index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
Age
Commit message (
Expand
)
Author
Files
Lines
2014-09-30
Merge commit 'v3.16' into next
James Morris
1
-0
/
+2
2014-09-22
KEYS: Check hex2bin()'s return when generating an asymmetric key ID
David Howells
1
-7
/
+8
2014-09-16
PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
David Howells
2
-17
/
+47
2014-09-16
PKCS#7: Better handling of unsupported crypto
David Howells
5
-16
/
+74
2014-09-16
KEYS: Overhaul key identification when searching for asymmetric keys
David Howells
9
-184
/
+195
2014-09-16
KEYS: Implement binary asymmetric key ID handling
David Howells
2
-0
/
+93
2014-09-16
KEYS: Make the key matching functions return bool
David Howells
1
-2
/
+2
2014-09-16
KEYS: Remove key_type::match in favour of overriding default by match_preparse
David Howells
2
-4
/
+3
2014-09-16
KEYS: Remove key_type::def_lookup_type
David Howells
2
-2
/
+0
2014-09-16
KEYS: Preparse match data
David Howells
1
-1
/
+30
2014-09-16
Merge tag 'keys-next-fixes-20140916' into keys-next
David Howells
1
-3
/
+3
2014-09-16
Merge tag 'keys-fixes-20140916' into keys-next
David Howells
1
-28
/
+33
2014-09-16
PKCS#7: Fix the parser cleanup to drain parsed out X.509 certs
David Howells
1
-20
/
+19
2014-09-16
PKCS#7: Provide a single place to do signed info block freeing
David Howells
1
-9
/
+15
2014-09-16
PKCS#7: Add a missing static
David Howells
1
-3
/
+3
2014-09-03
KEYS: Set pr_fmt() in asymmetric key signature handling
David Howells
1
-0
/
+1
2014-08-03
X.509: Need to export x509_request_asymmetric_key()
David Howells
1
-0
/
+1
2014-07-31
crypto: af_alg - properly label AF_ALG socket
Milan Broz
1
-0
/
+2
2014-07-31
PKCS#7: X.509 certificate issuer and subject are mandatory fields in the ASN.1
David Howells
1
-4
/
+2
2014-07-29
PKCS#7: Use x509_request_asymmetric_key()
David Howells
2
-72
/
+25
2014-07-28
X.509: x509_request_asymmetric_keys() doesn't need string length arguments
David Howells
1
-6
/
+3
2014-07-28
PKCS#7: fix sparse non static symbol warning
Wei Yongjun
1
-1
/
+1
2014-07-25
PKCS#7: Missing inclusion of linux/err.h
David Howells
1
-0
/
+1
2014-07-23
Merge branch 'keys-fixes' into keys-next
David Howells
1
-1
/
+0
2014-07-23
Merge remote-tracking branch 'integrity/next-with-keys' into keys-next
David Howells
3
-20
/
+142
2014-07-23
Merge tag 'keys-pefile-20140709' into keys-next
David Howells
6
-1
/
+678
2014-07-23
Merge tag 'keys-pkcs7-20140708' into keys-next
David Howells
11
-2
/
+1302
2014-07-23
KEYS: struct key_preparsed_payload should have two payload pointers
David Howells
2
-2
/
+2
2014-07-18
KEYS: Provide a generic instantiation function
David Howells
1
-24
/
+1
2014-07-18
RSA: Don't select non-existent symbol
Jean Delvare
1
-1
/
+0
2014-07-17
KEYS: validate certificate trust only with builtin keys
Dmitry Kasatkin
1
-3
/
+6
2014-07-17
KEYS: validate certificate trust only with selected key
Dmitry Kasatkin
2
-0
/
+20
2014-07-17
KEYS: make partial key id matching as a dedicated function
Dmitry Kasatkin
2
-19
/
+33
2014-07-17
KEYS: verify a certificate is signed by a 'trusted' key
Mimi Zohar
1
-1
/
+86
2014-07-09
pefile: Validate PKCS#7 trust chain
David Howells
1
-1
/
+1
2014-07-09
pefile: Digest the PE binary and compare to the PKCS#7 data
David Howells
1
-0
/
+197
2014-07-09
pefile: Handle pesign using the wrong OID
Vivek Goyal
1
-1
/
+7
2014-07-09
pefile: Parse the "Microsoft individual code signing" data blob
David Howells
5
-1
/
+168
2014-07-09
pefile: Parse the presumed PKCS#7 content of the certificate blob
David Howells
1
-1
/
+20
2014-07-09
pefile: Strip the wrapper off of the cert data block
David Howells
1
-0
/
+71
2014-07-09
pefile: Parse a PE binary to find a key and a signature contained therein
David Howells
4
-0
/
+217
2014-07-08
KEYS: X.509: Fix a spelling mistake
David Howells
1
-1
/
+1
2014-07-08
PKCS#7: Provide a key type for testing PKCS#7
David Howells
3
-0
/
+117
2014-07-08
PKCS#7: Find intersection between PKCS#7 message and known, trusted keys
David Howells
2
-0
/
+220
2014-07-08
PKCS#7: Verify internal certificate chain
David Howells
1
-1
/
+87
2014-07-08
PKCS#7: Find the right key in the PKCS#7 key list and verify the signature
David Howells
1
-0
/
+64
2014-07-08
PKCS#7: Digest the data in a signed-data message
David Howells
2
-1
/
+175
2014-07-08
PKCS#7: Implement a parser [RFC 2315]
David Howells
5
-0
/
+606
2014-07-03
X.509: Export certificate parse and free functions
David Howells
1
-0
/
+3
2014-07-01
X.509: Add bits needed for PKCS#7
David Howells
3
-2
/
+30
[next]