Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | PKCS#7: Use x509_request_asymmetric_key() | David Howells | 2014-07-29 | 1 | -57/+4 |
| | | | | | | | | | | | | | pkcs7_request_asymmetric_key() and x509_request_asymmetric_key() do the same thing, the latter being a copy of the former created by the IMA folks, so drop the PKCS#7 version as the X.509 location is more general. Whilst we're at it, rename the arguments of x509_request_asymmetric_key() to better reflect what the values being passed in are intended to match on an X.509 cert. Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Mimi Zohar <zohar@linux.vnet.ibm.com> | ||||
* | PKCS#7: Find intersection between PKCS#7 message and known, trusted keys | David Howells | 2014-07-08 | 1 | -0/+219 |
Find the intersection between the X.509 certificate chain contained in a PKCS#7 message and a set of keys that we already know and trust. Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Vivek Goyal <vgoyal@redhat.com> Reviewed-by: Kees Cook <keescook@chromium.org> |