summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys
Commit message (Expand)AuthorAgeFilesLines
...
| * | pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells2014-07-091-0/+197
| * | pefile: Handle pesign using the wrong OIDVivek Goyal2014-07-091-1/+7
| * | pefile: Parse the "Microsoft individual code signing" data blobDavid Howells2014-07-095-1/+168
| * | pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells2014-07-091-1/+20
| * | pefile: Strip the wrapper off of the cert data blockDavid Howells2014-07-091-0/+71
| * | pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells2014-07-094-0/+217
| * | KEYS: X.509: Fix a spelling mistakeDavid Howells2014-07-081-1/+1
* | | Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells2014-07-2211-2/+1302
|\ \ \ | |/ /
| * | PKCS#7: Provide a key type for testing PKCS#7David Howells2014-07-083-0/+117
| * | PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2014-07-082-0/+220
| * | PKCS#7: Verify internal certificate chainDavid Howells2014-07-081-1/+87
| * | PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells2014-07-081-0/+64
| * | PKCS#7: Digest the data in a signed-data messageDavid Howells2014-07-082-1/+175
| * | PKCS#7: Implement a parser [RFC 2315]David Howells2014-07-085-0/+606
| * | X.509: Export certificate parse and free functionsDavid Howells2014-07-021-0/+3
| * | X.509: Add bits needed for PKCS#7David Howells2014-07-013-2/+30
| |/
* | KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2014-07-222-2/+2
* | KEYS: Provide a generic instantiation functionDavid Howells2014-07-181-24/+1
|/
* Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds2013-11-231-80/+1
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds2013-11-231-2/+3
|\
| * crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan2013-10-071-2/+3
* | KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells2013-11-011-0/+1
* | ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-252-3/+2
* | keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin2013-10-256-30/+20
* | X.509: add module description and licenseKonstantin Khlebnikov2013-09-251-0/+3
* | KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2013-09-251-1/+80
* | KEYS: Set the asymmetric-key type default search methodDavid Howells2013-09-251-0/+1
* | X.509: Remove certificate date checksDavid Howells2013-09-251-38/+0
* | X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells2013-09-251-4/+5
* | X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells2013-09-251-0/+11
* | X.509: Embed public_key_signature struct and create filler functionDavid Howells2013-09-253-55/+74
* | X.509: struct x509_certificate needs struct tm declaringDavid Howells2013-09-251-0/+1
* | KEYS: Split public_key_verify_signature() and make availableDavid Howells2013-09-253-9/+39
* | KEYS: Store public key algo ID in public_key structDavid Howells2013-09-253-5/+5
* | KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells2013-09-253-11/+10
* | KEYS: Rename public key parameter name arraysDavid Howells2013-09-252-11/+11
|/
* X.509: Support parse long form of length octets in Authority Key IdentifierChun-Yi Lee2013-04-221-8/+47
* X.509: Convert some printk calls to pr_develDavid Howells2012-10-101-3/+3
* asymmetric keys: fix printk format warningRandy Dunlap2012-10-101-1/+1
* MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checkingDavid Howells2012-10-103-20/+51
* X.509: Add a crypto key parser for binary (DER) X.509 certificatesDavid Howells2012-10-088-0/+832
* RSA: Fix signature verification for shorter signaturesDavid Howells2012-10-081-3/+11
* RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]David Howells2012-10-084-0/+279
* KEYS: Provide signature verification with an asymmetric keyDavid Howells2012-10-082-1/+50
* KEYS: Asymmetric public-key algorithm crypto key subtypeDavid Howells2012-10-084-0/+146
* KEYS: Asymmetric key pluggable data parsersDavid Howells2012-10-081-1/+119
* KEYS: Implement asymmetric key typeDavid Howells2012-10-084-0/+191
OpenPOWER on IntegriCloud