1. 5ce43ad PKCS#7: Use x509_request_asymmetric_key() by David Howells · 10 years ago
  2. 185de09 X.509: x509_request_asymmetric_keys() doesn't need string length arguments by David Howells · 10 years ago
  3. 63d2551 PKCS#7: fix sparse non static symbol warning by Wei Yongjun · 10 years ago
  4. 8f3438c PKCS#7: Missing inclusion of linux/err.h by David Howells · 10 years ago
  5. 633706a Merge branch 'keys-fixes' into keys-next by David Howells · 10 years ago
  6. 64724cf Merge remote-tracking branch 'integrity/next-with-keys' into keys-next by David Howells · 10 years ago
  7. 6204e00 Merge tag 'keys-pefile-20140709' into keys-next by David Howells · 10 years ago
  8. 1ca72c9 Merge tag 'keys-pkcs7-20140708' into keys-next by David Howells · 10 years ago
  9. fc7c70e KEYS: struct key_preparsed_payload should have two payload pointers by David Howells · 10 years ago
  10. 6a09d17 KEYS: Provide a generic instantiation function by David Howells · 10 years ago
  11. 26c1821 RSA: Don't select non-existent symbol by Jean Delvare · 10 years ago
  12. 32c4741 KEYS: validate certificate trust only with builtin keys by Dmitry Kasatkin · 10 years ago
  13. ffb70f6 KEYS: validate certificate trust only with selected key by Dmitry Kasatkin · 10 years ago
  14. b342682 KEYS: make partial key id matching as a dedicated function by Dmitry Kasatkin · 10 years ago
  15. 3be4bea KEYS: verify a certificate is signed by a 'trusted' key by Mimi Zohar · 11 years ago
  16. 98801c0 pefile: Validate PKCS#7 trust chain by David Howells · 10 years ago
  17. af316fc pefile: Digest the PE binary and compare to the PKCS#7 data by David Howells · 10 years ago
  18. dd7d66f pefile: Handle pesign using the wrong OID by Vivek Goyal · 10 years ago
  19. 4c0b4b1 pefile: Parse the "Microsoft individual code signing" data blob by David Howells · 10 years ago
  20. 3968280 pefile: Parse the presumed PKCS#7 content of the certificate blob by David Howells · 10 years ago
  21. 09dacbb pefile: Strip the wrapper off of the cert data block by David Howells · 10 years ago
  22. 26d1164 pefile: Parse a PE binary to find a key and a signature contained therein by David Howells · 10 years ago
  23. 4520698 KEYS: X.509: Fix a spelling mistake by David Howells · 10 years ago
  24. 22d01af PKCS#7: Provide a key type for testing PKCS#7 by David Howells · 10 years ago
  25. 08815b6 PKCS#7: Find intersection between PKCS#7 message and known, trusted keys by David Howells · 10 years ago
  26. 8c76d79 PKCS#7: Verify internal certificate chain by David Howells · 10 years ago
  27. a473035 PKCS#7: Find the right key in the PKCS#7 key list and verify the signature by David Howells · 10 years ago
  28. 9f0d331 PKCS#7: Digest the data in a signed-data message by David Howells · 10 years ago
  29. 2e3fadb PKCS#7: Implement a parser [RFC 2315] by David Howells · 10 years ago
  30. ace0107 X.509: Export certificate parse and free functions by David Howells · 10 years ago
  31. 84aabd4 X.509: Add bits needed for PKCS#7 by David Howells · 10 years ago
  32. 4c1cc40 Revert "KEYS: verify a certificate is signed by a 'trusted' key" by Linus Torvalds · 10 years ago
  33. 26b265c Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 by Linus Torvalds · 10 years ago
  34. dbed714 KEYS: The RSA public key algorithm needs to select MPILIB by David Howells · 11 years ago
  35. c7c8bb2 ima: provide support for arbitrary hash algorithms by Dmitry Kasatkin · 11 years ago
  36. 3fe78ca keys: change asymmetric keys to use common hash definitions by Dmitry Kasatkin · 11 years ago
  37. 6bf37e5 crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks by James Yonan · 11 years ago
  38. e19aaa7 X.509: add module description and license by Konstantin Khlebnikov · 11 years ago
  39. 09fbc47 KEYS: verify a certificate is signed by a 'trusted' key by Mimi Zohar · 11 years ago
  40. cd0421d KEYS: Set the asymmetric-key type default search method by David Howells · 11 years ago
  41. 124df92 X.509: Remove certificate date checks by David Howells · 11 years ago
  42. 17334ca X.509: Handle certificates that lack an authorityKeyIdentifier field by David Howells · 11 years ago
  43. 2ecdb23 X.509: Check the algorithm IDs obtained from parsing an X.509 certificate by David Howells · 11 years ago
  44. b426beb X.509: Embed public_key_signature struct and create filler function by David Howells · 11 years ago
  45. 57be4a7 X.509: struct x509_certificate needs struct tm declaring by David Howells · 11 years ago
  46. 3d167d6 KEYS: Split public_key_verify_signature() and make available by David Howells · 11 years ago
  47. 67f7d60b KEYS: Store public key algo ID in public_key struct by David Howells · 11 years ago
  48. 206ce59 KEYS: Move the algorithm pointer array from x509 to public_key.c by David Howells · 11 years ago
  49. 9abc4e6 KEYS: Rename public key parameter name arrays by David Howells · 11 years ago
  50. 04b00bd X.509: Support parse long form of length octets in Authority Key Identifier by Chun-Yi Lee · 11 years ago
  51. 2f1c4fe X.509: Convert some printk calls to pr_devel by David Howells · 12 years ago
  52. cf75446 asymmetric keys: fix printk format warning by Randy Dunlap · 12 years ago
  53. a5752d1 MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checking by David Howells · 12 years ago
  54. c26fd69 X.509: Add a crypto key parser for binary (DER) X.509 certificates by David Howells · 12 years ago
  55. 0b1568a RSA: Fix signature verification for shorter signatures by David Howells · 12 years ago
  56. 612e0fe RSA: Implement signature verification algorithm [PKCS#1 / RFC3447] by David Howells · 12 years ago
  57. 4ae71c1 KEYS: Provide signature verification with an asymmetric key by David Howells · 12 years ago
  58. a9681bf KEYS: Asymmetric public-key algorithm crypto key subtype by David Howells · 12 years ago
  59. 46c6f17 KEYS: Asymmetric key pluggable data parsers by David Howells · 12 years ago
  60. 964f3b3 KEYS: Implement asymmetric key type by David Howells · 12 years ago