| Commit message (Expand) | Author | Age | Files | Lines |
... | |
| * | | PKCS#7: Find the right key in the PKCS#7 key list and verify the signature | David Howells | 2014-07-08 | 1 | -0/+64 |
| * | | PKCS#7: Digest the data in a signed-data message | David Howells | 2014-07-08 | 2 | -1/+175 |
| * | | PKCS#7: Implement a parser [RFC 2315] | David Howells | 2014-07-08 | 5 | -0/+606 |
| * | | X.509: Export certificate parse and free functions | David Howells | 2014-07-02 | 1 | -0/+3 |
| * | | X.509: Add bits needed for PKCS#7 | David Howells | 2014-07-01 | 3 | -2/+30 |
| |/ |
|
* | | KEYS: struct key_preparsed_payload should have two payload pointers | David Howells | 2014-07-22 | 2 | -2/+2 |
* | | KEYS: Provide a generic instantiation function | David Howells | 2014-07-18 | 1 | -24/+1 |
|/ |
|
* | Revert "KEYS: verify a certificate is signed by a 'trusted' key" | Linus Torvalds | 2013-11-23 | 1 | -80/+1 |
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 | Linus Torvalds | 2013-11-23 | 1 | -2/+3 |
|\ |
|
| * | crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks | James Yonan | 2013-10-07 | 1 | -2/+3 |
* | | KEYS: The RSA public key algorithm needs to select MPILIB | David Howells | 2013-11-01 | 1 | -0/+1 |
* | | ima: provide support for arbitrary hash algorithms | Dmitry Kasatkin | 2013-10-25 | 2 | -3/+2 |
* | | keys: change asymmetric keys to use common hash definitions | Dmitry Kasatkin | 2013-10-25 | 6 | -30/+20 |
* | | X.509: add module description and license | Konstantin Khlebnikov | 2013-09-25 | 1 | -0/+3 |
* | | KEYS: verify a certificate is signed by a 'trusted' key | Mimi Zohar | 2013-09-25 | 1 | -1/+80 |
* | | KEYS: Set the asymmetric-key type default search method | David Howells | 2013-09-25 | 1 | -0/+1 |
* | | X.509: Remove certificate date checks | David Howells | 2013-09-25 | 1 | -38/+0 |
* | | X.509: Handle certificates that lack an authorityKeyIdentifier field | David Howells | 2013-09-25 | 1 | -4/+5 |
* | | X.509: Check the algorithm IDs obtained from parsing an X.509 certificate | David Howells | 2013-09-25 | 1 | -0/+11 |
* | | X.509: Embed public_key_signature struct and create filler function | David Howells | 2013-09-25 | 3 | -55/+74 |
* | | X.509: struct x509_certificate needs struct tm declaring | David Howells | 2013-09-25 | 1 | -0/+1 |
* | | KEYS: Split public_key_verify_signature() and make available | David Howells | 2013-09-25 | 3 | -9/+39 |
* | | KEYS: Store public key algo ID in public_key struct | David Howells | 2013-09-25 | 3 | -5/+5 |
* | | KEYS: Move the algorithm pointer array from x509 to public_key.c | David Howells | 2013-09-25 | 3 | -11/+10 |
* | | KEYS: Rename public key parameter name arrays | David Howells | 2013-09-25 | 2 | -11/+11 |
|/ |
|
* | X.509: Support parse long form of length octets in Authority Key Identifier | Chun-Yi Lee | 2013-04-22 | 1 | -8/+47 |
* | X.509: Convert some printk calls to pr_devel | David Howells | 2012-10-10 | 1 | -3/+3 |
* | asymmetric keys: fix printk format warning | Randy Dunlap | 2012-10-10 | 1 | -1/+1 |
* | MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking | David Howells | 2012-10-10 | 3 | -20/+51 |
* | X.509: Add a crypto key parser for binary (DER) X.509 certificates | David Howells | 2012-10-08 | 8 | -0/+832 |
* | RSA: Fix signature verification for shorter signatures | David Howells | 2012-10-08 | 1 | -3/+11 |
* | RSA: Implement signature verification algorithm [PKCS#1 / RFC3447] | David Howells | 2012-10-08 | 4 | -0/+279 |
* | KEYS: Provide signature verification with an asymmetric key | David Howells | 2012-10-08 | 2 | -1/+50 |
* | KEYS: Asymmetric public-key algorithm crypto key subtype | David Howells | 2012-10-08 | 4 | -0/+146 |
* | KEYS: Asymmetric key pluggable data parsers | David Howells | 2012-10-08 | 1 | -1/+119 |
* | KEYS: Implement asymmetric key type | David Howells | 2012-10-08 | 4 | -0/+191 |