summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys/x509_public_key.c
Commit message (Expand)AuthorAgeFilesLines
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner2019-05-241-5/+1
* crypto: shash - remove shash_desc::flagsEric Biggers2019-04-251-1/+0
* X.509: fix comparisons of ->pkey_algoEric Biggers2017-12-081-1/+1
* X.509: use crypto_shash_digest()Eric Biggers2017-12-081-5/+1
* pkcs7: Set the module licence to prevent taintingDavid Howells2017-11-151-0/+1
* X.509: Allow X.509 certs to be blacklistedDavid Howells2017-04-031-0/+15
* KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-20/+1
* X.509: Move the trust validation code out to its own fileDavid Howells2016-04-111-79/+0
* X.509: Use verify_signature() if we have a struct key * to useDavid Howells2016-04-111-2/+1
* KEYS: Generalise x509_request_asymmetric_key()David Howells2016-04-111-3/+2
* KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells2016-04-111-89/+0
* X.509: Fix self-signed determinationDavid Howells2016-04-061-0/+9
* X.509: Extract signature digest and make self-signed cert checks earlierDavid Howells2016-04-061-40/+86
* X.509: Retain the key verification dataDavid Howells2016-04-061-30/+31
* X.509: Whitespace cleanupDavid Howells2016-04-061-2/+2
* X.509: Make algo identifiers text instead of enumDavid Howells2016-03-031-9/+8
* crypto: KEYS: convert public key and digsig asym to the akcipher apiTadeusz Struk2016-02-101-11/+6
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+2
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2015-11-051-4/+5
|\
| * KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-4/+5
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2015-11-041-2/+3
|\ \ | |/ |/|
| * crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()Sowmini Varadhan2015-10-201-2/+3
* | X.509: Don't strip leading 00's from key ID when constructing key descriptionDavid Howells2015-09-251-4/+0
|/
* PKCS#7: Improve and export the X.509 ASN.1 time object decoderDavid Howells2015-08-121-8/+1
* X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifierDavid Howells2015-08-071-26/+58
* X.509: Extract both parts of the AuthorityKeyIdentifierDavid Howells2015-08-071-4/+4
* KEYS: fix "ca_keys=" partial key matchingMimi Zohar2015-05-211-5/+18
* KEYS: strip 'id:' from ca_keyidDmitry Kasatkin2014-10-061-1/+1
* KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-061-5/+13
* X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells2014-10-031-2/+7
* PKCS#7: Better handling of unsupported cryptoDavid Howells2014-09-161-2/+11
* KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells2014-09-161-38/+51
* X.509: Need to export x509_request_asymmetric_key()David Howells2014-08-031-0/+1
* PKCS#7: Use x509_request_asymmetric_key()David Howells2014-07-291-15/+21
* X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells2014-07-281-6/+3
* Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-221-1/+108
|\
| * KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-3/+6
| * KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-171-0/+19
| * KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+86
* | KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-221-1/+1
|/
* Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds2013-11-231-80/+1
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-251-1/+2
* keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin2013-10-251-5/+4
* X.509: add module description and licenseKonstantin Khlebnikov2013-09-251-0/+3
* KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2013-09-251-1/+80
* X.509: Remove certificate date checksDavid Howells2013-09-251-38/+0
* X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells2013-09-251-4/+5
* X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells2013-09-251-0/+11
* X.509: Embed public_key_signature struct and create filler functionDavid Howells2013-09-251-36/+47
* KEYS: Split public_key_verify_signature() and make availableDavid Howells2013-09-251-1/+1