Toggle navigation
Patchwork
Linux Keyrings
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| Archived =
No
| 2959 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
23
24
25
…
29
30
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[3/4] certs: Add ability to preload revocation certs
keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries
1 - -
-
-
-
2021-02-25
David Howells
New
[2/4] certs: Move load_system_certificate_list to a common function
keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries
1 - -
-
-
-
2021-02-25
David Howells
New
[1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries
- - -
-
-
-
2021-02-25
David Howells
New
[v9,9/9] certs: Add support for using elliptic curve keys for signing modules
Add support for x509 certs with NIST P384/256/192 keys
- 1 -
-
-
-
2021-02-25
Stefan Berger
New
[v9,8/9] ecdsa: Register NIST P384 and extend test suite
Add support for x509 certs with NIST P384/256/192 keys
- - 1
-
-
-
2021-02-25
Stefan Berger
New
[v9,7/9] crypto: Add math to support fast NIST P384
Add support for x509 certs with NIST P384/256/192 keys
- - 1
-
-
-
2021-02-25
Stefan Berger
New
[v9,6/9] crypto: Add NIST P384 curve parameters
Add support for x509 certs with NIST P384/256/192 keys
- - 1
-
-
-
2021-02-25
Stefan Berger
New
[v9,5/9] x509: Add OID for NIST P384 and extend parser for it
Add support for x509 certs with NIST P384/256/192 keys
- - 1
-
-
-
2021-02-25
Stefan Berger
New
[v9,4/9] ima: Support EC keys for signature verification
Add support for x509 certs with NIST P384/256/192 keys
1 2 -
-
-
-
2021-02-25
Stefan Berger
New
[v9,3/9] x509: Add support for parsing x509 certs with ECDSA keys
Add support for x509 certs with NIST P384/256/192 keys
- - -
-
-
-
2021-02-25
Stefan Berger
New
[v9,2/9] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST P384/256/192 keys
- 1 1
-
-
-
2021-02-25
Stefan Berger
New
[v9,1/9] crypto: Add support for ECDSA signature verification
Add support for x509 certs with NIST P384/256/192 keys
1 - -
-
-
-
2021-02-25
Stefan Berger
New
certs: select PKCS7_MESSAGE_PARSER if needed
certs: select PKCS7_MESSAGE_PARSER if needed
- - -
-
-
-
2021-02-25
Arnd Bergmann
New
[v2,3/3] adds nist_p384 register and unregister to support nist_p384 and tests
[v2,1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-22
Saulo Alessandre de Lima
New
[v2,2/3] adds math to support nist_p384 fast and changes routines to pass forward ecc_curve
[v2,1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-22
Saulo Alessandre de Lima
New
[v2,1/3] add params and ids to support nist_p384
[v2,1/3] add params and ids to support nist_p384
- - 1
-
-
-
2021-02-22
Saulo Alessandre de Lima
New
[4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign…
Check codeSigning extended key usage extension
- - -
-
-
-
2021-02-22
Chun-Yi Lee
New
[3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
Check codeSigning extended key usage extension
- - -
-
-
-
2021-02-22
Chun-Yi Lee
New
[2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
Check codeSigning extended key usage extension
- - -
-
-
-
2021-02-22
Chun-Yi Lee
New
[1/4] X.509: Add CodeSigning extended key usage parsing
Check codeSigning extended key usage extension
- - -
-
-
-
2021-02-22
Chun-Yi Lee
New
[9/9] pm: hibernate: seal the encryption key with a PCR policy
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[8/9] pm: hibernate: Verify the digest encryption key
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[6/9] pm: hibernate: Optionally store and verify a hash of the image
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[5/9] security: keys: trusted: Allow storage of PCR values in creation data
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[4/9] security: keys: trusted: Store the handle of a loaded key
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[3/9] security: keys: trusted: Parse out individual components of the key blob
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[1/9] tpm: Add support for in-kernel resetting of PCRs
Enable hibernation when Lockdown is enabled
- - -
-
-
-
2021-02-20
Matthew Garrett
New
[3/3] add nist_p384 register and unregister to support nist_p384
[1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-19
Saulo Alessandre de Lima
New
[2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
[1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-19
Saulo Alessandre de Lima
New
[1/3] add params and ids to support nist_p384
[1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-19
