index
:
openchrome/drm-openchrome
drm-next-3.19
drm-next-4.13
drm-next-4.14
drm-next-4.15
drm-next-4.16
drm-next-4.17
drm-next-4.18
drm-next-4.19
drm-next-4.20
drm-next-4.21
drm-next-5.1
drm-next-5.10
drm-next-5.11
drm-next-5.12
drm-next-5.13
drm-next-5.14
drm-next-5.15
drm-next-5.16
drm-next-5.17
drm-next-5.18
drm-next-5.19
drm-next-5.2
drm-next-5.20
drm-next-5.3
drm-next-5.4
drm-next-5.5
drm-next-5.6
drm-next-5.7
drm-next-5.8
drm-next-5.9
drm-next-6.1
drm-next-6.2
drm-next-6.3
drm-next-6.4
drm-next-6.5
drm-next-6.6
drm-next-6.7
drm-next-6.8
drm-next-6.9
master
DRM driver for VIA IGPs
root
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
/
x509_public_key.c
Age
Commit message (
Expand
)
Author
Files
Lines
2014-10-06
KEYS: strip 'id:' from ca_keyid
Dmitry Kasatkin
1
-1
/
+1
2014-10-06
KEYS: Restore partial ID matching functionality for asymmetric keys
Dmitry Kasatkin
1
-5
/
+13
2014-10-03
X.509: If available, use the raw subjKeyId to form the key description
David Howells
1
-2
/
+7
2014-09-16
PKCS#7: Better handling of unsupported crypto
David Howells
1
-2
/
+11
2014-09-16
KEYS: Overhaul key identification when searching for asymmetric keys
David Howells
1
-38
/
+51
2014-08-03
X.509: Need to export x509_request_asymmetric_key()
David Howells
1
-0
/
+1
2014-07-29
PKCS#7: Use x509_request_asymmetric_key()
David Howells
1
-15
/
+21
2014-07-28
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
1
-6
/
+3
2014-07-22
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
1
-1
/
+108
2014-07-22
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
1
-1
/
+1
2014-07-17
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
1
-3
/
+6
2014-07-17
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
1
-0
/
+19
2014-07-17
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+86
2013-11-23
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
Linus Torvalds
1
-80
/
+1
2013-10-25
ima: provide support for arbitrary hash algorithms
Dmitry Kasatkin
1
-1
/
+2
2013-10-25
keys: change asymmetric keys to use common hash definitions
Dmitry Kasatkin
1
-5
/
+4
2013-09-25
X.509: add module description and license
Konstantin Khlebnikov
1
-0
/
+3
2013-09-25
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+80
2013-09-25
X.509: Remove certificate date checks
David Howells
1
-38
/
+0
2013-09-25
X.509: Handle certificates that lack an authorityKeyIdentifier field
David Howells
1
-4
/
+5
2013-09-25
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
David Howells
1
-0
/
+11
2013-09-25
X.509: Embed public_key_signature struct and create filler function
David Howells
1
-36
/
+47
2013-09-25
KEYS: Split public_key_verify_signature() and make available
David Howells
1
-1
/
+1
2013-09-25
KEYS: Store public key algo ID in public_key struct
David Howells
1
-2
/
+2
2013-09-25
KEYS: Move the algorithm pointer array from x509 to public_key.c
David Howells
1
-10
/
+1
2013-09-25
KEYS: Rename public key parameter name arrays
David Howells
1
-4
/
+4
2012-10-10
X.509: Convert some printk calls to pr_devel
David Howells
1
-3
/
+3
2012-10-10
MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking
David Howells
1
-5
/
+37
2012-10-08
X.509: Add a crypto key parser for binary (DER) X.509 certificates
David Howells
1
-0
/
+207