summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)AuthorFilesLines
2019-05-24treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner17-85/+17
2019-04-25crypto: shash - remove shash_desc::flagsEric Biggers3-3/+0
2019-04-18crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithmVitaly Chikunov1-4/+22
2019-04-18X.509: parse public key parameters from x509 for akcipherVitaly Chikunov4-17/+97
2019-04-18KEYS: do not kmemdup digest in {public,tpm}_key_verify_signatureVitaly Chikunov2-17/+2
2019-04-18crypto: akcipher - new verify API for public key algorithmsVitaly Chikunov2-48/+20
2018-10-26KEYS: asym_tpm: Add support for the sign operation [ver #2]Denis Kenzior1-1/+155
2018-10-26KEYS: asym_tpm: Implement tpm_sign [ver #2]Denis Kenzior1-0/+87
2018-10-26KEYS: asym_tpm: Implement signature verification [ver #2]Denis Kenzior1-6/+100
2018-10-26KEYS: asym_tpm: Implement the decrypt operation [ver #2]Denis Kenzior1-1/+57
2018-10-26KEYS: asym_tpm: Implement tpm_unbind [ver #2]Denis Kenzior1-0/+82
2018-10-26KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2]Denis Kenzior1-0/+94
2018-10-26KEYS: trusted: Expose common functionality [ver #2]Denis Kenzior1-0/+1
2018-10-26KEYS: asym_tpm: Implement encryption operation [ver #2]Denis Kenzior1-0/+84
2018-10-26KEYS: asym_tpm: Implement pkey_query [ver #2]Denis Kenzior1-0/+135
2018-10-26KEYS: Add parser for TPM-based keys [ver #2]Denis Kenzior4-0/+127
2018-10-26KEYS: asym_tpm: extract key size & public key [ver #2]Denis Kenzior1-0/+112
2018-10-26KEYS: asym_tpm: add skeleton for asym_tpm [ver #2]Denis Kenzior3-0/+102
2018-10-26KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]David Howells4-0/+231
2018-10-26KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]David Howells1-1/+81
2018-10-26KEYS: Allow the public_key struct to hold a private key [ver #2]David Howells1-2/+12
2018-10-26KEYS: Provide software public key query function [ver #2]David Howells1-17/+82
2018-10-26KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2]David Howells2-12/+10
2018-10-26KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]David Howells3-0/+141
2018-08-16Replace magic for trusting the secondary keyring with #defineYannik Sembritzki1-1/+1
2018-06-25X.509: unpack RSA signatureValue field from BIT STRINGMaciej S. Szmigiero1-0/+9
2018-06-16docs: Fix some broken referencesMauro Carvalho Chehab2-2/+2
2018-04-07kbuild: rename *-asn1.[ch] to *.asn1.[ch]Masahiro Yamada4-16/+16
2018-04-07kbuild: clean up *-asn1.[ch] patterns from top-level MakefileMasahiro Yamada1-7/+0
2018-04-07.gitignore: move *-asn1.[ch] patterns to the top-level .gitignoreMasahiro Yamada1-1/+0
2018-02-22X.509: fix NULL dereference when restricting key with unsupported_sigEric Biggers1-8/+13
2018-02-22X.509: fix BUG_ON() when hash algorithm is unsupportedEric Biggers1-1/+3
2018-02-22PKCS#7: fix direct verification of SignerInfo signatureEric Biggers1-0/+1
2018-02-22PKCS#7: fix certificate blacklistingEric Biggers1-4/+6
2018-02-22PKCS#7: fix certificate chain verificationEric Biggers1-1/+1
2017-12-08X.509: fix comparisons of ->pkey_algoEric Biggers2-2/+2
2017-12-08X.509: use crypto_shash_digest()Eric Biggers1-5/+1
2017-12-08KEYS: be careful with error codes in public_key_verify_signature()Eric Biggers1-2/+5
2017-12-08pkcs7: use crypto_shash_digest()Eric Biggers1-5/+2
2017-12-08pkcs7: fix check for self-signed certificateEric Biggers1-1/+1
2017-12-08pkcs7: return correct error code if pkcs7_check_authattrs() failsEric Biggers1-1/+3
2017-12-08X.509: reject invalid BIT STRING for subjectPublicKeyEric Biggers1-0/+2
2017-11-15pkcs7: Set the module licence to prevent taintingDavid Howells4-0/+9
2017-11-14Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-24/+4
2017-11-03crypto: move pub key to generic async completionGilad Ben-Yossef1-24/+4
2017-11-02License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2-0/+2
2017-10-18pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.Eric Sesterhenn1-0/+3
2017-10-18KEYS: checking the input id parameters before finding asymmetric keyChun-Yi Lee1-0/+2
2017-10-18KEYS: Fix the wrong index when checking the existence of second idChun-Yi Lee1-1/+1
2017-06-09crypto : asymmetric_keys : verify_pefile:zero memory content before freeingLoganaden Velvindron1-2/+2