summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)Author
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells
2014-07-17RSA: Don't select non-existent symbolJean Delvare
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells
2014-07-02X.509: Export certificate parse and free functionsDavid Howells
2014-07-01X.509: Add bits needed for PKCS#7David Howells
2013-11-23Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds
2013-11-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin
2013-10-25keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar
2013-09-25KEYS: Set the asymmetric-key type default search methodDavid Howells
2013-09-25X.509: Remove certificate date checksDavid Howells
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells
2013-09-25X.509: Embed public_key_signature struct and create filler functionDavid Howells
2013-09-25X.509: struct x509_certificate needs struct tm declaringDavid Howells
2013-09-25KEYS: Split public_key_verify_signature() and make availableDavid Howells
2013-09-25KEYS: Store public key algo ID in public_key structDavid Howells
2013-09-25KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells
2013-09-25KEYS: Rename public key parameter name arraysDavid Howells
2013-04-22X.509: Support parse long form of length octets in Authority Key IdentifierChun-Yi Lee
2012-10-10X.509: Convert some printk calls to pr_develDavid Howells
2012-10-10asymmetric keys: fix printk format warningRandy Dunlap
2012-10-10MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checkingDavid Howells
2012-10-08X.509: Add a crypto key parser for binary (DER) X.509 certificatesDavid Howells
2012-10-08RSA: Fix signature verification for shorter signaturesDavid Howells
2012-10-08RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]David Howells
2012-10-08KEYS: Provide signature verification with an asymmetric keyDavid Howells
2012-10-08KEYS: Asymmetric public-key algorithm crypto key subtypeDavid Howells