summaryrefslogtreecommitdiff
path: root/crypto
AgeCommit message (Expand)AuthorLines
2014-08-08initramfs: support initramfs that is bigger than 2GiBYinghai Lu-4/+4
2014-08-06Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds-50/+2075
2014-08-05Merge branch 'for-linus' of git://ftp.arm.linux.org.uk/~rmk/linux-armLinus Torvalds-0/+26
2014-08-04Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6Linus Torvalds-235/+3546
2014-08-03X.509: Need to export x509_request_asymmetric_key()David Howells-0/+1
2014-08-02ARM: 8120/1: crypto: sha512: add ARM NEON implementationJussi Kivilinna-0/+15
2014-08-02ARM: 8119/1: crypto: sha1: add ARM NEON implementationJussi Kivilinna-0/+11
2014-08-01crypto: drbg - fix failure of generating multiple of 2**16 bytesStephan Mueller-1/+1
2014-08-01crypto: testmgr - add missing spaces to drbg error stringsJarod Wilson-3/+3
2014-08-01crypto: testmgr - use chunks smaller than algo block size in chunk testsArd Biesheuvel-132/+132
2014-08-01crypto: Resolve shadow warningsMark Rustad-71/+72
2014-07-31crypto: af_alg - properly label AF_ALG socketMilan Broz-0/+2
2014-07-31PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1David Howells-4/+2
2014-07-29PKCS#7: Use x509_request_asymmetric_key()David Howells-72/+25
2014-07-28X.509: x509_request_asymmetric_keys() doesn't need string length argumentsDavid Howells-6/+3
2014-07-28PKCS#7: fix sparse non static symbol warningWei Yongjun-1/+1
2014-07-25PKCS#7: Missing inclusion of linux/err.hDavid Howells-0/+1
2014-07-23crypto: testmgr - avoid DMA mapping from text, rodata, stackHoria Geanta-9/+50
2014-07-22Merge branch 'keys-fixes' into keys-nextDavid Howells-1/+0
2014-07-22Merge remote-tracking branch 'integrity/next-with-keys' into keys-nextDavid Howells-20/+142
2014-07-22Merge tag 'keys-pefile-20140709' into keys-nextDavid Howells-1/+678
2014-07-22Merge tag 'keys-pkcs7-20140708' into keys-nextDavid Howells-2/+1302
2014-07-22KEYS: struct key_preparsed_payload should have two payload pointersDavid Howells-2/+2
2014-07-18KEYS: Provide a generic instantiation functionDavid Howells-24/+1
2014-07-17RSA: Don't select non-existent symbolJean Delvare-1/+0
2014-07-17KEYS: validate certificate trust only with builtin keysDmitry Kasatkin-3/+6
2014-07-17KEYS: validate certificate trust only with selected keyDmitry Kasatkin-0/+20
2014-07-17KEYS: make partial key id matching as a dedicated functionDmitry Kasatkin-19/+33
2014-07-17KEYS: verify a certificate is signed by a 'trusted' keyMimi Zohar-1/+86
2014-07-10crypto: drbg - drbg_exit() can be staticFengguang Wu-1/+1
2014-07-09pefile: Validate PKCS#7 trust chainDavid Howells-1/+1
2014-07-09pefile: Digest the PE binary and compare to the PKCS#7 dataDavid Howells-0/+197
2014-07-09pefile: Handle pesign using the wrong OIDVivek Goyal-1/+7
2014-07-09pefile: Parse the "Microsoft individual code signing" data blobDavid Howells-1/+168
2014-07-09pefile: Parse the presumed PKCS#7 content of the certificate blobDavid Howells-1/+20
2014-07-09pefile: Strip the wrapper off of the cert data blockDavid Howells-0/+71
2014-07-09pefile: Parse a PE binary to find a key and a signature contained thereinDavid Howells-0/+217
2014-07-08KEYS: X.509: Fix a spelling mistakeDavid Howells-1/+1
2014-07-08crypto: drbg - HMAC-SHA1 DRBG has crypto strength of 128 bitsStephan Mueller-1/+1
2014-07-08crypto: drbg - Mix a time stamp into DRBG stateStephan Mueller-24/+35
2014-07-08crypto: drbg - Select correct DRBG core for stdrngStephan Mueller-1/+1
2014-07-08crypto: drbg - Call CTR DRBG DF function only onceStephan Mueller-19/+22
2014-07-08crypto: drbg - Fix format string for debugging statementsStephan Mueller-2/+2
2014-07-08crypto: drbg - cleanup of preprocessor macrosStephan Mueller-11/+17
2014-07-08PKCS#7: Provide a key type for testing PKCS#7David Howells-0/+117
2014-07-08PKCS#7: Find intersection between PKCS#7 message and known, trusted keysDavid Howells-0/+220
2014-07-08PKCS#7: Verify internal certificate chainDavid Howells-1/+87
2014-07-08PKCS#7: Find the right key in the PKCS#7 key list and verify the signatureDavid Howells-0/+64
2014-07-08PKCS#7: Digest the data in a signed-data messageDavid Howells-1/+175
2014-07-08PKCS#7: Implement a parser [RFC 2315]David Howells-0/+606