summaryrefslogtreecommitdiffstats
path: root/crypto
Commit message (Expand)AuthorAgeFilesLines
* crypto: lz4,lz4hc - fix decompressionKOVACS Krisztian2014-08-292-2/+2
* crypto: drbg - fix sparse warning for cpu_to_be[32|64]Stephan Mueller2014-08-261-2/+2
* crypto: mcryptd - mcryptd_flist can be staticFengguang Wu2014-08-261-1/+1
* crypto: drbg - remove unnecessary sanity check for shadow stateStephan Mueller2014-08-251-3/+0
* crypto: drbg - remove configuration of fixed valuesStephan Mueller2014-08-251-33/+0
* crypto: drbg - remove unnecessary sanity checksStephan Mueller2014-08-251-9/+0
* crypto: drbg - use kmalloc instead of kzalloc for V and CStephan Mueller2014-08-251-3/+8
* crypto: drbg - remove superflowous memset(0)Stephan Mueller2014-08-251-4/+2
* crypto: drbg - remove superflowous checksStephan Mueller2014-08-251-10/+6
* crypto: drbg - kzfree does not need a check for NULL pointerStephan Mueller2014-08-251-12/+6
* crypto: drbg - replace int2byte with cpu_to_beStephan Mueller2014-08-251-16/+18
* crypto: testmgr - remove unused function argumentCristian Stoica2014-08-251-11/+5
* crypto: sha-mb - multibuffer crypto infrastructureTim Chen2014-08-253-0/+736
* crypto: testmgr - delay execution of set-up codeCristian Stoica2014-08-251-8/+6
* crypto: testmgr - white space removal on __test_skcipherCristian Stoica2014-08-251-149/+138
* crypto: testmgr - white space removal on __test_hashCristian Stoica2014-08-251-63/+60
* crypto: testmgr - white space fix-ups on test_aeadCristian Stoica2014-08-251-256/+242
* crypto: hash - initialize entry len for null input in crypto hash sg list walkTim Chen2014-08-251-3/+9
* initramfs: support initramfs that is bigger than 2GiBYinghai Lu2014-08-081-4/+4
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2014-08-0618-50/+2075
|\
| * X.509: Need to export x509_request_asymmetric_key()David Howells2014-08-031-0/+1
| * PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells2014-07-311-4/+2
| * PKCS#7: Use x509_request_asymmetric_key()David Howells2014-07-292-72/+25
| * X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells2014-07-281-6/+3
| * PKCS#7: fix sparse non static symbol warningWei Yongjun2014-07-281-1/+1
| * PKCS#7: Missing inclusion of linux/err.hDavid Howells2014-07-251-0/+1
| * Merge branch 'keys-fixes' into keys-nextDavid Howells2014-07-221-1/+0
| |\
| | * RSA: Don't select non-existent symbolJean Delvare2014-07-171-1/+0
| * | Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells2014-07-223-20/+142
| |\ \
| | * | KEYS: validate certificate trust only with builtin keysDmitry Kasatkin2014-07-171-3/+6
| | * | KEYS: validate certificate trust only with selected keyDmitry Kasatkin2014-07-172-0/+20
| | * | KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2014-07-172-19/+33
| | * | KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar2014-07-171-1/+86
| | |/
| * | Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells2014-07-226-1/+678
| |\ \
| | * | pefile: Validate PKCS#7 trust chainDavid Howells2014-07-091-1/+1
| | * | pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells2014-07-091-0/+197
| | * | pefile: Handle pesign using the wrong OIDVivek Goyal2014-07-091-1/+7
| | * | pefile: Parse the "Microsoft individual code signing" data blobDavid Howells2014-07-095-1/+168
| | * | pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells2014-07-091-1/+20
| | * | pefile: Strip the wrapper off of the cert data blockDavid Howells2014-07-091-0/+71
| | * | pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells2014-07-094-0/+217
| | * | KEYS: X.509: Fix a spelling mistakeDavid Howells2014-07-081-1/+1
| * | | Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells2014-07-2211-2/+1302
| |\ \ \ | | |/ /
| | * | PKCS#7: Provide a key type for testing PKCS#7David Howells2014-07-083-0/+117
| | * | PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2014-07-082-0/+220
| | * | PKCS#7: Verify internal certificate chainDavid Howells2014-07-081-1/+87
| | * | PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells2014-07-081-0/+64
| | * | PKCS#7: Digest the data in a signed-data messageDavid Howells2014-07-082-1/+175
| | * | PKCS#7: Implement a parser [RFC 2315]David Howells2014-07-085-0/+606
| | * | X.509: Export certificate parse and free functionsDavid Howells2014-07-021-0/+3
OpenPOWER on IntegriCloud