Saulo Alessandre de Lima
New
[1/3] add params and ids to support nist_p384
[1/3] add params and ids to support nist_p384
- - -
-
-
-
2021-02-19
Saulo Alessandre de Lima
New
certs: Add support for using elliptic curve keys for signing modules
certs: Add support for using elliptic curve keys for signing modules
- 1 1
-
-
-
2021-02-19
Stefan Berger
New
watch_queue: rectify kernel-doc for init_watch()
watch_queue: rectify kernel-doc for init_watch()
- 1 -
-
-
-
2021-02-19
David Howells
New
[v2,5/5] ima: enable loading of build time generated key on .ima keyring
ima: kernel build support for loading the kernel module signing key
- 2 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,4/5] keys: define build time generated ephemeral kernel CA key
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-18
Nayna Jain
New
[v2,3/5] ima: update kernel module signing process during build
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,2/5] keys: generate self-signed module signing key using CSR
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,1/5] keys: cleanup build time module signing keys
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2] sign-file: add openssl engine support
[v2] sign-file: add openssl engine support
- - -
-
-
-
2021-02-18
Yang Song
New
cert: Add kconfig dependency for validate_trust
cert: Add kconfig dependency for validate_trust
- - -
-
-
-
2021-02-17
Eric Snowberg
New
[v8,4/4] ima: Support EC keys for signature verification
Add support for x509 certs with NIST p256 and p192 keys
1 2 -
-
-
-
2021-02-15
Stefan Berger
New
[v8,3/4] x509: Add support for parsing x509 certs with ECDSA keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-02-15
Stefan Berger
New
[v8,2/4] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- 1 -
-
-
-
2021-02-15
Stefan Berger
New
[v8,1/4] crypto: Add support for ECDSA signature verification
Add support for x509 certs with NIST p256 and p192 keys
1 - -
-
-
-
2021-02-15
Stefan Berger
New
[5/5] ima: enable loading of build time generated key to .ima keyring
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[4/5] keys: define build time generated ephemeral kernel CA key
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[3/5] ima: update kernel module signing process during build
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[2/5] keys: generate self-signed module signing key using CSR
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[1/5] keys: cleanup build time module signing keys
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[2/2] keys: X.509 public key issuer lookup without AKID
[v3,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
- 1 -
-
-
-
2021-02-11
Andrew Zaborowski
New
[v3,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
[v3,1/2] keys: crypto: Replace BUG_ON() with WARN() in find_asymmetric_key()
- - -
-
-
-
2021-02-11
Andrew Zaborowski
New
[GIT,PULL] Add EFI_CERT_X509_GUID support for dbx/mokx entries
[GIT,PULL] Add EFI_CERT_X509_GUID support for dbx/mokx entries
- - -
-
-
-
2021-02-10
David Howells
New
[GIT,PULL] keys: Collected minor fixes and cleanups
[GIT,PULL] keys: Collected minor fixes and cleanups
- - -
-
-
-
2021-02-10
David Howells
New
[no subject]
Untitled series #432993
- - -
-
-
-
2021-02-10
David Howells
New
[v6,5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Enable root to update the blacklist keyring
- - 1
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,4/5] certs: Factor out the blacklist hash creation
Enable root to update the blacklist keyring
- - -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,3/5] certs: Make blacklist_vet_description() more strict
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,2/5] certs: Check that builtin blacklist hashes are valid
Enable root to update the blacklist keyring
- - -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,1/5] tools/certs: Add print-cert-tbs-hash.sh
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-02-10
Mickaël Salaün
New
sign-file: add openssl engine support
sign-file: add openssl engine support
- - -
-
-
-
2021-02-10
Yang Song
New
[2/2] keys: Allow request_key upcalls from a container to be intercepted
keys: request_key() interception in containers
- - -
-
-
-
2021-02-04
David Howells
New
[1/2] Add namespace tags that can be used for matching without pinning a ns
keys: request_key() interception in containers
- - -
-
-
-
2021-02-04
David Howells
New
certs: include prototype for load_certificate_list
certs: include prototype for load_certificate_list
1 - -
-
-
-
2021-02-04
Eric Snowberg
New
[v7,4/4] ima: Support EC keys for signature verification
Add support for x509 certs with NIST p256 and p192 keys
1 2 -
-
-
-
2021-02-01
Stefan Berger
New
[v7,3/4] x509: Add support for parsing x509 certs with ECDSA keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-02-01
Stefan Berger
New
[v7,2/4] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- 1 -
-
-
-
2021-02-01
Stefan Berger
New
[v7,1/4] crypto: Add support for ECDSA signature verification
Add support for x509 certs with NIST p256 and p192 keys
1 - -
-
-
-
2021-02-01
Stefan Berger
New
[v6,4/4] ima: Support EC keys for signature verification
Add support for x509 certs with NIST p256 and p192 keys
- 2 -
-
-
-
2021-01-31
Stefan Berger
New
[v6,3/4] x509: Add support for parsing x509 certs with ECDSA keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-31
Stefan Berger
New
[v6,2/4] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- 1 -
-
-
-
2021-01-31
Stefan Berger
New
[v6,1/4] crypto: Add support for ECDSA signature verification
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-31
Stefan Berger
New
[v4,3/3] x509: Add support for parsing x509 certs with ECDSA keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-28
Stefan Berger
New
[v4,2/3] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-28
Stefan Berger
New
[v4,1/3] crypto: Add support for ECDSA signature verification
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-28
Stefan Berger
New
[v15,5/5] security: keys: trusted: Make sealed key properly interoperable
TPM 2.0 trusted key rework
- 1 1
-
-
-
2021-01-27
James Bottomley
New
[v15,4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
TPM 2.0 trusted key rework
- - 1
-
-
-
2021-01-27
James Bottomley
New
[v15,3/5] security: keys: trusted: fix TPM2 authorizations
TPM 2.0 trusted key rework
- 1 1
-
-
-
2021-01-27
James Bottomley
New
[v15,2/5] oid_registry: Add TCG defined OIDS for TPM keys
TPM 2.0 trusted key rework
1 1 -
-
-
-
2021-01-27
James Bottomley
New
[v15,1/5] lib: add ASN.1 encoder
TPM 2.0 trusted key rework
- 2 1
-
-
-
2021-01-27
James Bottomley
New
[v3,3/3] x509: Add support for NIST p192 keys in certificates and akcipher
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-27
Stefan Berger
New
[v3,2/3] x509: Add support for parsing x509 certs with NIST p256 keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-27
Stefan Berger
New
[v3,1/3] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-27
Stefan Berger
New
[v6] scripts: use pkg-config to locate libcrypto
[v6] scripts: use pkg-config to locate libcrypto
- - -
-
-
-
2021-01-27
Rolf Eike Beer
New
[v2,3/3] x509: Add support for NIST p192 keys in certificates and akcipher
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[v2,2/3] x509: Add support for parsing x509 certs with NIST p256 keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[v2,1/3] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[3/3] x509: Detect sm2 keys by their parameters OID
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[2/3] x509: Add support for NIST p192 keys in certificates and akcipher
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[1/3] x509: Add support for parsing x509 certs with NIST p256 keys
Add support for x509 certs with NIST p256 and p192 keys
- - -
-
-
-
2021-01-26
Stefan Berger
New
[v2,7/7] fs: HKDF - remove duplicate memory clearing
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,6/7] fs: use HKDF implementation from kernel crypto API
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,5/7] security: DH - use KDF implementation from crypto API
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,4/7] security: DH - remove dead code for zero padding
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,3/7] crypto: add RFC5869 HKDF
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,2/7] crypto: add SP800-108 counter key derivation function
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v2,1/7] crypto: Add key derivation self-test support code
Add KDF implementations to crypto API
- - -
-
-
-
2021-01-24
Stephan Mueller
New
[v5,4/4] integrity: Load mokx variables into the blacklist keyring
Add EFI_CERT_X509_GUID support for dbx/mokx entries
- - -
-
-
-
2021-01-22
Eric Snowberg
New
[v5,3/4] certs: Add ability to preload revocation certs
Add EFI_CERT_X509_GUID support for dbx/mokx entries
1 - -
-
-
-
2021-01-22
Eric Snowberg
New
«
1
2
...
23
24
25
…
29
30
»