index
:
drm/drm-intel
core-for-ci
drm-intel-fixes
drm-intel-gt-next
drm-intel-gt-next-backup
drm-intel-next
drm-intel-next-fixes
drm-intel-next-queued
drm-intel-testing
for-linux-next
for-linux-next-fixes
for-linux-next-gt
i915-orig
main
maintainer-tools
topic/core-for-CI
topic/drm-intel-gem-next
topic/thunderbolt-next
Linux driver for Intel graphics
root
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Age
Commit message (
Expand
)
Author
Files
Lines
2014-10-12
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...
Linus Torvalds
11
-232
/
+518
2014-10-06
KEYS: output last portion of fingerprint in /proc/keys
Dmitry Kasatkin
1
-5
/
+5
2014-10-06
KEYS: strip 'id:' from ca_keyid
Dmitry Kasatkin
1
-1
/
+1
2014-10-06
KEYS: use swapped SKID for performing partial matching
Dmitry Kasatkin
2
-9
/
+9
2014-10-06
KEYS: Restore partial ID matching functionality for asymmetric keys
Dmitry Kasatkin
4
-24
/
+76
2014-10-03
X.509: If available, use the raw subjKeyId to form the key description
David Howells
3
-2
/
+11
2014-10-03
KEYS: handle error code encoded in pointer
Dmitry Kasatkin
1
-2
/
+2
2014-09-22
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
David Howells
1
-7
/
+8
2014-09-16
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
David Howells
2
-17
/
+47
2014-09-16
PKCS#7: Better handling of unsupported crypto
David Howells
5
-16
/
+74
2014-09-16
KEYS: Overhaul key identification when searching for asymmetric keys
David Howells
9
-184
/
+195
2014-09-16
KEYS: Implement binary asymmetric key ID handling
David Howells
2
-0
/
+93
2014-09-16
KEYS: Make the key matching functions return bool
David Howells
1
-2
/
+2
2014-09-16
KEYS: Remove key_type::match in favour of overriding default by match_preparse
David Howells
2
-4
/
+3
2014-09-16
KEYS: Remove key_type::def_lookup_type
David Howells
2
-2
/
+0
2014-09-16
KEYS: Preparse match data
David Howells
1
-1
/
+30
2014-09-16
Merge tag 'keys-next-fixes-20140916' into keys-next
David Howells
1
-3
/
+3
2014-09-16
Merge tag 'keys-fixes-20140916' into keys-next
David Howells
1
-28
/
+33
2014-09-16
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
David Howells
1
-20
/
+19
2014-09-16
PKCS#7: Provide a single place to do signed info block freeing
David Howells
1
-9
/
+15
2014-09-16
PKCS#7: Add a missing static
David Howells
1
-3
/
+3
2014-09-03
KEYS: Set pr_fmt() in asymmetric key signature handling
David Howells
1
-0
/
+1
2014-09-03
PEFILE: Relax the check on the length of the PKCS#7 cert
David Howells
1
-16
/
+33
2014-09-03
KEYS: Fix public_key asymmetric key subtype name
David Howells
1
-0
/
+1
2014-08-03
X.509: Need to export x509_request_asymmetric_key()
David Howells
1
-0
/
+1
2014-07-31
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
1
-4
/
+2
2014-07-29
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2
-72
/
+25
2014-07-28
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
1
-6
/
+3
2014-07-28
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
1
-1
/
+1
2014-07-25
PKCS#7: Missing inclusion of linux/err.h
David Howells
1
-0
/
+1
2014-07-22
Merge branch 'keys-fixes' into keys-next
David Howells
1
-1
/
+0
2014-07-22
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
3
-20
/
+142
2014-07-22
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
6
-1
/
+678
2014-07-22
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
11
-2
/
+1302
2014-07-22
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
2
-2
/
+2
2014-07-18
KEYS: Provide a generic instantiation function
David Howells
1
-24
/
+1
2014-07-17
RSA: Don't select non-existent symbol
Jean Delvare
1
-1
/
+0
2014-07-17
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
1
-3
/
+6
2014-07-17
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2
-0
/
+20
2014-07-17
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2
-19
/
+33
2014-07-17
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+86
2014-07-09
pefile: Validate PKCS#7 trust chain
David Howells
1
-1
/
+1
2014-07-09
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
1
-0
/
+197
2014-07-09
pefile: Handle pesign using the wrong OID
Vivek Goyal
1
-1
/
+7
2014-07-09
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
5
-1
/
+168
2014-07-09
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
1
-1
/
+20
2014-07-09
pefile: Strip the wrapper off of the cert data block
David Howells
1
-0
/
+71
2014-07-09
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
4
-0
/
+217
2014-07-08
KEYS: X.509: Fix a spelling mistake
David Howells
1
-1
/
+1
2014-07-08
PKCS#7: Provide a key type for testing PKCS#7
David Howells
3
-0
/
+117
[next]