Age | Commit message (Expand) | Author | Files | Lines |
2014-10-12 | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/... | Linus Torvalds | 11 | -232/+518 |
2014-10-06 | KEYS: output last portion of fingerprint in /proc/keys | Dmitry Kasatkin | 1 | -5/+5 |
2014-10-06 | KEYS: strip 'id:' from ca_keyid | Dmitry Kasatkin | 1 | -1/+1 |
2014-10-06 | KEYS: use swapped SKID for performing partial matching | Dmitry Kasatkin | 2 | -9/+9 |
2014-10-06 | KEYS: Restore partial ID matching functionality for asymmetric keys | Dmitry Kasatkin | 4 | -24/+76 |
2014-10-03 | X.509: If available, use the raw subjKeyId to form the key description | David Howells | 3 | -2/+11 |
2014-10-03 | KEYS: handle error code encoded in pointer | Dmitry Kasatkin | 1 | -2/+2 |
2014-09-22 | KEYS: Check hex2bin()'s return when generating an asymmetric key ID | David Howells | 1 | -7/+8 |
2014-09-16 | PKCS#7: Handle PKCS#7 messages that contain no X.509 certs | David Howells | 2 | -17/+47 |
2014-09-16 | PKCS#7: Better handling of unsupported crypto | David Howells | 5 | -16/+74 |
2014-09-16 | KEYS: Overhaul key identification when searching for asymmetric keys | David Howells | 9 | -184/+195 |
2014-09-16 | KEYS: Implement binary asymmetric key ID handling | David Howells | 2 | -0/+93 |
2014-09-16 | KEYS: Make the key matching functions return bool | David Howells | 1 | -2/+2 |
2014-09-16 | KEYS: Remove key_type::match in favour of overriding default by match_preparse | David Howells | 2 | -4/+3 |
2014-09-16 | KEYS: Remove key_type::def_lookup_type | David Howells | 2 | -2/+0 |
2014-09-16 | KEYS: Preparse match data | David Howells | 1 | -1/+30 |
2014-09-16 | Merge tag 'keys-next-fixes-20140916' into keys-next | David Howells | 1 | -3/+3 |
2014-09-16 | Merge tag 'keys-fixes-20140916' into keys-next | David Howells | 1 | -28/+33 |
2014-09-16 | PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs | David Howells | 1 | -20/+19 |
2014-09-16 | PKCS#7: Provide a single place to do signed info block freeing | David Howells | 1 | -9/+15 |
2014-09-16 | PKCS#7: Add a missing static | David Howells | 1 | -3/+3 |
2014-09-03 | KEYS: Set pr_fmt() in asymmetric key signature handling | David Howells | 1 | -0/+1 |
2014-09-03 | PEFILE: Relax the check on the length of the PKCS#7 cert | David Howells | 1 | -16/+33 |
2014-09-03 | KEYS: Fix public_key asymmetric key subtype name | David Howells | 1 | -0/+1 |
2014-08-03 | X.509: Need to export x509_request_asymmetric_key() | David Howells | 1 | -0/+1 |
2014-07-31 | PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1 | David Howells | 1 | -4/+2 |
2014-07-29 | PKCS#7: Use x509_request_asymmetric_key() | David Howells | 2 | -72/+25 |
2014-07-28 | X.509: x509_request_asymmetric_keys() doesn't need string length arguments | David Howells | 1 | -6/+3 |
2014-07-28 | PKCS#7: fix sparse non static symbol warning | Wei Yongjun | 1 | -1/+1 |
2014-07-25 | PKCS#7: Missing inclusion of linux/err.h | David Howells | 1 | -0/+1 |
2014-07-22 | Merge branch 'keys-fixes' into keys-next | David Howells | 1 | -1/+0 |
2014-07-22 | Merge remote-tracking branch 'integrity/next-with-keys' into keys-next | David Howells | 3 | -20/+142 |
2014-07-22 | Merge tag 'keys-pefile-20140709' into keys-next | David Howells | 6 | -1/+678 |
2014-07-22 | Merge tag 'keys-pkcs7-20140708' into keys-next | David Howells | 11 | -2/+1302 |
2014-07-22 | KEYS: struct key_preparsed_payload should have two payload pointers | David Howells | 2 | -2/+2 |
2014-07-18 | KEYS: Provide a generic instantiation function | David Howells | 1 | -24/+1 |
2014-07-17 | RSA: Don't select non-existent symbol | Jean Delvare | 1 | -1/+0 |
2014-07-17 | KEYS: validate certificate trust only with builtin keys | Dmitry Kasatkin | 1 | -3/+6 |
2014-07-17 | KEYS: validate certificate trust only with selected key | Dmitry Kasatkin | 2 | -0/+20 |
2014-07-17 | KEYS: make partial key id matching as a dedicated function | Dmitry Kasatkin | 2 | -19/+33 |
2014-07-17 | KEYS: verify a certificate is signed by a 'trusted' key | Mimi Zohar | 1 | -1/+86 |
2014-07-09 | pefile: Validate PKCS#7 trust chain | David Howells | 1 | -1/+1 |
2014-07-09 | pefile: Digest the PE binary and compare to the PKCS#7 data | David Howells | 1 | -0/+197 |
2014-07-09 | pefile: Handle pesign using the wrong OID | Vivek Goyal | 1 | -1/+7 |
2014-07-09 | pefile: Parse the "Microsoft individual code signing" data blob | David Howells | 5 | -1/+168 |
2014-07-09 | pefile: Parse the presumed PKCS#7 content of the certificate blob | David Howells | 1 | -1/+20 |
2014-07-09 | pefile: Strip the wrapper off of the cert data block | David Howells | 1 | -0/+71 |
2014-07-09 | pefile: Parse a PE binary to find a key and a signature contained therein | David Howells | 4 | -0/+217 |
2014-07-08 | KEYS: X.509: Fix a spelling mistake | David Howells | 1 | -1/+1 |
2014-07-08 | PKCS#7: Provide a key type for testing PKCS#7 | David Howells | 3 | -0/+117 |