On Thu, Aug 8, 2019 at 2:51 AM Neil Armstrong wrote:
>
> This is a first tentative to convert some of the simplest Amlogic
> dt-bindings to the yaml format.
>
> All have been tested using :
> $ make ARCH=arm64 dtbs_check
>
> Issues with the amlogic arm64 DTs has already been identified thanks
> to
On Tue, Aug 13, 2019 at 6:59 AM Horia Geanta wrote:
>
> On 8/12/2019 11:08 PM, Andrey Smirnov wrote:
> > Everyone:
> >
> > Picking up where Chris left off (I chatted with him privately
> > beforehead), this series adds support for i.MX8MQ to CAAM driver. Just
> > like [v1], this series is i.MX8MQ
On Tue, Aug 13, 2019 at 6:38 AM Horia Geanta wrote:
>
> On 8/12/2019 10:27 PM, Andrey Smirnov wrote:
> > On Mon, Aug 5, 2019 at 1:23 AM Horia Geanta wrote:
> >>
> >> On 7/17/2019 6:25 PM, Andrey Smirnov wrote:
> >>> @@ -603,11 +603,13 @@ static int caam_probe(struct platform_device *pdev)
> >>>
On 8/12/2019 11:08 PM, Andrey Smirnov wrote:
> Everyone:
>
> Picking up where Chris left off (I chatted with him privately
> beforehead), this series adds support for i.MX8MQ to CAAM driver. Just
> like [v1], this series is i.MX8MQ only.
>
> Feedback is welcome!
> Thanks,
> Andrey Smirnov
>
> Ch
On 8/12/2019 10:27 PM, Andrey Smirnov wrote:
> On Mon, Aug 5, 2019 at 1:23 AM Horia Geanta wrote:
>>
>> On 7/17/2019 6:25 PM, Andrey Smirnov wrote:
>>> @@ -603,11 +603,13 @@ static int caam_probe(struct platform_device *pdev)
>>> ret = init_clocks(dev, ctrlpriv, imx_soc_match->data);
On Thu, 8 Aug 2019 at 20:46, Jarkko Sakkinen
wrote:
>
> On Thu, Aug 08, 2019 at 06:51:38PM +0530, Sumit Garg wrote:
> > It seems to be a functional change which I think requires proper unit
> > testing. I am afraid that I don't posses a TPM device to test this and
> > also very less conversant wit
Move existing code to trusted keys subsystem. Also, rename files with
"tpm" as suffix which provides the underlying implementation.
Suggested-by: Jarkko Sakkinen
Signed-off-by: Sumit Garg
---
crypto/asymmetric_keys/asym_tpm.c | 2 +-
include/keys/{trusted.h => trusted_tpm.
Current trusted keys framework is tightly coupled to use TPM device as
an underlying implementation which makes it difficult for implementations
like Trusted Execution Environment (TEE) etc. to provide trusked keys
support in case platform doesn't posses a TPM device.
So this patch tries to add ge
Move TPM2 trusted keys code to trusted keys subsystem. The reason
being it's better to consolidate all the trusted keys code to a single
location so that it can be maintained sanely.
Suggested-by: Jarkko Sakkinen
Signed-off-by: Sumit Garg
---
drivers/char/tpm/tpm-chip.c | 1 +
d
This patch-set is an outcome of discussion here [1]. It has evolved very
much since v1 to create, consolidate and generalize trusted keys
subsystem.
This framework has been tested with trusted keys support provided via TEE
but I wasn't able to test it with a TPM device as I don't possess one. It
w
Move tpm_buf code to common include/linux/tpm.h header so that it can
be reused via other subsystems like trusted keys etc.
Also rename trusted keys TPM 1.x buffer implementation to tpm1_buf to
avoid any compilation errors.
Suggested-by: Jarkko Sakkinen
Signed-off-by: Sumit Garg
---
drivers/ch
Utilize common heap based tpm_buf code for TPM1.x trusted keys rather
than using stack based tpm1_buf code. Also, remove tpm1_buf code.
Suggested-by: Jarkko Sakkinen
Signed-off-by: Sumit Garg
---
include/keys/trusted.h | 37 +--
security/keys/trusted.c | 98
12 matches
Mail list logo