summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys
AgeCommit message (Expand)AuthorFilesLines
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells1-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells1-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells4-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells1-1/+1
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells3-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells2-0/+220
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells1-1/+87
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells1-0/+64
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells2-1/+175
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells5-0/+606
2014-07-02X.509: Export certificate parse and free functionsDavid Howells1-0/+3
2014-07-01X.509: Add bits needed for PKCS#7David Howells3-2/+30
2013-11-23Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds1-80/+1
2013-11-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds1-2/+3
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells1-0/+1
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2-3/+2
2013-10-25keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin6-30/+20
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan1-2/+3
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov1-0/+3
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+80
2013-09-25KEYS: Set the asymmetric-key type default search methodDavid Howells1-0/+1
2013-09-25X.509: Remove certificate date checksDavid Howells1-38/+0
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells1-4/+5
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells1-0/+11
2013-09-25X.509: Embed public_key_signature struct and create filler functionDavid Howells3-55/+74
2013-09-25X.509: struct x509_certificate needs struct tm declaringDavid Howells1-0/+1
2013-09-25KEYS: Split public_key_verify_signature() and make availableDavid Howells3-9/+39
2013-09-25KEYS: Store public key algo ID in public_key structDavid Howells3-5/+5
2013-09-25KEYS: Move the algorithm pointer array from x509 to public_key.cDavid Howells3-11/+10
2013-09-25KEYS: Rename public key parameter name arraysDavid Howells2-11/+11
2013-04-22X.509: Support parse long form of length octets in Authority Key IdentifierChun-Yi Lee1-8/+47
2012-10-10X.509: Convert some printk calls to pr_develDavid Howells1-3/+3
2012-10-10asymmetric keys: fix printk format warningRandy Dunlap1-1/+1
2012-10-10MODSIGN: Fix 32-bit overflow in X.509 certificate validity date checkingDavid Howells3-20/+51
2012-10-08X.509: Add a crypto key parser for binary (DER) X.509 certificatesDavid Howells8-0/+832
2012-10-08RSA: Fix signature verification for shorter signaturesDavid Howells1-3/+11
2012-10-08RSA: Implement signature verification algorithm [PKCS#1 / RFC3447]David Howells4-0/+279
2012-10-08KEYS: Provide signature verification with an asymmetric keyDavid Howells2-1/+50
2012-10-08KEYS: Asymmetric public-key algorithm crypto key subtypeDavid Howells4-0/+146
2012-10-08KEYS: Asymmetric key pluggable data parsersDavid Howells1-1/+119
2012-10-08KEYS: Implement asymmetric key typeDavid Howells4-0/+191