Show patches with: none      |   1135 patches
« 1 2 3 411 12 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v4] KEYS: trusted: Fix trusted key backends when building as module [v4] KEYS: trusted: Fix trusted key backends when building as module - 3 1 --- 2021-12-01 Ahmad Fatoum New
[18/18] crypto: dh - accept only approved safe-prime groups in FIPS mode crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[17/18] crypto: dh - try to match domain parameters to a known safe-prime group crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[16/18] crypto: dh - calculate Q from P for the full public key verification crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[15/18] crypto: dh - store group id in dh-generic's dh_ctx crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[14/18] lib/mpi: export mpi_rshift crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[13/18] crypto: testmgr - add DH test vectors for key generation crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[12/18] crypto: dh - introduce support for ephemeral key generation to qat driver crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[11/18] crypto: dh - introduce support for ephemeral key generation to hpre driver crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[10/18] crypto: dh - introduce support for ephemeral key generation to dh-generic crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[09/18] crypto: dh - implement private key generation primitive crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[08/18] crypto: testmgr - run only subset of DH vectors based on config crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[07/18] crypto: testmgr - add DH RFC 3526 modp2048 test vector crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[06/18] crypto: dh - introduce RFC 3526 safe-prime groups crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[05/18] crypto: testmgr - add DH RFC 7919 ffdhe2048 test vector crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[04/18] crypto: dh - introduce RFC 7919 safe-prime groups crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[03/18] crypto: dh - optimize domain parameter serialization for well-known groups crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - - - --- 2021-12-01 Nicolai Stange New
[02/18] crypto: dh - constify struct dh's pointer members crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[01/18] crypto: dh - remove struct dh's ->q member crypto: dh - infrastructure for NVM in-band auth and FIPS conformance - 1 - --- 2021-12-01 Nicolai Stange New
[v2,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v5,2/2] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-24 Nayna Jain New
[v5,1/2] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-24 Nayna Jain New
security:trusted_tpm2: Fix memory leak in tpm2_key_encode() security:trusted_tpm2: Fix memory leak in tpm2_key_encode() - - - --- 2021-11-24 Jianglei Nie New
[v8,17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,16/17] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,15/17] efi/mokvar: move up init order Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,14/17] KEYS: link machine trusted keys to secondary_trusted_keys Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,13/17] integrity: store reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,12/17] KEYS: integrity: change link restriction to trust the machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,11/17] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,10/17] KEYS: add a reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,09/17] KEYS: Rename get_builtin_and_secondary_restriction Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,08/17] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,06/17] KEYS: CA link restriction Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,05/17] X.509: Parse Basic Constraints for CA Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,04/17] integrity: Do not allow machine keyring updates following init Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,03/17] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - 2 - --- 2021-11-24 Eric Snowberg New
[v8,02/17] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,01/17] KEYS: Create static version of public_key_verify_signature Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v4,4/4] security: DH - use KDF implementation from crypto API Add SP800-108 KDF implementation to crypto API 1 - - --- 2021-11-19 Stephan Mueller New
[v4,3/4] security: DH - remove dead code for zero padding Add SP800-108 KDF implementation to crypto API 1 - - --- 2021-11-19 Stephan Mueller New
[v4,2/4] crypto: add SP800-108 counter key derivation function Add SP800-108 KDF implementation to crypto API - - - --- 2021-11-19 Stephan Mueller New
[v4,1/4] crypto: Add key derivation self-test support code Add SP800-108 KDF implementation to crypto API - - - --- 2021-11-19 Stephan Mueller New
