path: root/crypto
AgeCommit message (Expand)AuthorFilesLines
2014-08-08initramfs: support initramfs that is bigger than 2GiBYinghai Lu1-4/+4
2014-08-06Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds18-50/+2075
2014-08-05Merge branch 'for-linus' of git://ftp.arm.linux.org.uk/~rmk/linux-armLinus Torvalds1-0/+26
2014-08-04Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds13-235/+3546
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells1-0/+1
2014-08-02ARM: 8120/1: crypto: sha512: add ARM NEON implementationJussi Kivilinna1-0/+15
2014-08-02ARM: 8119/1: crypto: sha1: add ARM NEON implementationJussi Kivilinna1-0/+11
2014-08-01crypto: drbg - fix failure of generating multiple of 2**16 bytesStephan Mueller1-1/+1
2014-08-01crypto: testmgr - add missing spaces to drbg error stringsJarod Wilson1-3/+3
2014-08-01crypto: testmgr - use chunks smaller than algo block size in chunk testsArd Biesheuvel1-132/+132
2014-08-01crypto: Resolve shadow warningsMark Rustad5-71/+72
2014-07-31crypto: af_alg - properly label AF_ALG socketMilan Broz1-0/+2
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells1-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells2-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells1-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun1-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells1-0/+1
2014-07-23crypto: testmgr - avoid DMA mapping from text, rodata, stackHoria Geanta2-9/+50
2014-07-22Merge branch 'keys-fixes' into keys-nextDavid Howells1-1/+0
2014-07-22Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells3-20/+142
2014-07-22Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells6-1/+678
2014-07-22Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells11-2/+1302
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells2-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells1-24/+1
2014-07-17RSA: Don't select non-existent symbolJean Delvare1-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin1-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin2-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin2-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+86
2014-07-10crypto: drbg - drbg_exit() can be staticFengguang Wu1-1/+1
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells1-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells1-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal1-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells5-1/+168
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells1-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells1-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells4-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells1-1/+1
2014-07-08crypto: drbg - HMAC-SHA1 DRBG has crypto strength of 128 bitsStephan Mueller1-1/+1
2014-07-08crypto: drbg - Mix a time stamp into DRBG stateStephan Mueller1-24/+35
2014-07-08crypto: drbg - Select correct DRBG core for stdrngStephan Mueller1-1/+1
2014-07-08crypto: drbg - Call CTR DRBG DF function only onceStephan Mueller1-19/+22
2014-07-08crypto: drbg - Fix format string for debugging statementsStephan Mueller1-2/+2
2014-07-08crypto: drbg - cleanup of preprocessor macrosStephan Mueller1-11/+17
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells3-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2-0/+220
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells1-1/+87
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells1-0/+64
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells2-1/+175
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells5-0/+606

Privacy Policy