summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)Author
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells
2014-07-22Merge branch 'keys-fixes' into keys-nextDavid Howells
2014-07-22Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells
2014-07-22Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells
2014-07-22Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells
2014-07-17RSA: Don't select non-existent symbolJean Delvare
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells
2014-07-02X.509: Export certificate parse and free functionsDavid Howells
2014-07-01X.509: Add bits needed for PKCS#7David Howells
2013-11-24Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds
2013-11-24Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin
2013-10-25keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar
2013-09-25KEYS: Set the asymmetric-key type default search methodDavid Howells
2013-09-25X.509: Remove certificate date checksDavid Howells
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells
2013-09-25X.509: Embed public_key_signature struct and create filler functionDavid Howells
2013-09-25X.509: struct x509_certificate needs struct tm declaringDavid Howells
2013-09-25KEYS: Split public_key_verify_signature() and make availableDavid Howells
2013-09-25KEYS: Store public key algo ID in public_key structDavid Howells
2013-09-25KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells