Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
kernel
/
msm-4.19
/
109728ccc5933151c68d1106e4065478a487a323
/
crypto
/
asymmetric_keys
« Previous
f1b731d
KEYS: Restore partial ID matching functionality for asymmetric keys
by Dmitry Kasatkin
· 10 years ago
dd2f6c4
X.509: If available, use the raw subjKeyId to form the key description
by David Howells
· 10 years ago
40b50e8
KEYS: handle error code encoded in pointer
by Dmitry Kasatkin
· 10 years ago
d1ac554
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
by David Howells
· 10 years ago
757932e
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
by David Howells
· 10 years ago
4155942
PKCS#7: Better handling of unsupported crypto
by David Howells
· 10 years ago
46963b7
KEYS: Overhaul key identification when searching for asymmetric keys
by David Howells
· 10 years ago
7901c1a
KEYS: Implement binary asymmetric key ID handling
by David Howells
· 10 years ago
0c903ab
KEYS: Make the key matching functions return bool
by David Howells
· 10 years ago
c06cfb0
KEYS: Remove key_type::match in favour of overriding default by match_preparse
by David Howells
· 10 years ago
614d8c3
KEYS: Remove key_type::def_lookup_type
by David Howells
· 10 years ago
4629195
KEYS: Preparse match data
by David Howells
· 10 years ago
1c9c115
Merge tag 'keys-next-fixes-20140916' into keys-next
by David Howells
· 10 years ago
68c45c7
Merge tag 'keys-fixes-20140916' into keys-next
by David Howells
· 10 years ago
cecf5d2e
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
by David Howells
· 10 years ago
3cd0920
PKCS#7: Provide a single place to do signed info block freeing
by David Howells
· 10 years ago
15155b9
PKCS#7: Add a missing static
by David Howells
· 10 years ago
c3ce6df
KEYS: Set pr_fmt() in asymmetric key signature handling
by David Howells
· 10 years ago
0aa0409
PEFILE: Relax the check on the length of the PKCS#7 cert
by David Howells
· 10 years ago
876c6e3
KEYS: Fix public_key asymmetric key subtype name
by David Howells
· 10 years ago
cf5b50f
X.509: Need to export x509_request_asymmetric_key()
by David Howells
· 10 years ago
412eccb
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
by David Howells
· 10 years ago
5ce43ad
PKCS#7: Use x509_request_asymmetric_key()
by David Howells
· 10 years ago
185de09
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
by David Howells
· 10 years ago
63d2551
PKCS#7: fix sparse non static symbol warning
by Wei Yongjun
· 10 years ago
8f3438c
PKCS#7: Missing inclusion of linux/err.h
by David Howells
· 10 years ago
633706a
Merge branch 'keys-fixes' into keys-next
by David Howells
· 10 years ago
64724cf
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
by David Howells
· 10 years ago
6204e00
Merge tag 'keys-pefile-20140709' into keys-next
by David Howells
· 10 years ago
1ca72c9
Merge tag 'keys-pkcs7-20140708' into keys-next
by David Howells
· 10 years ago
fc7c70e
KEYS: struct key_preparsed_payload should have two payload pointers
by David Howells
· 10 years ago
6a09d17
KEYS: Provide a generic instantiation function
by David Howells
· 10 years ago
26c1821
RSA: Don't select non-existent symbol
by Jean Delvare
· 10 years ago
32c4741
KEYS: validate certificate trust only with builtin keys
by Dmitry Kasatkin
· 10 years ago
ffb70f6
KEYS: validate certificate trust only with selected key
by Dmitry Kasatkin
· 10 years ago
b342682
KEYS: make partial key id matching as a dedicated function
by Dmitry Kasatkin
· 10 years ago
3be4bea
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
98801c0
pefile: Validate PKCS#7 trust chain
by David Howells
· 10 years ago
af316fc
pefile: Digest the PE binary and compare to the PKCS#7 data
by David Howells
· 10 years ago
dd7d66f
pefile: Handle pesign using the wrong OID
by Vivek Goyal
· 10 years ago
4c0b4b1
pefile: Parse the "Microsoft individual code signing" data blob
