index
:
BMC/Intel-BMC/linux.git
dev
dev-4.10
dev-4.13
dev-4.17
dev-4.18
dev-4.19
dev-4.3
dev-4.4
dev-4.6
dev-4.7
dev-5.0
dev-5.1
dev-5.10-intel
dev-5.10.46-intel
dev-5.10.49-intel
dev-5.14-intel
dev-5.15-intel
dev-5.2
dev-5.3
dev-5.4
dev-5.7
dev-5.8
dev-5.8-intel
master
Intel OpenBMC Linux kernel source tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Age
Commit message (
Expand
)
Author
Files
Lines
2014-10-12
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...
Linus Torvalds
11
-232
/
+518
2014-10-06
KEYS: output last portion of fingerprint in /proc/keys
Dmitry Kasatkin
1
-5
/
+5
2014-10-06
KEYS: strip 'id:' from ca_keyid
Dmitry Kasatkin
1
-1
/
+1
2014-10-06
KEYS: use swapped SKID for performing partial matching
Dmitry Kasatkin
2
-9
/
+9
2014-10-06
KEYS: Restore partial ID matching functionality for asymmetric keys
Dmitry Kasatkin
4
-24
/
+76
2014-10-03
X.509: If available, use the raw subjKeyId to form the key description
David Howells
3
-2
/
+11
2014-10-03
KEYS: handle error code encoded in pointer
Dmitry Kasatkin
1
-2
/
+2
2014-09-22
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
David Howells
1
-7
/
+8
2014-09-16
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
David Howells
2
-17
/
+47
2014-09-16
PKCS#7: Better handling of unsupported crypto
David Howells
5
-16
/
+74
2014-09-16
KEYS: Overhaul key identification when searching for asymmetric keys
David Howells
9
-184
/
+195
2014-09-16
KEYS: Implement binary asymmetric key ID handling
David Howells
2
-0
/
+93
2014-09-16
KEYS: Make the key matching functions return bool
David Howells
1
-2
/
+2
2014-09-16
KEYS: Remove key_type::match in favour of overriding default by match_preparse
David Howells
2
-4
/
+3
2014-09-16
KEYS: Remove key_type::def_lookup_type
David Howells
2
-2
/
+0
2014-09-16
KEYS: Preparse match data
David Howells
1
-1
/
+30
2014-09-16
Merge tag 'keys-next-fixes-20140916' into keys-next
David Howells
1
-3
/
+3
2014-09-16
Merge tag 'keys-fixes-20140916' into keys-next
David Howells
1
-28
/
+33
2014-09-16
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
David Howells
1
-20
/
+19
2014-09-16
PKCS#7: Provide a single place to do signed info block freeing
David Howells
1
-9
/
+15
2014-09-16
PKCS#7: Add a missing static
David Howells
1
-3
/
+3
2014-09-03
KEYS: Set pr_fmt() in asymmetric key signature handling
David Howells
1
-0
/
+1
2014-09-03
PEFILE: Relax the check on the length of the PKCS#7 cert
David Howells
1
-16
/
+33
2014-09-03
KEYS: Fix public_key asymmetric key subtype name
David Howells
1
-0
/
+1
2014-08-03
X.509: Need to export x509_request_asymmetric_key()
David Howells
1
-0
/
+1
2014-07-31
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
1
-4
/
+2
2014-07-29
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2
-72
/
+25
2014-07-28
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
1
-6
/
+3
2014-07-28
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
1
-1
/
+1
2014-07-25
PKCS#7: Missing inclusion of linux/err.h
David Howells
1
-0
/
+1
2014-07-23
Merge branch 'keys-fixes' into keys-next
David Howells
1
-1
/
+0
2014-07-23
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
3
-20
/
+142
2014-07-23
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
6
-1
/
+678
2014-07-23
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
11
-2
/
+1302
2014-07-23
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
2
-2
/
+2
2014-07-18
KEYS: Provide a generic instantiation function
David Howells
1
-24
/
+1
2014-07-18
RSA: Don't select non-existent symbol
Jean Delvare
1
-1
/
+0
2014-07-17
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
1
-3
/
+6
2014-07-17
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2
-0
/
+20
2014-07-17
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2
-19
/
+33
2014-07-17
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+86
2014-07-09
pefile: Validate PKCS#7 trust chain
David Howells
1
-1
/
+1
2014-07-09
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
1
-0
/
+197
2014-07-09
pefile: Handle pesign using the wrong OID
Vivek Goyal
1
-1
/
+7
2014-07-09
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
5
-1
/
+168
2014-07-09
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
1
-1
/
+20
2014-07-09
pefile: Strip the wrapper off of the cert data block
David Howells
1
-0
/
+71
2014-07-09
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
4
-0
/
+217
2014-07-08
KEYS: X.509: Fix a spelling mistake
David Howells
1
-1
/
+1
2014-07-08
PKCS#7: Provide a key type for testing PKCS#7
David Howells
3
-0
/
+117
[next]