summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys/x509_public_key.c
Commit message (Expand)AuthorAgeFilesLines
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-151-0/+2
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2015-11-051-4/+5
|\
| * KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-4/+5
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2015-11-041-2/+3
|\ \ | |/ |/|
| * crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()Sowmini Varadhan2015-10-201-2/+3
* | X.509: Don't strip leading 00's from key ID when constructing key descriptionDavid Howells2015-09-251-4/+0
|/
* PKCS#7: Improve and export the X.509 ASN.1 time object decoderDavid Howells2015-08-121-8/+1
* X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifierDavid Howells2015-08-071-26/+58
* X.509: Extract both parts of the AuthorityKeyIdentifierDavid Howells2015-08-071-4/+4
* KEYS: fix "ca_keys=" partial key matchingMimi Zohar2015-05-211-5/+18
* KEYS: strip 'id:' from ca_keyidDmitry Kasatkin2014-10-061-1/+1
* KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin2014-10-061-5/+13
* X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells2014-10-031-2/+7
* PKCS#7: Better handling of unsupported cryptoDavid Howells2014-09-161-2/+11
* KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells2014-09-161-38/+51
* X.509: Need to export x509_request_asymmetric_key()David Howells2014-08-031-0/+1
* PKCS#7: Use x509_request_asymmetric_key()David Howells2014-07-291-15/+21
* X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells2014-07-281-6/+3
* Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-221-1/+108
|\
| * KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-3/+6
| * KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-171-0/+19
| * KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+86
* | KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-221-1/+1
|/
* Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds2013-11-231-80/+1
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-251-1/+2
* keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin2013-10-251-5/+4
* X.509: add module description and licenseKonstantin Khlebnikov2013-09-251-0/+3
* KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2013-09-251-1/+80
* X.509: Remove certificate date checksDavid Howells2013-09-251-38/+0
* X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells2013-09-251-4/+5
* X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells2013-09-251-0/+11
* X.509: Embed public_key_signature struct and create filler functionDavid Howells2013-09-251-36/+47
* KEYS: Split public_key_verify_signature() and make availableDavid Howells2013-09-251-1/+1
* KEYS: Store public key algo ID in public_key structDavid Howells2013-09-251-2/+2
* KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells2013-09-251-10/+1
* KEYS: Rename public key parameter name arraysDavid Howells2013-09-251-4/+4
* X.509: Convert some printk calls to pr_develDavid Howells2012-10-101-3/+3
* MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checkingDavid Howells2012-10-101-5/+37
* X.509: Add a crypto key parser for binary (DER) X.509 certificatesDavid Howells2012-10-081-0/+207