summaryrefslogtreecommitdiff
path: root/crypto
AgeCommit message (Expand)AuthorFilesLines
2014-10-06KEYS: output last portion of fingerprint in /proc/keysDmitry Kasatkin1-5/+5
2014-10-06KEYS: strip 'id:' from ca_keyidDmitry Kasatkin1-1/+1
2014-10-06KEYS: use swapped SKID for performing partial matchingDmitry Kasatkin2-9/+9
2014-10-06KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin4-24/+76
2014-10-03X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells3-2/+11
2014-10-03KEYS: handle error code encoded in pointerDmitry Kasatkin1-2/+2
2014-09-30Merge commit 'v3.16' into nextJames Morris1-0/+2
2014-09-22KEYS: Check hex2bin()'s return when generating an asymmetric key IDDavid Howells1-7/+8
2014-09-16PKCS#7: Handle PKCS#7 messages that contain no X.509 certsDavid Howells2-17/+47
2014-09-16PKCS#7: Better handling of unsupported cryptoDavid Howells5-16/+74
2014-09-16KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells9-184/+195
2014-09-16KEYS: Implement binary asymmetric key ID handlingDavid Howells2-0/+93
2014-09-16KEYS: Make the key matching functions return boolDavid Howells1-2/+2
2014-09-16KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2-4/+3
2014-09-16KEYS: Remove key_type::def_lookup_typeDavid Howells2-2/+0
2014-09-16KEYS: Preparse match dataDavid Howells1-1/+30
2014-09-16Merge tag 'keys-next-fixes-20140916' into keys-nextDavid Howells1-3/+3
2014-09-16Merge tag 'keys-fixes-20140916' into keys-nextDavid Howells1-28/+33
2014-09-16PKCS#7: Fix the parser cleanup to drain parsed out X.509 certsDavid Howells1-20/+19
2014-09-16PKCS#7: Provide a single place to do signed info block freeingDavid Howells1-9/+15
2014-09-16PKCS#7: Add a missing staticDavid Howells1-3/+3
2014-09-03KEYS: Set pr_fmt() in asymmetric key signature handlingDavid Howells1-0/+1
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-07-31crypto: af_alg - properly label AF_ALG socketMilan Broz1-0/+2
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells1-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells2-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun1-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells1-0/+1
2014-07-23Merge branch 'keys-fixes' into keys-nextDavid Howells1-1/+0
2014-07-23Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells3-20/+142
2014-07-23Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells6-1/+678
2014-07-23Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells11-2/+1302
2014-07-23KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells1-24/+1
2014-07-18RSA: Don't select non-existent symbolJean Delvare1-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin2-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells1-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells1-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal1-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells5-1/+168
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells1-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells1-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells4-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells1-1/+1
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells3-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2-0/+220