Toggle navigation
Patchwork
Linux Keyrings
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 2975 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
20
21
22
…
29
30
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v3,05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-08-12
Eric Snowberg
New
[v3,04/14] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-08-12
Eric Snowberg
New
[v3,03/14] integrity: Trust MOK keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-08-12
Eric Snowberg
New
[v3,02/14] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-08-12
Eric Snowberg
New
[v3,01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Enroll kernel keys thru MOK
- - -
-
-
-
2021-08-12
Eric Snowberg
New
crypto: public_key: fix overflow during implicit conversion
crypto: public_key: fix overflow during implicit conversion
- - -
-
-
-
2021-08-10
zhenwei pi
New
asymmetric_keys: verify_pefile: fix kernel-doc notation
asymmetric_keys: verify_pefile: fix kernel-doc notation
- - -
-
-
-
2021-08-08
Randy Dunlap
New
[v2] fscrypt: support trusted keys
[v2] fscrypt: support trusted keys
- - -
-
-
-
2021-08-06
Ahmad Fatoum
New
[RFC,4/4] cxl/pci: Add really basic CMA authentication support.
PCI/CMA and SPDM library
- - -
-
-
-
2021-08-04
Jonathan Cameron
New
[RFC,3/4] PCI/CMA: Initial support for Component Measurement and Authentication ECN
PCI/CMA and SPDM library
- - -
-
-
-
2021-08-04
Jonathan Cameron
New
[RFC,2/4] spdm: Introduce a library for DMTF SPDM
PCI/CMA and SPDM library
- - -
-
-
-
2021-08-04
Jonathan Cameron
New
[RFC,1/4] lib/asn1_encoder: Add a function to encode many byte integer values.
PCI/CMA and SPDM library
- - -
-
-
-
2021-08-04
Jonathan Cameron
New
X.509 asn1-encoder: Add linux/types.h include
X.509 asn1-encoder: Add linux/types.h include
- - -
-
-
-
2021-08-04
Jonathan Cameron
New
[v3] KEYS: trusted: Fix trusted key backends when building as module
[v3] KEYS: trusted: Fix trusted key backends when building as module
- 3 -
-
-
-
2021-07-30
Andreas Rammhold
New
[v2] KEYS: trusted: Fix trusted key backends when building as module
[v2] KEYS: trusted: Fix trusted key backends when building as module
- 1 -
-
-
-
2021-07-29
Andreas Rammhold
New
[RFC,v1] fscrypt: support encrypted and trusted keys
[RFC,v1] fscrypt: support encrypted and trusted keys
- - -
-
-
-
2021-07-27
Ahmad Fatoum
New
[RFC,v2,12/12] integrity: store reference to mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,11/12] integrity: Do not allow mok keyring updates following init
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,09/12] KEYS: add a reference to mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,08/12] integrity: Suppress error message for keys added to the mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,07/12] integrity: add new keyring handler for mok keys
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,06/12] integrity: accessor function to get trust_moklist
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,04/12] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,03/12] integrity: Trust MOK keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,02/12] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[V2] security: keys: trusted: Fix memory leaks on allocated blob
[V2] security: keys: trusted: Fix memory leaks on allocated blob
1 - -
-
-
-
2021-07-26
Colin King
New
security: keys: trusted: Fix memory leaks on allocated blob
security: keys: trusted: Fix memory leaks on allocated blob
1 1 -
-
-
-
2021-07-23
Colin King
New
[RFC,v1,4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,3/4] ubifs: auth: remove never hit key type error check
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,2/4] dm: crypt: use new key_extract_material helper
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,1/4] keys: introduce key_extract_material helper
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[3/4] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- 1 -
-
-
-
2021-07-21
Ahmad Fatoum
New
[2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
1 - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[1/4] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
1 - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
[v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- 1 1
-
-
-
2021-07-21
Ahmad Fatoum
New
KEYS: trusted: Fix trusted key backends when building as module
KEYS: trusted: Fix trusted key backends when building as module
- 1 -
-
-
-
2021-07-16
Andreas Rammhold
New
[v8,5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,4/5] certs: Factor out the blacklist hash creation
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,3/5] certs: Make blacklist_vet_description() more strict
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,2/5] certs: Check that builtin blacklist hashes are valid
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,1/5] tools/certs: Add print-cert-tbs-hash.sh
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-07-12
Mickaël Salaün
New
