summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2015-06-273-11/+35
|\
| * KEYS: fix "ca_keys=" partial key matchingMimi Zohar2015-05-213-11/+35
* | crypto: asymmetric_keys/rsa - Use non-conflicting variable nameGuenter Roeck2015-06-251-2/+2
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2014-10-1211-232/+518
|\
| * KEYS: output last portion of fingerprint in /proc/keysDmitry Kasatkin2014-10-061-5/+5
| * KEYS: strip 'id:' from ca_keyidDmitry Kasatkin2014-10-061-1/+1
| * KEYS: use swapped SKID for performing partial matchingDmitry Kasatkin2014-10-062-9/+9
| * KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-064-24/+76
| * X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells2014-10-033-2/+11
| * KEYS: handle error code encoded in pointerDmitry Kasatkin2014-10-031-2/+2
| * KEYS: Check hex2bin()'s return when generating an asymmetric key IDDavid Howells2014-09-221-7/+8
| * PKCS#7: Handle PKCS#7 messages that contain no X.509 certsDavid Howells2014-09-162-17/+47
| * PKCS#7: Better handling of unsupported cryptoDavid Howells2014-09-165-16/+74
| * KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells2014-09-169-184/+195
| * KEYS: Implement binary asymmetric key ID handlingDavid Howells2014-09-162-0/+93
| * KEYS: Make the key matching functions return boolDavid Howells2014-09-161-2/+2
| * KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-162-4/+3
| * KEYS: Remove key_type::def_lookup_typeDavid Howells2014-09-162-2/+0
| * KEYS: Preparse match dataDavid Howells2014-09-161-1/+30
| * Merge tag 'keys-next-fixes-20140916' into keys-nextDavid Howells2014-09-161-3/+3
| |\
| | * PKCS#7: Add a missing staticDavid Howells2014-09-161-3/+3
| * | Merge tag 'keys-fixes-20140916' into keys-nextDavid Howells2014-09-161-28/+33
| |\ \ | | |/ | |/|
| | * PKCS#7: Fix the parser cleanup to drain parsed out X.509 certsDavid Howells2014-09-161-20/+19
| | * PKCS#7: Provide a single place to do signed info block freeingDavid Howells2014-09-161-9/+15
| * | KEYS: Set pr_fmt() in asymmetric key signature handlingDavid Howells2014-09-031-0/+1
| |/
* | PEFILE: Relax the check on the length of the PKCS#7 certDavid Howells2014-09-031-16/+33
* | KEYS: Fix public_key asymmetric key subtype nameDavid Howells2014-09-031-0/+1
|/
* X.509: Need to export x509_request_asymmetric_key()David Howells2014-08-031-0/+1
* PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells2014-07-311-4/+2
* PKCS#7: Use x509_request_asymmetric_key()David Howells2014-07-292-72/+25
* X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells2014-07-281-6/+3
* PKCS#7: fix sparse non static symbol warningWei Yongjun2014-07-281-1/+1
* PKCS#7: Missing inclusion of linux/err.hDavid Howells2014-07-251-0/+1
* Merge branch 'keys-fixes' into keys-nextDavid Howells2014-07-221-1/+0
|\
| * RSA: Don't select non-existent symbolJean Delvare2014-07-171-1/+0
* | Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-223-20/+142
|\ \
| * | KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-3/+6
| * | KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-172-0/+20
| * | KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2014-07-172-19/+33
| * | KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+86
| |/
* | Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells2014-07-226-1/+678
|\ \
| * | pefile: Validate PKCS#7 trust chainDavid Howells2014-07-091-1/+1
| * | pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells2014-07-091-0/+197
| * | pefile: Handle pesign using the wrong OIDVivek Goyal2014-07-091-1/+7
| * | pefile: Parse the "Microsoft individual code signing" data blobDavid Howells2014-07-095-1/+168
| * | pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells2014-07-091-1/+20
| * | pefile: Strip the wrapper off of the cert data blockDavid Howells2014-07-091-0/+71
| * | pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells2014-07-094-0/+217
| * | KEYS: X.509: Fix a spelling mistakeDavid Howells2014-07-081-1/+1
* | | Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells2014-07-2211-2/+1302
|\| |