summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys (unfollow)
Commit message (Expand)AuthorFilesLines
2014-10-06KEYS: output last portion of fingerprint in /proc/keysDmitry Kasatkin1-5/+5
2014-10-06KEYS: strip 'id:' from ca_keyidDmitry Kasatkin1-1/+1
2014-10-06KEYS: use swapped SKID for performing partial matchingDmitry Kasatkin2-9/+9
2014-10-06KEYS: Restore partial ID matching functionality for asymmetric keysDmitry Kasatkin4-24/+76
2014-10-03X.509: If available, use the raw subjKeyId to form the key descriptionDavid Howells3-2/+11
2014-10-03KEYS: handle error code encoded in pointerDmitry Kasatkin1-2/+2
2014-09-22KEYS: Check hex2bin()'s return when generating an asymmetric key IDDavid Howells1-7/+8
2014-09-16PKCS#7: Handle PKCS#7 messages that contain no X.509 certsDavid Howells2-17/+47
2014-09-16PKCS#7: Better handling of unsupported cryptoDavid Howells5-16/+74
2014-09-16KEYS: Overhaul key identification when searching for asymmetric keysDavid Howells9-184/+195
2014-09-16KEYS: Implement binary asymmetric key ID handlingDavid Howells2-0/+93
2014-09-16KEYS: Make the key matching functions return boolDavid Howells1-2/+2
2014-09-16KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2-4/+3
2014-09-16KEYS: Remove key_type::def_lookup_typeDavid Howells2-2/+0
2014-09-16KEYS: Preparse match dataDavid Howells1-1/+30
2014-09-16PKCS#7: Fix the parser cleanup to drain parsed out X.509 certsDavid Howells1-20/+19
2014-09-16PKCS#7: Provide a single place to do signed info block freeingDavid Howells1-9/+15
2014-09-16PKCS#7: Add a missing staticDavid Howells1-3/+3
2014-09-05crypto: drbg - remove check for uninitialized DRBG handleStephan Mueller1-3/+0
2014-09-03KEYS: Set pr_fmt() in asymmetric key signature handlingDavid Howells1-0/+1
2014-09-03PEFILE: Relax the check on the length of the PKCS#7 certDavid Howells1-16/+33
2014-09-03KEYS: Fix public_key asymmetric key subtype nameDavid Howells1-0/+1
2014-08-08initramfs: support initramfs that is bigger than 2GiBYinghai Lu1-4/+4
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-08-02ARM: 8120/1: crypto: sha512: add ARM NEON implementationJussi Kivilinna1-0/+15
2014-08-02ARM: 8119/1: crypto: sha1: add ARM NEON implementationJussi Kivilinna1-0/+11
2014-08-01crypto: drbg - fix failure of generating multiple of 2**16 bytesStephan Mueller1-1/+1
2014-08-01crypto: testmgr - add missing spaces to drbg error stringsJarod Wilson1-3/+3
2014-08-01crypto: testmgr - use chunks smaller than algo block size in chunk testsArd Biesheuvel1-132/+132
2014-08-01crypto: Resolve shadow warningsMark Rustad5-71/+72
2014-07-31crypto: af_alg - properly label AF_ALG socketMilan Broz1-0/+2
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells1-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells2-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun1-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells1-0/+1
2014-07-23crypto: testmgr - avoid DMA mapping from text, rodata, stackHoria Geanta2-9/+50
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells1-24/+1
2014-07-17RSA: Don't select non-existent symbolJean Delvare1-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin2-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2014-07-10crypto: drbg - drbg_exit() can be staticFengguang Wu1-1/+1
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells1-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells1-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal1-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells5-1/+168
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells1-1/+20