[v7,17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,16/17] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,15/17] efi/mokvar: move up init order Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,14/17] integrity: store reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,13/17] KEYS: link secondary_trusted_keys to machine trusted keys Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,12/17] KEYS: integrity: change link restriction to trust the machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,11/17] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,10/17] KEYS: add a reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,09/17] KEYS: Rename get_builtin_and_secondary_restriction Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,08/17] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,07/17] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,05/17] KEYS: CA link restriction Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,04/17] X.509: Parse Basic Constraints for CA Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,03/17] KEYS: Create static version of public_key_verify_signature Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,02/17] integrity: Do not allow machine keyring updates following init Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,01/17] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v3,4/4] security: DH - use KDF implementation from crypto API Add SP800-108 KDF implementation to crypto API - - - --- 2021-11-15 Stephan Mueller New
[v3,3/4] security: DH - remove dead code for zero padding Add SP800-108 KDF implementation to crypto API 1 - - --- 2021-11-15 Stephan Mueller New
[v3,2/4] crypto: add SP800-108 counter key derivation function Add SP800-108 KDF implementation to crypto API - - - --- 2021-11-15 Stephan Mueller New
[v3,1/4] crypto: Add key derivation self-test support code Add SP800-108 KDF implementation to crypto API - - - --- 2021-11-15 Stephan Mueller New
[v4,2/2] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-11 Nayna Jain New
[v4,1/2] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-11 Nayna Jain New
[v5] keys: X.509 public key issuer lookup without AKID [v5] keys: X.509 public key issuer lookup without AKID 2 1 - --- 2021-11-09 Andrew Zaborowski New
[2/2] module: Move duplicate mod_check_sig users code to mod_parse_sig [1/2] module: Use key_being_used_for for log messages in verify_appended_signature - - - --- 2021-11-05 Michal Suchánek New
[1/2] module: Use key_being_used_for for log messages in verify_appended_signature [1/2] module: Use key_being_used_for for log messages in verify_appended_signature - - - --- 2021-11-05 Michal Suchánek New
[5/5] certs: use if_changed to re-generate the key when the key type is changed certs: various cleanups of certs/Makefile - - - --- 2021-11-05 Masahiro Yamada New
[4/5] certs: use 'cmd' to hide openssl output in silent builds more simply certs: various cleanups of certs/Makefile - - - --- 2021-11-05 Masahiro Yamada New
[3/5] certs: remove noisy messages while generating the signing key certs: various cleanups of certs/Makefile - - - --- 2021-11-05 Masahiro Yamada New
[2/5] certs: check-in the default x509 config file certs: various cleanups of certs/Makefile - - - --- 2021-11-05 Masahiro Yamada New
[1/5] certs: remove meaningless $(error ...) in certs/Makefile certs: various cleanups of certs/Makefile - - - --- 2021-11-05 Masahiro Yamada New
[3/3] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2021-11-03 Michal Suchánek New
[2/3] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2021-11-03 Michal Suchánek New
[1/3] s390/kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2021-11-03 Michal Suchánek New
[RESEND] KEYS: trusted: Fix trusted key backends when building as module [RESEND] KEYS: trusted: Fix trusted key backends when building as module - - 1 --- 2021-11-01 Andreas Rammhold New
[v2] certs: system_keyring.c: clean up kernel-doc [v2] certs: system_keyring.c: clean up kernel-doc - - - --- 2021-11-01 Randy Dunlap New
[v3,2/2] tpm: use SM3 instead of SM3_256 use SM3 instead of SM3_256 - - - --- 2021-10-26 Tianjia Zhang New
[v3,1/2] crypto: use SM3 instead of SM3_256 use SM3 instead of SM3_256 - - - --- 2021-10-26 Tianjia Zhang New
certs: system_keyring.c: clean up kernel-doc certs: system_keyring.c: clean up kernel-doc - - - --- 2021-10-25 Randy Dunlap New
[v2,2/2] tpm: use SM3 instead of SM3_256 use SM3 instead of SM3_256 - - - --- 2021-10-19 Tianjia Zhang New
[v2,1/2] crypto: use SM3 instead of SM3_256 use SM3 instead of SM3_256 - - - --- 2021-10-19 Tianjia Zhang New
[RESEND] keys: X.509 public key issuer lookup without AKID [RESEND] keys: X.509 public key issuer lookup without AKID 1 1 - --- 2021-10-19 Andrew Zaborowski New
[v4,5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 1 1 --- 2021-10-11 Ahmad Fatoum New
[v4,4/5] crypto: caam - add in-kernel interface for blob generator KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 1 1 --- 2021-10-11 Ahmad Fatoum New
[v4,3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material KEYS: trusted: Introduce support for NXP CAAM-based trusted keys 1 1 1 --- 2021-10-11 Ahmad Fatoum New
[v4,2/5] KEYS: trusted: allow users to use kernel RNG for key material KEYS: trusted: Introduce support for NXP CAAM-based trusted keys 1 1 1 --- 2021-10-11 Ahmad Fatoum New
[v4,1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 1 2 --- 2021-10-11 Ahmad Fatoum New
[2/2] tpm: use SM3 instead of SM3_256 tpm: use SM3 instead of SM3_256 - - - --- 2021-10-09 Tianjia Zhang New
[1/2] crypto: use SM3 instead of SM3_256 tpm: use SM3 instead of SM3_256 - - - --- 2021-10-09 Tianjia Zhang New
sign-file: refactor help output sign-file: refactor help output - - - --- 2021-10-08 Matteo Croce New
MODSIGN: Add option to define PKCS11 module MODSIGN: Add option to define PKCS11 module - - - --- 2021-10-06 Sergei Iudin New
« 1 2 3 411 12 »