summaryrefslogtreecommitdiffstats
path: root/crypto
AgeCommit message (Expand)AuthorFilesLines
2014-01-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds6-32/+340
2014-01-05crypto: ahash - Fully restore ahash request before completingMarek Vasut1-1/+4
2013-12-20crypto: tcrypt - Added speed tests for AEAD crypto alogrithms in tcrypt test ...Tim Chen2-0/+280
2013-12-09crypto: memneq - fix for archs without efficient unaligned accessDaniel Borkmann1-1/+2
2013-12-05crypto: pcrypt - Fix wrong usage of rcu_dereference()Mathias Krause1-1/+1
2013-12-05crypto: more robust crypto_memneqCesar Eduardo Barros2-30/+54
2013-12-04Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds4-18/+22
2013-12-02Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netLinus Torvalds2-0/+6
2013-11-29net: update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLASTShawn Landden2-0/+6
2013-11-28crypto: testmgr - fix sglen in test_aead for case 'dst != src'Horia Geanta1-14/+12
2013-11-28crypto: caam - fix aead sglen for case 'dst != src'Horia Geanta1-0/+4
2013-11-28crypto: ccm - Fix handling of zero plaintext when computing macHoria Geanta1-1/+2
2013-11-28crypto: authenc - Find proper IV address in ablkcipher callbackTom Lendacky1-3/+4
2013-11-23Revert "KEYS: verify a certificate is signed by a 'trusted' key"Linus Torvalds1-80/+1
2013-11-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds11-87/+356
2013-11-22Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netLinus Torvalds2-3/+0
2013-11-21Merge branch 'for-linus2' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds11-140/+296
2013-11-20net: rework recvmsg handler msg_name and msg_namelen logicHannes Frederic Sowa2-3/+0
2013-11-20Merge branch 'next' of git://git.infradead.org/users/vkoul/slave-dmaLinus Torvalds6-169/+240
2013-11-16Merge commit 'dmaengine-3.13-v2' of git://git.kernel.org/pub/scm/linux/kernel...Vinod Koul5-167/+238
2013-11-15tree-wide: use reinit_completion instead of INIT_COMPLETIONWolfram Sang3-9/+9
2013-11-14raid6test: add new corner case for ioatdma driverDan Williams1-1/+9
2013-11-14dmaengine: remove DMA unmap flagsBartlomiej Zolnierkiewicz4-13/+5
2013-11-14async_pq_val: convert to dmaengine_unmap_dataDan Williams1-23/+35
2013-11-14async_pq: convert to dmaengine_unmap_dataDan Williams1-52/+65
2013-11-14async_raid6_recov: convert to dmaengine_unmap_dataDan Williams1-20/+49
2013-11-14async_xor_val: convert to dmaengine_unmap_dataDan Williams1-13/+17
2013-11-14async_xor: convert to dmaengine_unmap_dataDan Williams1-44/+51
2013-11-14async_memcpy: convert to dmaengine_unmap_dataDan Williams1-17/+23
2013-11-01KEYS: The RSA public key algorithm needs to select MPILIBDavid Howells1-0/+1
2013-10-30crypto: skcipher - Use eseqiv even on UP machinesHerbert Xu1-20/+1
2013-10-25ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2-3/+2
2013-10-25keys: change asymmetric keys to use common hash definitionsDmitry Kasatkin6-30/+20
2013-10-25crypto: provide single place for hash algo informationDmitry Kasatkin3-0/+60
2013-10-25async_tx: use DMA_COMPLETE for dma completion statusVinod Koul1-2/+2
2013-10-16crypto: authencesn - Simplify key parsingMathias Krause1-22/+4
2013-10-16crypto: authenc - Export key parsing helper functionMathias Krause1-18/+30
2013-10-07crypto: crypto_memneq - add equality testing of memory regions w/o timing leaksJames Yonan7-13/+157
2013-10-07crypto: ablk_helper - Replace memcpy with struct assignmentkbuild test robot1-2/+2
2013-10-04ARM: add support for bit sliced AES using NEON instructionsArd Biesheuvel1-0/+16
2013-09-25X.509: add module description and licenseKonstantin Khlebnikov1-0/+3
2013-09-25KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar1-1/+80
2013-09-25KEYS: Set the asymmetric-key type default search methodDavid Howells1-0/+1
2013-09-25X.509: Remove certificate date checksDavid Howells1-38/+0
2013-09-25X.509: Handle certificates that lack an authorityKeyIdentifier fieldDavid Howells1-4/+5
2013-09-25X.509: Check the algorithm IDs obtained from parsing an X.509 certificateDavid Howells1-0/+11
2013-09-25X.509: Embed public_key_signature struct and create filler functionDavid Howells3-55/+74
2013-09-25X.509: struct x509_certificate needs struct tm declaringDavid Howells1-0/+1
2013-09-25KEYS: Split public_key_verify_signature() and make availableDavid Howells3-9/+39
2013-09-25KEYS: Store public key algo ID in public_key structDavid Howells3-5/+5