summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys/x509_parser.h
diff options
context:
space:
mode:
authorDmitry Kasatkin <d.kasatkin@samsung.com>2014-10-06 16:52:12 +0100
committerDavid Howells <dhowells@redhat.com>2014-10-06 16:56:08 +0100
commit8715e2fc4bb2844dae78ddcdcd070d44b245a22b (patch)
tree3e88ff7470ef3e20de1eb7589384e36c8357a02e /crypto/asymmetric_keys/x509_parser.h
parent6b78e9ccade294763344d8589255d10469862af2 (diff)
downloadlinux-crypto-8715e2fc4bb2844dae78ddcdcd070d44b245a22b.tar.gz
linux-crypto-8715e2fc4bb2844dae78ddcdcd070d44b245a22b.zip
KEYS: use swapped SKID for performing partial matching
Earlier KEYS code used pure subject key identifiers (fingerprint) for searching keys. Latest merged code removed that and broke compatibility with integrity subsytem signatures and original format of module signatures. This patch returns back partial matching on SKID. Reported-by: Dmitry Kasatkin <d.kasatkin@samsung.com> Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com> Signed-off-by: David Howells <dhowells@redhat.com>
Diffstat (limited to 'crypto/asymmetric_keys/x509_parser.h')
-rw-r--r--crypto/asymmetric_keys/x509_parser.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/asymmetric_keys/x509_parser.h b/crypto/asymmetric_keys/x509_parser.h
index 3f0f0f08..3dfe6b5d 100644
--- a/crypto/asymmetric_keys/x509_parser.h
+++ b/crypto/asymmetric_keys/x509_parser.h
@@ -19,9 +19,9 @@ struct x509_certificate {
struct public_key_signature sig; /* Signature parameters */
char *issuer; /* Name of certificate issuer */
char *subject; /* Name of certificate subject */
- struct asymmetric_key_id *id; /* Issuer + serial number */
- struct asymmetric_key_id *skid; /* Subject key identifier */
- struct asymmetric_key_id *authority; /* Authority key identifier */
+ struct asymmetric_key_id *id; /* Serial number + issuer */
+ struct asymmetric_key_id *skid; /* Subject + subjectKeyId (optional) */
+ struct asymmetric_key_id *authority; /* Authority key identifier (optional) */
struct tm valid_from;
struct tm valid_to;
const void *tbs; /* Signed data */