X.509: Support parsing certificate using SM2 algorithm
X.509: Support parsing certificate using SM2 algorithm
1 - -
-
-
-
2021-07-12
tianjia.zhang
New
[RFC,12/12] integrity: Suppress error message for keys added to the mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,11/12] integrity: move keys from the mok keyring into the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,10/12] integrity: add new keyring handler
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,09/12] integrity: accessor function to get trust_moklist
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,07/12] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,06/12] integrity: Trust mok keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,05/12] integrity: Introduce mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,04/12] integrity: add integrity_destroy_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,03/12] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[v8,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
[v8,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
[v7,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
[v7,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
certs: Redirect openssl error message to null device
certs: Redirect openssl error message to null device
- - -
-
-
-
2021-06-25
Stefan Berger
New
[v2] sign-file: Fix confusing error messages
[v2] sign-file: Fix confusing error messages
- - -
-
-
-
2021-06-24
tianjia.zhang
New
[v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
[v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
1 1 -
-
-
-
2021-06-24
tianjia.zhang
New
[v2,2/6] KEYS: trusted: Allow import from existing key material for development
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,5/6] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,3/6] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[3/3] doc: trusted-encrypted: add DCP as new trust source
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[1/3] crypto: mxs-dcp: Add support for hardware provided keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[v6,4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-10
Stefan Berger
New
[v6,3/4] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
1 - 1
-
-
-
2021-06-10
Stefan Berger
New
[v6,2/4] certs: Check whether openssl tool is available
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-10
Stefan Berger
New
[v6,1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 1
-
-
-
2021-06-10
Stefan Berger
New
tpm2_load_command leaks memory
tpm2_load_command leaks memory
- - -
-
-
-
2021-06-10
Dhiraj Shah
New
[v2] crypto: sm2 - fix a memory leak in sm2
[v2] crypto: sm2 - fix a memory leak in sm2
- 1 -
-
-
-
2021-06-04
Hongbo Li
New
[v5,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-02
Stefan Berger
New
[v5,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-02
Stefan Berger
New
[v5,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
1 - 1
-
-
-
2021-06-01
Stefan Berger
New
[v5,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 1
-
-
-
2021-06-01
Stefan Berger
New
crypto: sm2 - fix a memory leak in sm2
crypto: sm2 - fix a memory leak in sm2
- 1 -
-
-
-
2021-05-31
Hongbo Li
New
crypto: fix a memory leak in sm2
crypto: fix a memory leak in sm2
- 1 -
-
-
-
2021-05-31
Hongbo Li
New
[v2,7/7] crypto: add eddsa test vector
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,6/7] crypto: ed25519 cert verification
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,5/7] crypto: move common code in sm2 to ec_mpi.c and ec_mpi.h
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,4/7] x509: add support for eddsa
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,3/7] lib/mpi: export some common function
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,2/7] lib/mpi: use kcalloc in mpi_resize
crypto: add eddsa support for x509
- - -
-
-
-
2021-05-27
Hongbo Li
New
[v2,1/7] crypto: fix a memory leak in sm2
crypto: add eddsa support for x509
- 1 -
-
-
-
2021-05-27
Hongbo Li
New
[RESEND,2/2] keys: X.509 public key issuer lookup without AKID
[RESEND,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
- 1 -
-
-
-
2021-05-25
Andrew Zaborowski
New
[RESEND,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
[RESEND,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
- - -
-
-
-
2021-05-25
Andrew Zaborowski
New
[v2,1/1] doc: add draft RFC for TPM Key format
draft RFC for TPM key format
- - -
-
-
-
2021-05-24
James Bottomley
New
certs: Fix kernel-doc
certs: Fix kernel-doc
- - -
-
-
-
2021-05-24
Yang Li
New
[v8,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeS…
Check codeSigning extended key usage extension
- - -
-
-
-
2021-05-24
Chun-Yi Lee
New
[v8,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
Check codeSigning extended key usage extension
- - -
-
-
-
2021-05-24
Chun-Yi Lee
New
[v8,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
Check codeSigning extended key usage extension
- - -
-
-
-
2021-05-24
Chun-Yi Lee
New
«
1
2
...
20
21
22
…
29
30
»