<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/lib/digsig.c, branch v3.7-rc7</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/lib/digsig.c?h=v3.7-rc7</id>
<link rel='self' href='https://git.amat.us/linux/atom/lib/digsig.c?h=v3.7-rc7'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-09-13T01:13:02Z</updated>
<entry>
<title>digsig: add hash size comparision on signature verification</title>
<updated>2012-09-13T01:13:02Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2012-09-12T10:26:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=bc01637a80f5b670bd70a0279d3f93fa8de1c96d'/>
<id>urn:sha1:bc01637a80f5b670bd70a0279d3f93fa8de1c96d</id>
<content type='text'>
When pkcs_1_v1_5_decode_emsa() returns without error and hash sizes do
not match, hash comparision is not done and digsig_verify_rsa() returns
no error.  This is a bug and this patch fixes it.

The bug was introduced in v3.3 by commit b35e286a640f ("lib/digsig:
pkcs_1_v1_5_decode_emsa cleanup").

Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>lib/digsig: checks for NULL return value</title>
<updated>2012-02-01T13:24:04Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2012-01-26T17:13:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=86f8bedc9e1a8ddb4f1d9ff1f0c1229cc0797d6d'/>
<id>urn:sha1:86f8bedc9e1a8ddb4f1d9ff1f0c1229cc0797d6d</id>
<content type='text'>
mpi_read_from_buffer() return value must not be NULL.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Reviewed-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>lib/digsig: pkcs_1_v1_5_decode_emsa cleanup</title>
<updated>2012-02-01T13:23:39Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2012-01-26T17:13:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b35e286a640f31d619a637332972498b51f3fd90'/>
<id>urn:sha1:b35e286a640f31d619a637332972498b51f3fd90</id>
<content type='text'>
Removed useless 'is_valid' variable in pkcs_1_v1_5_decode_emsa(),
which was inhereted from original code. Client now uses return value
to check for an error.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Reviewed-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>lib/digsig: additional sanity checks against badly formated key payload</title>
<updated>2012-02-01T13:23:38Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2012-01-26T17:13:25Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f58a08152ce4198a2a1da162b97ecf8264c24866'/>
<id>urn:sha1:f58a08152ce4198a2a1da162b97ecf8264c24866</id>
<content type='text'>
Added sanity checks for possible wrongly formatted key payload data:
- minimum key payload size
- zero modulus length
- corrected upper key payload boundary.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Reviewed-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>crypto: digital signature verification support</title>
<updated>2011-11-09T10:10:37Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@intel.com</email>
</author>
<published>2011-10-14T12:25:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=051dbb918c7fb7da8e64a2cd0d804ba73399709f'/>
<id>urn:sha1:051dbb918c7fb7da8e64a2cd0d804ba73399709f</id>
<content type='text'>
This patch implements RSA digital signature verification using GnuPG library.

The format of the signature and the public key is defined by their respective
headers. The signature header contains version information, algorithm,
and keyid, which was used to generate the signature.
The key header contains version and algorythim type.
The payload of the signature and the key are multi-precision integers.

The signing and key management utilities evm-utils provide functionality
to generate signatures and load keys into the kernel keyring.
When the key is added to the kernel keyring, the keyid defines the name
of the key.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@intel.com&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
</feed>
