summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)AuthorFilesLines
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells1-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells2-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun1-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells1-0/+1
2014-07-23Merge branch 'keys-fixes' into keys-nextDavid Howells1-1/+0
2014-07-23Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells3-20/+142
2014-07-23Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells6-1/+678
2014-07-23Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells11-2/+1302
2014-07-23KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells1-24/+1
2014-07-18RSA: Don't select non-existent symbolJean Delvare1-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin2-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells1-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells1-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal1-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells5-1/+168
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells1-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells1-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells4-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells1-1/+1
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells3-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2-0/+220
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells1-1/+87
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells1-0/+64
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells2-1/+175
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells5-0/+606
2014-07-03X.509: Export certificate parse and free functionsDavid Howells1-0/+3
2014-07-01X.509: Add bits needed for PKCS#7David Howells3-2/+30
2013-11-24Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds1-80/+1
2013-11-24Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds1-2/+3
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells1-0/+1
2013-10-26ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2-3/+2
2013-10-26keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin6-30/+20
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan1-2/+3
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov1-0/+3
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+80
2013-09-25KEYS: Set the asymmetric-key type default search methodDavid Howells1-0/+1
2013-09-25X.509: Remove certificate date checksDavid Howells1-38/+0
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells1-4/+5
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells1-0/+11
2013-09-25X.509: Embed public_key_signature struct and create filler functionDavid Howells3-55/+74
2013-09-25X.509: struct x509_certificate needs struct tm declaringDavid Howells1-0/+1
2013-09-25KEYS: Split public_key_verify_signature() and make availableDavid Howells3-9/+39
2013-09-25KEYS: Store public key algo ID in public_key structDavid Howells3-5/+5
2013-09-25KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells3-11/+10