Show patches with: State = Action Required       |   1569 patches
« 1 2 ... 3 4 515 16 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v3,08/15] crypto: testmgr - add known answer tests for ffdheXYZ(dh) templates crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,07/15] crypto: dh - implement ffdheXYZ(dh) templates crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,06/15] crypto: dh - introduce common code for built-in safe-prime group support crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,05/15] crypto: dh - split out deserialization code from crypto_dh_decode() crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,04/15] crypto: dh - constify struct dh's pointer members crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,03/15] crypto: dh - remove struct dh's ->q member crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2022-02-02 Nicolai Stange New
[v3,02/15] crypto: kpp - provide support for KPP spawns crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[v3,01/15] crypto: kpp - provide support for KPP template instances crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2022-02-02 Nicolai Stange New
[RFC] KEYS: Double max_size to make keyctl pkey_verify work [RFC] KEYS: Double max_size to make keyctl pkey_verify work - - - --- 2022-02-02 Vitaly Chikunov New
[2/2] KEYS: asymmetric: properly validate hash_algo and encoding Fix bugs in public_key_verify_signature() - 1 - --- 2022-02-01 Eric Biggers New
[1/2] KEYS: asymmetric: enforce that sig algo matches key algo Fix bugs in public_key_verify_signature() - 1 - --- 2022-02-01 Eric Biggers New
KEYS: remove support for asym_tpm keys KEYS: remove support for asym_tpm keys 1 2 - --- 2022-01-28 Eric Biggers New
[v2] KEYS: trusted: Avoid calling null function trusted_key_exit [v2] KEYS: trusted: Avoid calling null function trusted_key_exit - 1 - --- 2022-01-26 Dave Kleikamp New
KEYS: trusted: Avoid calling null function trusted_key_exit KEYS: trusted: Avoid calling null function trusted_key_exit - - - --- 2022-01-26 Dave Kleikamp New
[v10,8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - 1 - --- 2022-01-26 Eric Snowberg New
[v10,7/8] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - 1 - --- 2022-01-26 Eric Snowberg New
[v10,6/8] efi/mokvar: move up init order Enroll kernel keys thru MOK - 1 - --- 2022-01-26 Eric Snowberg New
[v10,5/8] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - 1 1 --- 2022-01-26 Eric Snowberg New
[v10,4/8] KEYS: store reference to machine keyring Enroll kernel keys thru MOK - 1 1 --- 2022-01-26 Eric Snowberg New
[v10,3/8] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 2 1 --- 2022-01-26 Eric Snowberg New
[v10,2/8] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - - 2 --- 2022-01-26 Eric Snowberg New
[v10,1/8] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 2 1 --- 2022-01-26 Eric Snowberg New
[1/1] keys: Allow access to key_type_lookup()/key_type_put() within kernel. keys: Allow access to key_type_lookup()/key_type_put() within kernel. - - - --- 2022-01-24 Douglas Miller New
keys: remove __user annotation from function prototype keys: remove __user annotation from function prototype - - - --- 2022-01-22 Randy Dunlap New
[2/2] certs: Fix build error when CONFIG_MODULE_SIG_KEY is empty [1/2] certs: Fix build error when CONFIG_MODULE_SIG_KEY is PKCS#11 URI - - 1 --- 2022-01-20 Masahiro Yamada New
[1/2] certs: Fix build error when CONFIG_MODULE_SIG_KEY is PKCS#11 URI [1/2] certs: Fix build error when CONFIG_MODULE_SIG_KEY is PKCS#11 URI - - - --- 2022-01-20 Masahiro Yamada New
[v2,4/4] KEYS: x509: remove dead code that set ->unsupported_sig KEYS: x509: various cleanups 1 1 - --- 2022-01-19 Eric Biggers New
[v2,3/4] KEYS: x509: remove never-set ->unsupported_key flag KEYS: x509: various cleanups - 1 - --- 2022-01-19 Eric Biggers New
[v2,2/4] KEYS: x509: remove unused fields KEYS: x509: various cleanups 1 1 - --- 2022-01-19 Eric Biggers New
