summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys/public_key.c
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'v6.7-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/...Linus Torvalds2023-11-021-3/+5
|\
| * crypto: asymmetric_keys - allow FIPS 202 SHA-3 signaturesDimitri John Ledkov2023-10-271-1/+4
| * crypto: pkcs7 - remove sha1 supportDimitri John Ledkov2023-10-201-2/+1
* | KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hashHerbert Xu2023-10-181-3/+2
|/
* KEYS: use kfree_sensitive with keyMahmoud Adam2023-07-281-4/+4
* KEYS: asymmetric: Fix error codesDan Carpenter2023-07-071-5/+15
* KEYS: asymmetric: Use new crypto interface without scatterlistsHerbert Xu2023-06-231-97/+137
* KEYS: asymmetric: Move sm2 code into x509_public_keyHerbert Xu2023-06-231-67/+0
* KEYS: asymmetric: Fix ECDSA use via keyctl uapiDenis Kenzior2023-02-131-2/+22
* KEYS: asymmetric: enforce SM2 signature use pkey algoTianjia Zhang2022-08-031-2/+5
* KEYS: asymmetric: properly validate hash_algo and encodingEric Biggers2022-03-101-35/+76
* KEYS: asymmetric: enforce that sig algo matches key algoEric Biggers2022-03-101-0/+15
* x509: Add support for parsing x509 certs with ECDSA keysStefan Berger2021-03-261-1/+3
* X.509: Fix crash caused by NULL pointerTianjia Zhang2021-01-201-1/+2
* X.509: Fix modular build of public_key_sm2Herbert Xu2020-10-081-0/+57
* X.509: support OSCCA SM2-with-SM3 certificate verificationTianjia Zhang2020-09-251-0/+6
* Merge tag 'docs-5.9' of git://git.lwn.net/linuxLinus Torvalds2020-08-041-1/+1
|\
| * docs: crypto: convert asymmetric-keys.txt to ReSTMauro Carvalho Chehab2020-06-191-1/+1
* | keys: asymmetric: fix error return code in software_key_query()Wei Yongjun2020-07-151-0/+1
|/
* KEYS: asymmetric: return ENOMEM if akcipher_request_alloc() failsEric Biggers2019-12-121-0/+1
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-241-5/+1
* X.509: parse public key parameters from x509 for akcipherVitaly Chikunov2019-04-181-15/+57
* KEYS: do not kmemdup digest in {public,tpm}_key_verify_signatureVitaly Chikunov2019-04-181-8/+1
* crypto: akcipher - new verify API for public key algorithmsVitaly Chikunov2019-04-181-24/+10
* KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]David Howells2018-10-261-1/+81
* KEYS: Allow the public_key struct to hold a private key [ver #2]David Howells2018-10-261-2/+12
* KEYS: Provide software public key query function [ver #2]David Howells2018-10-261-17/+82
* X.509: fix BUG_ON() when hash algorithm is unsupportedEric Biggers2018-02-221-1/+3
* KEYS: be careful with error codes in public_key_verify_signature()Eric Biggers2017-12-081-2/+5
* pkcs7: Set the module licence to prevent taintingDavid Howells2017-11-151-0/+2
* crypto: move pub key to generic async completionGilad Ben-Yossef2017-11-031-24/+4
* crypto: asymmetric_keys - handle EBUSY due to backlog correctlyGilad Ben-Yossef2017-05-231-1/+1
* crypto: asymmetric_keys - set error code on failurePan Bian2016-12-141-0/+1
* KEYS: Allow authentication data to be stored in an asymmetric keyDavid Howells2016-04-061-6/+14
* X.509: Make algo identifiers text instead of enumDavid Howells2016-03-031-20/+4
* akcipher: Move the RSA DER encoding check to the crypto layerDavid Howells2016-03-031-11/+93
* crypto: KEYS: convert public key and digsig asym to the akcipher apiTadeusz Struk2016-02-101-42/+22
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-2/+2
* KEYS: Add a name for PKEY_ID_PKCS7David Howells2015-08-121-0/+1
* KEYS: Fix public_key asymmetric key subtype nameDavid Howells2014-09-031-0/+1
* keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin2013-10-251-12/+0
* KEYS: Split public_key_verify_signature() and make availableDavid Howells2013-09-251-8/+32
* KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells2013-09-251-0/+8
* KEYS: Rename public key parameter name arraysDavid Howells2013-09-251-7/+7
* KEYS: Asymmetric public-key algorithm crypto key subtypeDavid Howells2012-10-081-0/+108