aboutsummaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)AuthorFilesLines
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobGravatar David Howells 1-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockGravatar David Howells 1-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinGravatar David Howells 4-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeGravatar David Howells 1-1/+1
2014-07-08PKCS#7: Provide a key type for testing PKCS#7Gravatar David Howells 3-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysGravatar David Howells 2-0/+220
2014-07-08PKCS#7: Verify internal certificate chainGravatar David Howells 1-1/+87
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureGravatar David Howells 1-0/+64
2014-07-08PKCS#7: Digest the data in a signed-data messageGravatar David Howells 2-1/+175
2014-07-08PKCS#7: Implement a parser [RFC 2315]Gravatar David Howells 5-0/+606
2014-07-02X.509: Export certificate parse and free functionsGravatar David Howells 1-0/+3
2014-07-01X.509: Add bits needed for PKCS#7Gravatar David Howells 3-2/+30
2013-11-23Revert "KEYS: verify a certificate is signed by a 'trusted' key"Gravatar Linus Torvalds 1-80/+1
2013-11-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Gravatar Linus Torvalds 1-2/+3
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBGravatar David Howells 1-0/+1
2013-10-25ima: provide support for arbitrary hash algorithmsGravatar Dmitry Kasatkin 2-3/+2
2013-10-25keys: change asymmetric keys to use common hash definitionsGravatar Dmitry Kasatkin 6-30/+20
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksGravatar James Yonan 1-2/+3
2013-09-25X.509: add module description and licenseGravatar Konstantin Khlebnikov 1-0/+3
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyGravatar Mimi Zohar 1-1/+80
2013-09-25KEYS: Set the asymmetric-key type default search methodGravatar David Howells 1-0/+1
2013-09-25X.509: Remove certificate date checksGravatar David Howells 1-38/+0
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldGravatar David Howells 1-4/+5
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateGravatar David Howells 1-0/+11
2013-09-25X.509: Embed public_key_signature struct and create filler functionGravatar David Howells 3-55/+74
2013-09-25X.509: struct x509_certificate needs struct tm declaringGravatar David Howells 1-0/+1
2013-09-25KEYS: Split public_key_verify_signature() and make availableGravatar David Howells 3-9/+39
2013-09-25KEYS: Store public key algo ID in public_key structGravatar David Howells 3-5/+5
2013-09-25KEYS: Move the algorithm pointer array from x509 to public_key.cGravatar David Howells 3-11/+10
2013-09-25KEYS: Rename public key parameter name arraysGravatar David Howells 2-11/+11
2013-04-22X.509: Support parse long form of length octets in Authority Key IdentifierGravatar Chun-Yi Lee 1-8/+47
2012-10-10X.509: Convert some printk calls to pr_develGravatar David Howells 1-3/+3
2012-10-10asymmetric keys: fix printk format warningGravatar Randy Dunlap 1-1/+1
2012-10-10MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checkingGravatar David Howells 3-20/+51
2012-10-08X.509: Add a crypto key parser for binary (DER) X.509 certificatesGravatar David Howells 8-0/+832
2012-10-08RSA: Fix signature verification for shorter signaturesGravatar David Howells 1-3/+11
2012-10-08RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]Gravatar David Howells 4-0/+279
2012-10-08KEYS: Provide signature verification with an asymmetric keyGravatar David Howells 2-1/+50
2012-10-08KEYS: Asymmetric public-key algorithm crypto key subtypeGravatar David Howells 4-0/+146
2012-10-08KEYS: Asymmetric key pluggable data parsersGravatar David Howells 1-1/+119
2012-10-08KEYS: Implement asymmetric key typeGravatar David Howells 4-0/+191