summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys/x509_public_key.c
Commit message (Expand)AuthorAgeFilesLines
* X.509: Introduce scope-based x509_certificate allocationLukas Wunner2024-04-121-22/+9
* certs: Break circular dependency when selftest is modularHerbert Xu2023-10-271-7/+1
* X.509: if signature is unsupported skip validationThore Sommer2023-08-251-0/+5
* KEYS: asymmetric: Move sm2 code into x509_public_keyHerbert Xu2023-06-231-8/+21
* certs: Add FIPS selftestsDavid Howells2022-06-211-1/+7
* certs: Factor out the blacklist hash creationMickaël Salaün2022-05-231-1/+2
* KEYS: asymmetric: enforce that sig algo matches key algoEric Biggers2022-03-101-6/+0
* KEYS: x509: remove dead code that set ->unsupported_sigEric Biggers2022-03-081-9/+0
* KEYS: x509: remove never-set ->unsupported_key flagEric Biggers2022-03-081-9/+0
* keys: X.509 public key issuer lookup without AKIDAndrew Zaborowski2022-01-091-0/+10
* x509: Add support for parsing x509 certs with ECDSA keysStefan Berger2021-03-261-1/+3
* X.509: support OSCCA SM2-with-SM3 certificate verificationTianjia Zhang2020-09-251-0/+3
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-241-5/+1
* crypto: shash - remove shash_desc::flagsEric Biggers2019-04-251-1/+0
* X.509: fix comparisons of ->pkey_algoEric Biggers2017-12-081-1/+1
* X.509: use crypto_shash_digest()Eric Biggers2017-12-081-5/+1
* pkcs7: Set the module licence to prevent taintingDavid Howells2017-11-151-0/+1
* X.509: Allow X.509 certs to be blacklistedDavid Howells2017-04-031-0/+15
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-20/+1
* X.509: Move the trust validation code out to its own fileDavid Howells2016-04-111-79/+0
* X.509: Use verify_signature() if we have a struct key * to useDavid Howells2016-04-111-2/+1
* KEYS: Generalise x509_request_asymmetric_key()David Howells2016-04-111-3/+2
* KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells2016-04-111-89/+0
* X.509: Fix self-signed determinationDavid Howells2016-04-061-0/+9
* X.509: Extract signature digest and make self-signed cert checks earlierDavid Howells2016-04-061-40/+86
* X.509: Retain the key verification dataDavid Howells2016-04-061-30/+31
* X.509: Whitespace cleanupDavid Howells2016-04-061-2/+2
* X.509: Make algo identifiers text instead of enumDavid Howells2016-03-031-9/+8
* crypto: KEYS: convert public key and digsig asym to the akcipher apiTadeusz Struk2016-02-101-11/+6
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+2
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2015-11-051-4/+5
|\
| * KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-4/+5
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2015-11-041-2/+3
|\ \ | |/ |/|
| * crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()Sowmini Varadhan2015-10-201-2/+3
* | X.509: Don't strip leading 00's from key ID when constructing key descriptionDavid Howells2015-09-251-4/+0
|/
* PKCS#7: Improve and export the X.509 ASN.1 time object decoderDavid Howells2015-08-121-8/+1
* X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifierDavid Howells2015-08-071-26/+58
* X.509: Extract both parts of the AuthorityKeyIdentifierDavid Howells2015-08-071-4/+4
* KEYS: fix "ca_keys=" partial key matchingMimi Zohar2015-05-211-5/+18
* KEYS: strip 'id:' from ca_keyidDmitry Kasatkin2014-10-061-1/+1
* KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-061-5/+13
* X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells2014-10-031-2/+7
* PKCS#7: Better handling of unsupported cryptoDavid Howells2014-09-161-2/+11
* KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells2014-09-161-38/+51
* X.509: Need to export x509_request_asymmetric_key()David Howells2014-08-031-0/+1
* PKCS#7: Use x509_request_asymmetric_key()David Howells2014-07-291-15/+21
* X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells2014-07-281-6/+3
* Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-221-1/+108
|\
| * KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-3/+6
| * KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-171-0/+19