[v2,1/4] KEYS: x509: clearly distinguish between key and signature algorithms KEYS: x509: various cleanups 1 1 - --- 2022-01-19 Eric Biggers New
[v2,5/5] crypto: rsa-pkcs1pad - use clearer variable names crypto: rsa-pkcs1pad fixes - - - --- 2022-01-19 Eric Biggers New
[v2,4/5] crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() crypto: rsa-pkcs1pad fixes - - - --- 2022-01-19 Eric Biggers New
[v2,3/5] crypto: rsa-pkcs1pad - restore signature length check crypto: rsa-pkcs1pad fixes - - - --- 2022-01-19 Eric Biggers New
[v2,2/5] crypto: rsa-pkcs1pad - correctly get hash from source scatterlist crypto: rsa-pkcs1pad fixes - 1 - --- 2022-01-19 Eric Biggers New
[v2,1/5] crypto: rsa-pkcs1pad - only allow with rsa crypto: rsa-pkcs1pad fixes - - - --- 2022-01-19 Eric Biggers New
[3/3] crypto: rsa-pkcs1pad - use clearer variable names crypto: more rsa-pkcs1pad fixes - - - --- 2022-01-14 Eric Biggers New
[2/3] crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() crypto: more rsa-pkcs1pad fixes - - - --- 2022-01-14 Eric Biggers New
[1/3] crypto: rsa-pkcs1pad - correctly get hash from source scatterlist crypto: more rsa-pkcs1pad fixes - 1 - --- 2022-01-14 Eric Biggers New
[v2] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1) [v2] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1) - - - --- 2022-01-14 Herbert Xu New
[4/4] KEYS: x509: remove dead code that set ->unsupported_sig KEYS: x509: various cleanups 1 - - --- 2022-01-14 Eric Biggers New
[3/4] KEYS: x509: remove never-set ->unsupported_key flag KEYS: x509: various cleanups - - - --- 2022-01-14 Eric Biggers New
[2/4] KEYS: x509: remove unused fields KEYS: x509: various cleanups 1 - - --- 2022-01-14 Eric Biggers New
[1/4] KEYS: x509: clearly distinguish between key and signature algorithms KEYS: x509: various cleanups 1 - - --- 2022-01-14 Eric Biggers New
[3/3] KEYS: asym_tpm: rename derive_pub_key() KEYS: fixes for asym_tpm keys 1 - - --- 2022-01-13 Eric Biggers New
[2/3] KEYS: asym_tpm: fix incorrect comment KEYS: fixes for asym_tpm keys 1 - - --- 2022-01-13 Eric Biggers New
[1/3] KEYS: asym_tpm: fix buffer overreads in extract_key_parameters() KEYS: fixes for asym_tpm keys - - - --- 2022-01-13 Eric Biggers New
KEYS: fix length validation in keyctl_pkey_params_get_2() KEYS: fix length validation in keyctl_pkey_params_get_2() 1 - - --- 2022-01-13 Eric Biggers New
ima: fix reference leak in asymmetric_verify() ima: fix reference leak in asymmetric_verify() - 3 - --- 2022-01-13 Eric Biggers New
crypto: rsa-pkcs1pad - only allow with rsa crypto: rsa-pkcs1pad - only allow with rsa - - - --- 2022-01-13 Eric Biggers New
crypto: asymmetric_keys: remove redundant pointer secs crypto: asymmetric_keys: remove redundant pointer secs - - - --- 2022-01-12 Colin Ian King New
[v8,3/3] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-11 Nayna Jain New
[v8,2/3] integrity: make integrity_keyring_from_id() non-static integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-11 Nayna Jain New
[v8,1/3] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-11 Nayna Jain New
[14/14] KEYS: Introduce load_pgp_public_keyring() KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[13/14] KEYS: Provide a function to load keys from a PGP keyring blob KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[12/14] PGP: Provide a key type for testing PGP signatures KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[11/14] verification: introduce verify_pgp_signature() KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[10/14] KEYS: Calculate key digest and get signature of the key KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature() KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[08/14] KEYS: PGP-based public key signature verification KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[07/14] KEYS: Provide PGP key description autogeneration KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[06/14] KEYS: PGP data parser KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[05/14] PGPLIB: Signature parser KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[04/14] PGPLIB: Basic packet parser KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[03/14] PGPLIB: PGP definitions (RFC 4880) KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[02/14] rsa: add parser of raw format KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[01/14] mpi: Introduce mpi_key_length() KEYS: Add support for PGP keys and signatures - - - --- 2022-01-11 Roberto Sassu New
