index
:
drm-intel
core-for-ci
drm-intel-fixes
drm-intel-gt-next
drm-intel-gt-next-backup
drm-intel-next
drm-intel-next-fixes
drm-intel-next-queued
drm-intel-testing
for-linux-next
for-linux-next-fixes
for-linux-next-gt
i915-orig
main
maintainer-tools
topic/core-for-CI
topic/drm-intel-gem-next
topic/thunderbolt-next
Linux driver for Intel graphics
UNKNOWN
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Age
Commit message (
Expand
)
Author
Files
Lines
2014-08-03
X.509: Need to export x509_request_asymmetric_key()
David Howells
1
-0
/
+1
2014-07-31
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
1
-4
/
+2
2014-07-29
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2
-72
/
+25
2014-07-28
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
1
-6
/
+3
2014-07-28
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
1
-1
/
+1
2014-07-25
PKCS#7: Missing inclusion of linux/err.h
David Howells
1
-0
/
+1
2014-07-22
Merge branch 'keys-fixes' into keys-next
David Howells
1
-1
/
+0
2014-07-22
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
3
-20
/
+142
2014-07-22
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
6
-1
/
+678
2014-07-22
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
11
-2
/
+1302
2014-07-22
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
2
-2
/
+2
2014-07-18
KEYS: Provide a generic instantiation function
David Howells
1
-24
/
+1
2014-07-17
RSA: Don't select non-existent symbol
Jean Delvare
1
-1
/
+0
2014-07-17
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
1
-3
/
+6
2014-07-17
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2
-0
/
+20
2014-07-17
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2
-19
/
+33
2014-07-17
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+86
2014-07-09
pefile: Validate PKCS#7 trust chain
David Howells
1
-1
/
+1
2014-07-09
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
1
-0
/
+197
2014-07-09
pefile: Handle pesign using the wrong OID
Vivek Goyal
1
-1
/
+7
2014-07-09
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
5
-1
/
+168
2014-07-09
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
1
-1
/
+20
2014-07-09
pefile: Strip the wrapper off of the cert data block
David Howells
1
-0
/
+71
2014-07-09
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
4
-0
/
+217
2014-07-08
KEYS: X.509: Fix a spelling mistake
David Howells
1
-1
/
+1
2014-07-08
PKCS#7: Provide a key type for testing PKCS#7
David Howells
3
-0
/
+117
2014-07-08
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
David Howells
2
-0
/
+220
2014-07-08
PKCS#7: Verify internal certificate chain
David Howells
1
-1
/
+87
2014-07-08
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
David Howells
1
-0
/
+64
2014-07-08
PKCS#7: Digest the data in a signed-data message
David Howells
2
-1
/
+175
2014-07-08
PKCS#7: Implement a parser [RFC 2315]
David Howells
5
-0
/
+606
2014-07-02
X.509: Export certificate parse and free functions
David Howells
1
-0
/
+3
2014-07-01
X.509: Add bits needed for PKCS#7
David Howells
3
-2
/
+30
2013-11-23
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
Linus Torvalds
1
-80
/
+1
2013-11-23
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Linus Torvalds
1
-2
/
+3
2013-11-01
KEYS: The RSA public key algorithm needs to select MPILIB
David Howells
1
-0
/
+1
2013-10-25
ima: provide support for arbitrary hash algorithms
Dmitry Kasatkin
2
-3
/
+2
2013-10-25
keys: change asymmetric keys to use common hash definitions
Dmitry Kasatkin
6
-30
/
+20
2013-10-07
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
James Yonan
1
-2
/
+3
2013-09-25
X.509: add module description and license
Konstantin Khlebnikov
1
-0
/
+3
2013-09-25
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+80
2013-09-25
KEYS: Set the asymmetric-key type default search method
David Howells
1
-0
/
+1
2013-09-25
X.509: Remove certificate date checks
David Howells
1
-38
/
+0
2013-09-25
X.509: Handle certificates that lack an authorityKeyIdentifier field
David Howells
1
-4
/
+5
2013-09-25
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
David Howells
1
-0
/
+11
2013-09-25
X.509: Embed public_key_signature struct and create filler function
David Howells
3
-55
/
+74
2013-09-25
X.509: struct x509_certificate needs struct tm declaring
David Howells
1
-0
/
+1
2013-09-25
KEYS: Split public_key_verify_signature() and make available
David Howells
3
-9
/
+39
2013-09-25
KEYS: Store public key algo ID in public_key struct
David Howells
3
-5
/
+5
2013-09-25
KEYS: Move the algorithm pointer array from x509 to public_key.c
David Howells
3
-11
/
+10
[next]