1. 146aa8b KEYS: Merge the type-specific data with the payload data by David Howells · 9 years ago
  2. e7c87be X.509: Don't strip leading 00's from key ID when constructing key description by David Howells · 9 years ago
  3. fd19a3d PKCS#7: Improve and export the X.509 ASN.1 time object decoder by David Howells · 9 years ago
  4. 4573b64 X.509: Support X.509 lookup by Issuer+Serial form AuthorityKeyIdentifier by David Howells · 9 years ago
  5. b92e657 X.509: Extract both parts of the AuthorityKeyIdentifier by David Howells · 9 years ago
  6. f2b3dee KEYS: fix "ca_keys=" partial key matching by Mimi Zohar · 9 years ago
  7. 7a224e7 KEYS: strip 'id:' from ca_keyid by Dmitry Kasatkin · 10 years ago
  8. f1b731d KEYS: Restore partial ID matching functionality for asymmetric keys by Dmitry Kasatkin · 10 years ago
  9. dd2f6c4 X.509: If available, use the raw subjKeyId to form the key description by David Howells · 10 years ago
  10. 4155942 PKCS#7: Better handling of unsupported crypto by David Howells · 10 years ago
  11. 46963b7 KEYS: Overhaul key identification when searching for asymmetric keys by David Howells · 10 years ago
  12. cf5b50f X.509: Need to export x509_request_asymmetric_key() by David Howells · 10 years ago
  13. 5ce43ad PKCS#7: Use x509_request_asymmetric_key() by David Howells · 10 years ago
  14. 185de09 X.509: x509_request_asymmetric_keys() doesn't need string length arguments by David Howells · 10 years ago
  15. 64724cf Merge remote-tracking branch 'integrity/next-with-keys' into keys-next by David Howells · 10 years ago
  16. fc7c70e KEYS: struct key_preparsed_payload should have two payload pointers by David Howells · 10 years ago
  17. 32c4741 KEYS: validate certificate trust only with builtin keys by Dmitry Kasatkin · 10 years ago
  18. ffb70f6 KEYS: validate certificate trust only with selected key by Dmitry Kasatkin · 10 years ago
  19. 3be4bea KEYS: verify a certificate is signed by a 'trusted' key by Mimi Zohar · 11 years ago
  20. 4c1cc40 Revert "KEYS: verify a certificate is signed by a 'trusted' key" by Linus Torvalds · 11 years ago
  21. c7c8bb2 ima: provide support for arbitrary hash algorithms by Dmitry Kasatkin · 11 years ago
  22. 3fe78ca keys: change asymmetric keys to use common hash definitions by Dmitry Kasatkin · 11 years ago
  23. e19aaa7 X.509: add module description and license by Konstantin Khlebnikov · 11 years ago
  24. 09fbc47 KEYS: verify a certificate is signed by a 'trusted' key by Mimi Zohar · 11 years ago
  25. 124df92 X.509: Remove certificate date checks by David Howells · 11 years ago
  26. 17334ca X.509: Handle certificates that lack an authorityKeyIdentifier field by David Howells · 11 years ago
  27. 2ecdb23 X.509: Check the algorithm IDs obtained from parsing an X.509 certificate by David Howells · 11 years ago
  28. b426beb X.509: Embed public_key_signature struct and create filler function by David Howells · 11 years ago
  29. 3d167d6 KEYS: Split public_key_verify_signature() and make available by David Howells · 11 years ago
  30. 67f7d60b KEYS: Store public key algo ID in public_key struct by David Howells · 11 years ago
  31. 206ce59 KEYS: Move the algorithm pointer array from x509 to public_key.c by David Howells · 11 years ago
  32. 9abc4e6 KEYS: Rename public key parameter name arrays by David Howells · 11 years ago
  33. 2f1c4fe X.509: Convert some printk calls to pr_devel by David Howells · 12 years ago
  34. a5752d1 MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking by David Howells · 12 years ago
  35. c26fd69 X.509: Add a crypto key parser for binary (DER) X.509 certificates by David Howells · 12 years ago