[v5,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - 1 - --- 2022-01-11 Michal Suchánek New
[v5,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature 1 - - --- 2022-01-11 Michal Suchánek New
[v5,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - 1 - --- 2022-01-11 Michal Suchánek New
[v5,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - 1 - --- 2022-01-11 Michal Suchánek New
[v5,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature 1 - - --- 2022-01-11 Michal Suchánek New
[v5,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature 1 - - --- 2022-01-11 Michal Suchánek New
crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1) crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1) - - - --- 2022-01-11 Herbert Xu New
[GIT,PULL] TPM DEVICE DRIVER updates for v5.17 (fixed) [GIT,PULL] TPM DEVICE DRIVER updates for v5.17 (fixed) - - - --- 2022-01-11 Jarkko Sakkinen New
[v4,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - - - --- 2022-01-10 Michal Suchánek New
[v4,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature - - - --- 2022-01-10 Michal Suchánek New
[v4,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2022-01-10 Michal Suchánek New
[v4,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2022-01-10 Michal Suchánek New
[v4,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2022-01-10 Michal Suchánek New
[v4,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature 1 1 - --- 2022-01-10 Michal Suchánek New
[v3,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - - - --- 2022-01-07 Michal Suchánek New
[v3,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature - - - --- 2022-01-07 Michal Suchánek New
[v3,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2022-01-07 Michal Suchánek New
[v3,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2022-01-07 Michal Suchánek New
[v3,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2022-01-07 Michal Suchánek New
[v3,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature 1 - - --- 2022-01-07 Michal Suchánek New
[v9,8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - 1 - --- 2022-01-05 Eric Snowberg New
[v9,7/8] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - 1 - --- 2022-01-05 Eric Snowberg New
[v9,6/8] efi/mokvar: move up init order Enroll kernel keys thru MOK - 1 - --- 2022-01-05 Eric Snowberg New
[v9,5/8] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - 1 - --- 2022-01-05 Eric Snowberg New
[v9,4/8] KEYS: store reference to machine keyring Enroll kernel keys thru MOK - 1 - --- 2022-01-05 Eric Snowberg New
[v9,3/8] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 2 - --- 2022-01-05 Eric Snowberg New
[v9,2/8] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - - 1 --- 2022-01-05 Eric Snowberg New
[v9,1/8] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 2 - --- 2022-01-05 Eric Snowberg New
[v7,3/3] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-05 Nayna Jain New
[v7,2/3] integrity: make integrity_keyring_from_id() non-static integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-05 Nayna Jain New
[v7,1/3] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - 1 - --- 2022-01-05 Nayna Jain New
Makefile: only run rpmspec if it exists Makefile: only run rpmspec if it exists - - - --- 2022-01-04 Adrian Ratiu New
[v4] KEYS: encrypted: Instantiate key with user-provided decrypted data [v4] KEYS: encrypted: Instantiate key with user-provided decrypted data - 1 - --- 2021-12-29 Yael Tzur New
« 1 2 ... 3 4 515 16 »