summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys/x509_public_key.c
AgeCommit message (Expand)AuthorFilesLines
2022-06-21certs: Add FIPS selftestsDavid Howells1-1/+7
2022-05-23certs: Factor out the blacklist hash creationMickaël Salaün1-1/+2
2022-03-10KEYS: asymmetric: enforce that sig algo matches key algoEric Biggers1-6/+0
2022-03-08KEYS: x509: remove dead code that set ->unsupported_sigEric Biggers1-9/+0
2022-03-08KEYS: x509: remove never-set ->unsupported_key flagEric Biggers1-9/+0
2022-01-09keys: X.509 public key issuer lookup without AKIDAndrew Zaborowski1-0/+10
2021-03-26x509: Add support for parsing x509 certs with ECDSA keysStefan Berger1-1/+3
2020-09-25X.509: support OSCCA SM2-with-SM3 certificate verificationTianjia Zhang1-0/+3
2019-05-24treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 36Thomas Gleixner1-5/+1
2019-04-25crypto: shash - remove shash_desc::flagsEric Biggers1-1/+0
2017-12-08X.509: fix comparisons of ->pkey_algoEric Biggers1-1/+1
2017-12-08X.509: use crypto_shash_digest()Eric Biggers1-5/+1
2017-11-15pkcs7: Set the module licence to prevent taintingDavid Howells1-0/+1
2017-04-03X.509: Allow X.509 certs to be blacklistedDavid Howells1-0/+15
2016-04-12KEYS: Move the point of trust determination to __key_link()David Howells1-20/+1
2016-04-12X.509: Move the trust validation code out to its own fileDavid Howells1-79/+0
2016-04-12X.509: Use verify_signature() if we have a struct key * to useDavid Howells1-2/+1
2016-04-12KEYS: Generalise x509_request_asymmetric_key()David Howells1-3/+2
2016-04-12KEYS: Move x509_request_asymmetric_key() to asymmetric_type.cDavid Howells1-89/+0
2016-04-06X.509: Fix self-signed determinationDavid Howells1-0/+9
2016-04-06X.509: Extract signature digest and make self-signed cert checks earlierDavid Howells1-40/+86
2016-04-06X.509: Retain the key verification dataDavid Howells1-30/+31
2016-04-06X.509: Whitespace cleanupDavid Howells1-2/+2
2016-03-04X.509: Make algo identifiers text instead of enumDavid Howells1-9/+8
2016-02-10crypto: KEYS: convert public key and digsig asym to the akcipher apiTadeusz Struk1-11/+6
2015-12-15IMA: create machine owner and blacklist keyringsPetko Manolov1-0/+2
2015-11-06Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-4/+5
2015-11-04Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-2/+3
2015-10-21KEYS: Merge the type-specific data with the payload dataDavid Howells1-4/+5
2015-10-20crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()Sowmini Varadhan1-2/+3
2015-09-25X.509: Don't strip leading 00's from key ID when constructing key descriptionDavid Howells1-4/+0
2015-08-12PKCS#7: Improve and export the X.509 ASN.1 time object decoderDavid Howells1-8/+1
2015-08-07X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifierDavid Howells1-26/+58
2015-08-07X.509: Extract both parts of the AuthorityKeyIdentifierDavid Howells1-4/+4
2015-05-21KEYS: fix "ca_keys=" partial key matchingMimi Zohar1-5/+18
2014-10-06KEYS: strip 'id:' from ca_keyidDmitry Kasatkin1-1/+1
2014-10-06KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin1-5/+13
2014-10-03X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells1-2/+7
2014-09-16PKCS#7: Better handling of unsupported cryptoDavid Howells1-2/+11
2014-09-16KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells1-38/+51
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells1-15/+21
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-23Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells1-1/+108
2014-07-23KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells1-1/+1
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin1-0/+19
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2013-11-24Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds1-80/+1
2013-10-26ima: provide support for arbitrary hash algorithmsDmitry Kasatkin1-1/+2