by David Howells
· 10 years ago
3968280
pefile: Parse the presumed PKCS#7 content of the certificate blob
by David Howells
· 10 years ago
09dacbb
pefile: Strip the wrapper off of the cert data block
by David Howells
· 10 years ago
26d1164
pefile: Parse a PE binary to find a key and a signature contained therein
by David Howells
· 10 years ago
4520698
KEYS: X.509: Fix a spelling mistake
by David Howells
· 10 years ago
22d01af
PKCS#7: Provide a key type for testing PKCS#7
by David Howells
· 10 years ago
08815b6
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
by David Howells
· 10 years ago
8c76d79
PKCS#7: Verify internal certificate chain
by David Howells
· 10 years ago
a473035
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
by David Howells
· 10 years ago
9f0d331
PKCS#7: Digest the data in a signed-data message
by David Howells
· 10 years ago
2e3fadb
PKCS#7: Implement a parser [RFC 2315]
by David Howells
· 10 years ago
ace0107
X.509: Export certificate parse and free functions
by David Howells
· 10 years ago
84aabd4
X.509: Add bits needed for PKCS#7
by David Howells
· 10 years ago
4c1cc40
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
by Linus Torvalds
· 11 years ago
26b265c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
by Linus Torvalds
· 11 years ago
dbed714
KEYS: The RSA public key algorithm needs to select MPILIB
by David Howells
· 11 years ago
c7c8bb2
ima: provide support for arbitrary hash algorithms
by Dmitry Kasatkin
· 12 years ago
3fe78ca
keys: change asymmetric keys to use common hash definitions
by Dmitry Kasatkin
· 11 years ago
6bf37e5
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
by James Yonan
· 11 years ago
e19aaa7
X.509: add module description and license
by Konstantin Khlebnikov
· 11 years ago
09fbc47
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
cd0421d
KEYS: Set the asymmetric-key type default search method
by David Howells
· 11 years ago
124df92
X.509: Remove certificate date checks
by David Howells
· 11 years ago
17334ca
X.509: Handle certificates that lack an authorityKeyIdentifier field
by David Howells
· 11 years ago
2ecdb23
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
by David Howells
· 11 years ago
b426beb
X.509: Embed public_key_signature struct and create filler function
by David Howells
· 11 years ago
57be4a7
X.509: struct x509_certificate needs struct tm declaring
by David Howells
· 11 years ago
3d167d6
KEYS: Split public_key_verify_signature() and make available
by David Howells
· 11 years ago
67f7d60b
KEYS: Store public key algo ID in public_key struct
by David Howells
· 11 years ago
206ce59
KEYS: Move the algorithm pointer array from x509 to public_key.c
by David Howells
· 11 years ago
9abc4e6
KEYS: Rename public key parameter name arrays
by David Howells
· 11 years ago
04b00bd
X.509: Support parse long form of length octets in Authority Key Identifier
by Chun-Yi Lee
· 12 years ago
2f1c4fe
X.509: Convert some printk calls to pr_devel
by David Howells
· 12 years ago
cf75446
asymmetric keys: fix printk format warning
by Randy Dunlap
· 12 years ago
a5752d1
MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking
by David Howells
· 12 years ago
c26fd69
X.509: Add a crypto key parser for binary (DER) X.509 certificates
by David Howells
· 12 years ago
0b1568a
RSA: Fix signature verification for shorter signatures
by David Howells
· 12 years ago
612e0fe
RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]
by David Howells
· 12 years ago
4ae71c1
KEYS: Provide signature verification with an asymmetric key
by David Howells
· 12 years ago
a9681bf
KEYS: Asymmetric public-key algorithm crypto key subtype
by David Howells
· 12 years ago
46c6f17
KEYS: Asymmetric key pluggable data parsers
by David Howells
· 12 years ago
964f3b3
KEYS: Implement asymmetric key type
by David Howells
· 12 years ago