index
:
litmus-rt.git
archive/unc-master-3.0
archived-2013.1
archived-private-master
archived-semi-part
demo
ecrts-pgm-final
ecrts14-pgm-final
gpusync-rtss12
gpusync/staging
linux-tip
litmus2008-patch-series
master
pgm
prop/litmus-signals
prop/robust-tie-break
staging
test
tracing-devel
v2.6.34-with-arm-patches
v2015.1
wip-2011.2-bbb
wip-2011.2-bbb-trace
wip-2012.3-gpu
wip-2012.3-gpu-preport
wip-2012.3-gpu-rtss13
wip-2012.3-gpu-sobliv-budget-w-kshark
wip-aedzl-final
wip-aedzl-revised
wip-arbit-deadline
wip-aux-tasks
wip-bbb
wip-bbb-prio-don
wip-better-break
wip-binary-heap
wip-budget
wip-color
wip-color-jlh
wip-d10-hz1000
wip-default-clustering
wip-dissipation-jerickso
wip-dissipation2-jerickso
wip-ecrts14-pgm
wip-edf-hsb
wip-edf-os
wip-edf-tie-break
wip-edzl-critique
wip-edzl-final
wip-edzl-revised
wip-events
wip-extra-debug
wip-fix-switch-jerickso
wip-fix3
wip-fmlp-dequeue
wip-ft-irq-flag
wip-gpu-cleanup
wip-gpu-interrupts
wip-gpu-rtas12
wip-gpu-rtss12
wip-gpu-rtss12-srp
wip-gpusync-merge
wip-ikglp
wip-k-fmlp
wip-kernel-coloring
wip-kernthreads
wip-klmirqd-to-aux
wip-kshark
wip-litmus-3.2
wip-litmus2011.2
wip-litmus3.0-2011.2
wip-master-2.6.33-rt
wip-mc
wip-mc-bipasa
wip-mc-jerickso
wip-mc2-cache-slack
wip-mcrit-mac
wip-merge-3.0
wip-merge-v3.0
wip-migration-affinity
wip-mmap-uncache
wip-modechange
wip-nested-locking
wip-omlp-gedf
wip-pai
wip-percore-lib
wip-performance
wip-pgm
wip-pgm-split
wip-pm-ovd
wip-prio-inh
wip-prioq-dgl
wip-refactored-gedf
wip-release-master-fix
wip-robust-tie-break
wip-rt-kshark
wip-rtas12-pgm
wip-semi-part
wip-semi-part-edfos-jerickso
wip-shared-lib
wip-shared-lib2
wip-shared-mem
wip-splitting-jerickso
wip-splitting-omlp-jerickso
wip-stage-binheap
wip-sun-port
wip-timer-trace
wip-tracepoints
The LITMUS^RT kernel.
Bjoern Brandenburg
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
crypto
/
asymmetric_keys
Commit message (
Expand
)
Author
Age
*
PEFILE: Relax the check on the length of the PKCS#7 cert
David Howells
2014-09-02
*
KEYS: Fix public_key asymmetric key subtype name
David Howells
2014-09-02
*
X.509: Need to export x509_request_asymmetric_key()
David Howells
2014-08-03
*
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
2014-07-31
*
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2014-07-29
*
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
2014-07-28
*
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
2014-07-28
*
PKCS#7: Missing inclusion of linux/err.h
David Howells
2014-07-25
*
Merge branch 'keys-fixes' into keys-next
David Howells
2014-07-22
|
\
|
*
RSA: Don't select non-existent symbol
Jean Delvare
2014-07-17
*
|
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
2014-07-22
|
\
\
|
*
|
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
2014-07-17
|
*
|
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2014-07-17
|
*
|
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2014-07-17
|
*
|
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
2014-07-17
|
|
/
*
|
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
2014-07-22
|
\
\
|
*
|
pefile: Validate PKCS#7 trust chain
David Howells
2014-07-09
|
*
|
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
2014-07-09
|
*
|
pefile: Handle pesign using the wrong OID
Vivek Goyal
2014-07-09
|
*
|
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
2014-07-09
|
*
|
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
2014-07-09
|
*
|
pefile: Strip the wrapper off of the cert data block
David Howells
2014-07-09
|
*
|
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
2014-07-09
|
*
|
KEYS: X.509: Fix a spelling mistake
David Howells
2014-07-08
*
|
|
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
2014-07-22
|
\
|
|
|
*
|
PKCS#7: Provide a key type for testing PKCS#7
David Howells
2014-07-08
|
*
|
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
David Howells
2014-07-08
|
*
|
PKCS#7: Verify internal certificate chain
David Howells
2014-07-08
|
*
|
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
David Howells
2014-07-08
|
*
|
PKCS#7: Digest the data in a signed-data message
David Howells
2014-07-08
|
*
|
PKCS#7: Implement a parser [RFC 2315]
David Howells
2014-07-08
|
*
|
X.509: Export certificate parse and free functions
David Howells
2014-07-02
|
*
|
X.509: Add bits needed for PKCS#7
David Howells
2014-07-01
|
|
/
*
|
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
2014-07-22
*
|
KEYS: Provide a generic instantiation function
David Howells
2014-07-18
|
/
*
Revert "KEYS: verify a certificate is signed by a 'trusted' key"
Linus Torvalds
2013-11-23
*
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Linus Torvalds
2013-11-23
|
\
|
*
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
James Yonan
2013-10-07
*
|
KEYS: The RSA public key algorithm needs to select MPILIB
David Howells
2013-11-01
*
|
ima: provide support for arbitrary hash algorithms
Dmitry Kasatkin
2013-10-25
*
|
keys: change asymmetric keys to use common hash definitions
Dmitry Kasatkin
2013-10-25
*
|
X.509: add module description and license
Konstantin Khlebnikov
2013-09-25
*
|
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
2013-09-25
*
|
KEYS: Set the asymmetric-key type default search method
David Howells
2013-09-25
*
|
X.509: Remove certificate date checks
David Howells
2013-09-25
*
|
X.509: Handle certificates that lack an authorityKeyIdentifier field
David Howells
2013-09-25
*
|
X.509: Check the algorithm IDs obtained from parsing an X.509 certificate
David Howells
2013-09-25
*
|
X.509: Embed public_key_signature struct and create filler function
David Howells
2013-09-25
*
|
X.509: struct x509_certificate needs struct tm declaring
David Howells
2013-09-25
*
|
KEYS: Split public_key_verify_signature() and make available
David Howells
2013-09-25
[next]