summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* PKCS#7: Missing inclusion of linux/err.hDavid Howells2014-07-251-0/+1
* Merge branch 'keys-fixes' into keys-nextDavid Howells2014-07-226-3/+20
|\
| * digsig: make crypto builtin if digsig selected as builtinDmitry Kasatkin2014-07-171-1/+2
| * RSA: Don't select non-existent symbolJean Delvare2014-07-171-1/+0
| * KEYS: Allow special keys (eg. DNS results) to be invalidated by CAP_SYS_ADMINDavid Howells2014-07-174-1/+18
* | Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-2213-25/+225
|\ \
| * | ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar2014-07-175-2/+63
| * | KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-174-4/+9
| * | KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-173-0/+25
| * | KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2014-07-172-19/+33
| * | KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-172-2/+95
| * | KEYS: special dot prefixed keyring name bug fixMimi Zohar2014-07-171-2/+4
* | | Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells2014-07-229-2/+1150
|\ \ \
| * | | pefile: Validate PKCS#7 trust chainDavid Howells2014-07-091-1/+1
| * | | pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells2014-07-091-0/+197
| * | | pefile: Handle pesign using the wrong OIDVivek Goyal2014-07-091-1/+7
| * | | pefile: Parse the "Microsoft individual code signing" data blobDavid Howells2014-07-096-2/+174
| * | | pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells2014-07-091-1/+20
| * | | pefile: Strip the wrapper off of the cert data blockDavid Howells2014-07-091-0/+71
| * | | pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells2014-07-095-0/+235
| * | | Provide PE binary definitionsDavid Howells2014-07-091-0/+448
| * | | KEYS: X.509: Fix a spelling mistakeDavid Howells2014-07-081-1/+1
* | | | Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells2014-07-2213-2/+1339
|\| | |
| * | | PKCS#7: Provide a key type for testing PKCS#7David Howells2014-07-083-0/+117
| * | | PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2014-07-083-0/+228
| * | | PKCS#7: Verify internal certificate chainDavid Howells2014-07-081-1/+87
| * | | PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells2014-07-082-0/+69
| * | | PKCS#7: Digest the data in a signed-data messageDavid Howells2014-07-082-1/+175
| * | | PKCS#7: Implement a parser [RFC 2315]David Howells2014-07-087-0/+630
| * | | X.509: Export certificate parse and free functionsDavid Howells2014-07-021-0/+3
| * | | X.509: Add bits needed for PKCS#7David Howells2014-07-013-2/+30
* | | | Merge tag 'keys-preparse-1-20140722' into keys-nextDavid Howells2014-07-2216-185/+291
|\ \ \ \ | |_|/ / |/| | |
| * | | KEYS: request_key_auth: Provide key preparsingDavid Howells2014-07-221-0/+13
| * | | KEYS: keyring: Provide key preparsingDavid Howells2014-07-221-11/+23
| * | | KEYS: big_key: Use key preparsingDavid Howells2014-07-222-17/+27
| * | | KEYS: RxRPC: Use key preparsingDavid Howells2014-07-221-68/+97
| * | | KEYS: DNS: Use key preparsingDavid Howells2014-07-221-18/+25
| * | | KEYS: Ceph: Use user_match()David Howells2014-07-221-6/+2
| * | | KEYS: Ceph: Use key preparsingDavid Howells2014-07-221-9/+15
| * | | KEYS: user: Use key preparsingDavid Howells2014-07-223-22/+30
| * | | KEYS: Call ->free_preparse() even after ->preparse() returns an errorDavid Howells2014-07-222-6/+7
| * | | KEYS: Allow expiry time to be set when preparsing a keyDavid Howells2014-07-223-3/+16
| * | | KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-225-6/+8
| * | | KEYS: Provide a generic instantiation functionDavid Howells2014-07-183-24/+33
|/ / /
* | | ima: provide double buffering for hash calculationDmitry Kasatkin2014-07-171-16/+49
* | | ima: introduce multi-page collect buffersDmitry Kasatkin2014-07-172-2/+104
* | | ima: use ahash API for file hash calculationDmitry Kasatkin2014-07-172-4/+192
* | | audit: fix dangling keywords in integrity ima message outputRichard Guy Briggs2014-07-172-4/+4
* | | ima: delay template descriptor lookup until useDmitry Kasatkin2014-07-171-1/+2
* | | ima: remove unnecessary i_mutex locking from ima_rdwr_violation_check()Dmitry Kasatkin2014-07-171-4/+0
| |/ |/|