| Commit message (Expand) | Author | Age | Files | Lines |
* | PEFILE: Relax the check on the length of the PKCS#7 cert | David Howells | 2014-09-03 | 1 | -16/+33 |
* | KEYS: Fix public_key asymmetric key subtype name | David Howells | 2014-09-03 | 1 | -0/+1 |
* | X.509: Need to export x509_request_asymmetric_key() | David Howells | 2014-08-03 | 1 | -0/+1 |
* | PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1 | David Howells | 2014-07-31 | 1 | -4/+2 |
* | PKCS#7: Use x509_request_asymmetric_key() | David Howells | 2014-07-29 | 2 | -72/+25 |
* | X.509: x509_request_asymmetric_keys() doesn't need string length arguments | David Howells | 2014-07-28 | 1 | -6/+3 |
* | PKCS#7: fix sparse non static symbol warning | Wei Yongjun | 2014-07-28 | 1 | -1/+1 |
* | PKCS#7: Missing inclusion of linux/err.h | David Howells | 2014-07-25 | 1 | -0/+1 |
* | Merge branch 'keys-fixes' into keys-next | David Howells | 2014-07-22 | 1 | -1/+0 |
|\ |
|
| * | RSA: Don't select non-existent symbol | Jean Delvare | 2014-07-17 | 1 | -1/+0 |
* | | Merge remote-tracking branch 'integrity/next-with-keys' into keys-next | David Howells | 2014-07-22 | 3 | -20/+142 |
|\ \ |
|
| * | | KEYS: validate certificate trust only with builtin keys | Dmitry Kasatkin | 2014-07-17 | 1 | -3/+6 |
| * | | KEYS: validate certificate trust only with selected key | Dmitry Kasatkin | 2014-07-17 | 2 | -0/+20 |
| * | | KEYS: make partial key id matching as a dedicated function | Dmitry Kasatkin | 2014-07-17 | 2 | -19/+33 |
| * | | KEYS: verify a certificate is signed by a 'trusted' key | Mimi Zohar | 2014-07-17 | 1 | -1/+86 |
| |/ |
|
* | | Merge tag 'keys-pefile-20140709' into keys-next | David Howells | 2014-07-22 | 6 | -1/+678 |
|\ \ |
|
| * | | pefile: Validate PKCS#7 trust chain | David Howells | 2014-07-09 | 1 | -1/+1 |
| * | | pefile: Digest the PE binary and compare to the PKCS#7 data | David Howells | 2014-07-09 | 1 | -0/+197 |
| * | | pefile: Handle pesign using the wrong OID | Vivek Goyal | 2014-07-09 | 1 | -1/+7 |
| * | | pefile: Parse the "Microsoft individual code signing" data blob | David Howells | 2014-07-09 | 5 | -1/+168 |
| * | | pefile: Parse the presumed PKCS#7 content of the certificate blob | David Howells | 2014-07-09 | 1 | -1/+20 |
| * | | pefile: Strip the wrapper off of the cert data block | David Howells | 2014-07-09 | 1 | -0/+71 |
| * | | pefile: Parse a PE binary to find a key and a signature contained therein | David Howells | 2014-07-09 | 4 | -0/+217 |
| * | | KEYS: X.509: Fix a spelling mistake | David Howells | 2014-07-08 | 1 | -1/+1 |
* | | | Merge tag 'keys-pkcs7-20140708' into keys-next | David Howells | 2014-07-22 | 11 | -2/+1302 |
|\| | |
|
| * | | PKCS#7: Provide a key type for testing PKCS#7 | David Howells | 2014-07-08 | 3 | -0/+117 |
| * | | PKCS#7: Find intersection between PKCS#7 message and known, trusted keys | David Howells | 2014-07-08 | 2 | -0/+220 |
| * | | PKCS#7: Verify internal certificate chain | David Howells | 2014-07-08 | 1 | -1/+87 |
| * | | PKCS#7: Find the right key in the PKCS#7 key list and verify the signature | David Howells | 2014-07-08 | 1 | -0/+64 |
| * | | PKCS#7: Digest the data in a signed-data message | David Howells | 2014-07-08 | 2 | -1/+175 |
| * | | PKCS#7: Implement a parser [RFC 2315] | David Howells | 2014-07-08 | 5 | -0/+606 |
| * | | X.509: Export certificate parse and free functions | David Howells | 2014-07-02 | 1 | -0/+3 |
| * | | X.509: Add bits needed for PKCS#7 | David Howells | 2014-07-01 | 3 | -2/+30 |
| |/ |
|
* | | KEYS: struct key_preparsed_payload should have two payload pointers | David Howells | 2014-07-22 | 2 | -2/+2 |
* | | KEYS: Provide a generic instantiation function | David Howells | 2014-07-18 | 1 | -24/+1 |
|/ |
|
* | Revert "KEYS: verify a certificate is signed by a 'trusted' key" | Linus Torvalds | 2013-11-23 | 1 | -80/+1 |
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 | Linus Torvalds | 2013-11-23 | 1 | -2/+3 |
|\ |
|
| * | crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks | James Yonan | 2013-10-07 | 1 | -2/+3 |
* | | KEYS: The RSA public key algorithm needs to select MPILIB | David Howells | 2013-11-01 | 1 | -0/+1 |
* | | ima: provide support for arbitrary hash algorithms | Dmitry Kasatkin | 2013-10-25 | 2 | -3/+2 |
* | | keys: change asymmetric keys to use common hash definitions | Dmitry Kasatkin | 2013-10-25 | 6 | -30/+20 |
* | | X.509: add module description and license | Konstantin Khlebnikov | 2013-09-25 | 1 | -0/+3 |
* | | KEYS: verify a certificate is signed by a 'trusted' key | Mimi Zohar | 2013-09-25 | 1 | -1/+80 |
* | | KEYS: Set the asymmetric-key type default search method | David Howells | 2013-09-25 | 1 | -0/+1 |
* | | X.509: Remove certificate date checks | David Howells | 2013-09-25 | 1 | -38/+0 |
* | | X.509: Handle certificates that lack an authorityKeyIdentifier field | David Howells | 2013-09-25 | 1 | -4/+5 |
* | | X.509: Check the algorithm IDs obtained from parsing an X.509 certificate | David Howells | 2013-09-25 | 1 | -0/+11 |
* | | X.509: Embed public_key_signature struct and create filler function | David Howells | 2013-09-25 | 3 | -55/+74 |
* | | X.509: struct x509_certificate needs struct tm declaring | David Howells | 2013-09-25 | 1 | -0/+1 |
* | | KEYS: Split public_key_verify_signature() and make available | David Howells | 2013-09-25 | 3 | -9/+39 |