
|
*
KEYS: fix "ca_keys=" partial key matching
Mimi Zohar
2015-05-21
3
-11
/
+35
*
|
crypto: asymmetric_keys/rsa - Use non-conflicting variable name
Guenter Roeck
2015-06-25
1
-2
/
+2
|
/
*
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...
Linus Torvalds
2014-10-12
11
-232
/
+518
|
\
|
*
KEYS: output last portion of fingerprint in /proc/keys
Dmitry Kasatkin
2014-10-06
1
-5
/
+5
|
*
KEYS: strip 'id:' from ca_keyid
Dmitry Kasatkin
2014-10-06
1
-1
/
+1
|
*
KEYS: use swapped SKID for performing partial matching
Dmitry Kasatkin
2014-10-06
2
-9
/
+9
|
*
KEYS: Restore partial ID matching functionality for asymmetric keys
Dmitry Kasatkin
2014-10-06
4
-24
/
+76
|
*
X.509: If available, use the raw subjKeyId to form the key description
David Howells
2014-10-03
3
-2
/
+11
|
*
KEYS: handle error code encoded in pointer
Dmitry Kasatkin
2014-10-03
1
-2
/
+2
|
*
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
David Howells
2014-09-22
1
-7
/
+8
|
*
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
David Howells
2014-09-16
2
-17
/
+47
|
*
PKCS#7: Better handling of unsupported crypto
David Howells
2014-09-16
5
-16
/
+74
|
*
KEYS: Overhaul key identification when searching for asymmetric keys
David Howells
2014-09-16
9
-184
/
+195
|
*
KEYS: Implement binary asymmetric key ID handling
David Howells
2014-09-16
2
-0
/
+93
|
*
KEYS: Make the key matching functions return bool
David Howells
2014-09-16
1
-2
/
+2
|
*
KEYS: Remove key_type::match in favour of overriding default by match_preparse
David Howells
2014-09-16
2
-4
/
+3
|
*
KEYS: Remove key_type::def_lookup_type
David Howells
2014-09-16
2
-2
/
+0
|
*
KEYS: Preparse match data
David Howells
2014-09-16
1
-1
/
+30
|
*
Merge tag 'keys-next-fixes-20140916' into keys-next
David Howells
2014-09-16
1
-3
/
+3
|
|
\
|
|
*
PKCS#7: Add a missing static
David Howells
2014-09-16
1
-3
/
+3
|
*
|
Merge tag 'keys-fixes-20140916' into keys-next
David Howells
2014-09-16
1
-28
/
+33
|
|
\
\
|
|
|
/
|
|
/
|
|
|
*
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
David Howells
2014-09-16
1
-20
/
+19
|
|
*
PKCS#7: Provide a single place to do signed info block freeing
David Howells
2014-09-16
1
-9
/
+15
|
*
|
KEYS: Set pr_fmt() in asymmetric key signature handling
David Howells
2014-09-03
1
-0
/
+1
|
|
/
*
|
PEFILE: Relax the check on the length of the PKCS#7 cert
David Howells
2014-09-03
1
-16
/
+33
*
|
KEYS: Fix public_key asymmetric key subtype name
David Howells
2014-09-03
1
-0
/
+1
|
/
*
X.509: Need to export x509_request_asymmetric_key()
David Howells
2014-08-03
1
-0
/
+1
*
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
2014-07-31
1
-4
/
+2
*
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2014-07-29
2
-72
/
+25
*
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
2014-07-28
1
-6
/
+3
*
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
2014-07-28
1
-1
/
+1
*
PKCS#7: Missing inclusion of linux/err.h
David Howells
2014-07-25
1
-0
/
+1
*
Merge branch 'keys-fixes' into keys-next
David Howells
2014-07-22
1
-1
/
+0
|
\
|
*
RSA: Don't select non-existent symbol
Jean Delvare
2014-07-17
1
-1
/
+0
*
|
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
2014-07-22
3
-20
/
+142
|
\
\
|
*
|
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
2014-07-17
1
-3
/
+6
|
*
|
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2014-07-17
2
-0
/
+20
|
*
|
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2014-07-17
2
-19
/
+33
|
*
|
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
2014-07-17
1
-1
/
+86
|
|
/
*
|
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
2014-07-22
6
-1
/
+678
|
\
\
|
*
|
pefile: Validate PKCS#7 trust chain
David Howells
2014-07-09
1
-1
/
+1
|
*
|
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
2014-07-09
1
-0
/
+197
|
*
|
pefile: Handle pesign using the wrong OID
Vivek Goyal
2014-07-09
1
-1
/
+7
|
*
|
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
2014-07-09
5
-1
/
+168
|
*
|
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
2014-07-09
1
-1
/
+20
|
*
|
pefile: Strip the wrapper off of the cert data block
David Howells
2014-07-09
1
-0
/
+71
|
*
|
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
2014-07-09
4
-0
/
+217
|
*
|
KEYS: X.509: Fix a spelling mistake
David Howells
2014-07-08
1
-1
/
+1
*
|
|
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
2014-07-22
11
-2
/
+1302
|
\
\
\
|
|
/
/
[next]