aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys (follow)
AgeCommit message (Expand)AuthorFilesLines
2015-07-02Merge tag 'module-implicit-v4.1-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/paulg/linuxLinus Torvalds1-0/+1
2015-06-27Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds3-11/+35
2015-06-25crypto: asymmetric_keys/rsa - Use non-conflicting variable nameGuenter Roeck1-2/+2
2015-06-16crypto/asymmetric_keys: pkcs7_key_type needs module.hPaul Gortmaker1-0/+1
2015-05-21KEYS: fix "ca_keys=" partial key matchingMimi Zohar3-11/+35
2014-10-12Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds11-232/+518
2014-10-06KEYS: output last portion of fingerprint in /proc/keysDmitry Kasatkin1-5/+5
2014-10-06KEYS: strip 'id:' from ca_keyidDmitry Kasatkin1-1/+1
2014-10-06KEYS: use swapped SKID for performing partial matchingDmitry Kasatkin2-9/+9
2014-10-06KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin4-24/+76
2014-10-03X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells3-2/+11
2014-10-03KEYS: handle error code encoded in pointerDmitry Kasatkin1-2/+2
2014-09-22KEYS: Check hex2bin()'s return when generating an asymmetric key IDDavid Howells1-7/+8
2014-09-16PKCS#7: Handle PKCS#7 messages that contain no X.509 certsDavid Howells2-17/+47
2014-09-16PKCS#7: Better handling of unsupported cryptoDavid Howells5-16/+74
2014-09-16KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells9-184/+195
2014-09-16KEYS: Implement binary asymmetric key ID handlingDavid Howells2-0/+93
2014-09-16KEYS: Make the key matching functions return boolDavid Howells1-2/+2
2014-09-16KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2-4/+3
2014-09-16KEYS: Remove key_type::def_lookup_typeDavid Howells2-2/+0
2014-09-16KEYS: Preparse match dataDavid Howells1-1/+30
2014-09-16Merge tag 'keys-next-fixes-20140916' into keys-nextDavid Howells1-3/+3
2014-09-16Merge tag 'keys-fixes-20140916' into keys-nextDavid Howells1-28/+33
2014-09-16PKCS#7: Fix the parser cleanup to drain parsed out X.509 certsDavid Howells1-20/+19
2014-09-16PKCS#7: Provide a single place to do signed info block freeingDavid Howells1-9/+15
2014-09-16PKCS#7: Add a missing staticDavid Howells1-3/+3
2014-09-03KEYS: Set pr_fmt() in asymmetric key signature handlingDavid Howells1-0/+1
2014-09-03PEFILE: Relax the check on the length of the PKCS#7 certDavid Howells1-16/+33
2014-09-03KEYS: Fix public_key asymmetric key subtype nameDavid Howells1-0/+1
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells1-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells2-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun1-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells1-0/+1
2014-07-22Merge branch 'keys-fixes' into keys-nextDavid Howells1-1/+0
2014-07-22Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells3-20/+142
2014-07-22Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells6-1/+678
2014-07-22Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells11-2/+1302
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells1-24/+1
2014-07-17RSA: Don't select non-existent symbolJean Delvare1-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin2-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells1-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells1-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal1-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells5-1/+168