Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
kernel
/
msm-4.19
/
d76c333e9fe2d269c54f68747b2311a5657276e5
/
crypto
/
asymmetric_keys
cf5b50f
X.509: Need to export x509_request_asymmetric_key()
by David Howells
· 10 years ago
412eccb
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
by David Howells
· 10 years ago
5ce43ad
PKCS#7: Use x509_request_asymmetric_key()
by David Howells
· 10 years ago
185de09
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
by David Howells
· 10 years ago
63d2551
PKCS#7: fix sparse non static symbol warning
by Wei Yongjun
· 10 years ago
8f3438c
PKCS#7: Missing inclusion of linux/err.h
by David Howells
· 10 years ago
633706a
Merge branch 'keys-fixes' into keys-next
by David Howells
· 10 years ago
64724cf
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
by David Howells
· 10 years ago
6204e00
Merge tag 'keys-pefile-20140709' into keys-next
by David Howells
· 10 years ago
1ca72c9
Merge tag 'keys-pkcs7-20140708' into keys-next
by David Howells
· 10 years ago
fc7c70e
KEYS: struct key_preparsed_payload should have two payload pointers
by David Howells
· 10 years ago
6a09d17
KEYS: Provide a generic instantiation function
by David Howells
· 10 years ago
26c1821
RSA: Don't select non-existent symbol
by Jean Delvare
· 10 years ago
32c4741
KEYS: validate certificate trust only with builtin keys
by Dmitry Kasatkin
· 11 years ago
ffb70f6
KEYS: validate certificate trust only with selected key
by Dmitry Kasatkin
· 11 years ago
b342682
KEYS: make partial key id matching as a dedicated function
by Dmitry Kasatkin
· 11 years ago
3be4bea
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
98801c0
pefile: Validate PKCS#7 trust chain
by David Howells
· 10 years ago
af316fc
pefile: Digest the PE binary and compare to the PKCS#7 data
by David Howells
· 10 years ago
dd7d66f
pefile: Handle pesign using the wrong OID
by Vivek Goyal
· 10 years ago
4c0b4b1
pefile: Parse the "Microsoft individual code signing" data blob
by David Howells
· 10 years ago
3968280
pefile: Parse the presumed PKCS#7 content of the certificate blob
by David Howells
· 10 years ago
09dacbb
pefile: Strip the wrapper off of the cert data block
by David Howells
· 10 years ago
26d1164
pefile: Parse a PE binary to find a key and a signature contained therein
by David Howells
· 10 years ago
4520698
KEYS: X.509: Fix a spelling mistake
by David Howells
· 10 years ago
22d01af
PKCS#7: Provide a key type for testing PKCS#7
by David Howells
· 10 years ago
08815b6
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
by David Howells
· 10 years ago
8c76d79
PKCS#7: Verify internal certificate chain
by David Howells
· 10 years ago
a473035
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
by David Howells
· 10 years ago
9f0d331
PKCS#7: Digest the data in a signed-data message
by David Howells
· 10 years ago
2e3fadb
PKCS#7: Implement a parser [RFC 2315]
by David Howells
· 10 years ago
ace0107
X.509: Export certificate parse and free functions
by David Howells
· 10 years ago
84aabd4
X.509: Add bits needed for PKCS#7
by David Howells
· 10 years ago
4c1cc40
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
by Linus Torvalds
· 11 years ago
26b265c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
by Linus Torvalds
· 11 years ago
dbed714
KEYS: The RSA public key algorithm needs to select MPILIB
by David Howells
· 11 years ago
c7c8bb2
ima: provide support for arbitrary hash algorithms
by Dmitry Kasatkin
· 12 years ago
3fe78ca
keys: change asymmetric keys to use common hash definitions
by Dmitry Kasatkin
· 12 years ago
6bf37e5
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
by James Yonan
· 11 years ago
e19aaa7
X.509: add module description and license
by Konstantin Khlebnikov
· 11 years ago
09fbc47
KEYS: verify a certificate is signed by a 'trusted' key
by Mimi Zohar
· 11 years ago
cd0421d
KEYS: Set the asymmetric-key type default search method
by David Howells
· 11 years ago
124df92
X.509: Remove certificate date checks
by David Howells
· 12 years ago
17334ca
X.509: Handle certificates that lack an authorityKeyIdentifier field
by David Howells
· 11 years ago
2ecdb23
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
by David Howells
· 11 years ago
b426beb
X.509: Embed public_key_signature struct and create filler function
by David Howells
· 11 years ago
57be4a7
X.509: struct x509_certificate needs struct tm declaring
by David Howells
· 11 years ago
3d167d6
KEYS: Split public_key_verify_signature() and make available
by David Howells
· 11 years ago
67f7d60b
KEYS: Store public key algo ID in public_key struct
by David Howells
· 11 years ago
206ce59
KEYS: Move the algorithm pointer array from x509 to public_key.c
by David Howells
· 11 years ago
9abc4e6
KEYS: Rename public key parameter name arrays
by David Howells
· 11 years ago
04b00bd
X.509: Support parse long form of length octets in Authority Key Identifier
by Chun-Yi Lee
· 12 years ago
2f1c4fe
X.509: Convert some printk calls to pr_devel
by David Howells
· 12 years ago
cf75446
asymmetric keys: fix printk format warning
by Randy Dunlap
· 12 years ago
a5752d1
MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking
by David Howells
· 12 years ago
c26fd69
X.509: Add a crypto key parser for binary (DER) X.509 certificates
by David Howells
· 12 years ago
0b1568a
RSA: Fix signature verification for shorter signatures
by David Howells
· 12 years ago
612e0fe
RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]
by David Howells
· 12 years ago
4ae71c1
KEYS: Provide signature verification with an asymmetric key
by David Howells
· 12 years ago
a9681bf
KEYS: Asymmetric public-key algorithm crypto key subtype
by David Howells
· 12 years ago
46c6f17
KEYS: Asymmetric key pluggable data parsers
by David Howells
· 12 years ago
964f3b3
KEYS: Implement asymmetric key type
by David Howells
· 12 years ago