On Thu, 10 Dec 2020 at 04:01, Ben Greear wrote:
>
> On 12/9/20 6:43 PM, Herbert Xu wrote:
> > On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote:
> >>
> >> One thing I realized just now is that in the current situation, all
> >> the synchronous skciphers already degrade like this.
> >>
On 12/9/20 1:51 AM, Ard Biesheuvel wrote:
> On Fri, 4 Dec 2020 at 22:30, Brijesh Singh wrote:
>> The SEV FW version >= 0.23 added a new command that can be used to query
>> the attestation report containing the SHA-256 digest of the guest memory
>> encrypted through the KVM_SEV_LAUNCH_UPDATE_{DA
On 12/9/20 6:43 PM, Herbert Xu wrote:
On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote:
One thing I realized just now is that in the current situation, all
the synchronous skciphers already degrade like this.
I.e., in Ben's case, without the special ccm implementation, ccm(aes)
w
On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote:
>
> One thing I realized just now is that in the current situation, all
> the synchronous skciphers already degrade like this.
>
> I.e., in Ben's case, without the special ccm implementation, ccm(aes)
> will resolve to ccm(ctr(aesni)
On Wed, 2 Dec 2020 at 00:12, Herbert Xu wrote:
>
> On Tue, Dec 01, 2020 at 11:27:52PM +0100, Ard Biesheuvel wrote:
> >
> > > The problem is that the degradation would come at the worst time,
> > > when the system is loaded. IOW when you get an interrupt during
> > > your TX path and get RX traffi
Since 5.10-rc1 i.MX is a devicetree-only platform and the existing
.id_table support in this driver was only useful for old non-devicetree
platforms.
Remove the unused .id_table support.
Signed-off-by: Fabio Estevam
---
drivers/crypto/sahara.c | 7 ---
1 file changed, 7 deletions(-)
diff -
On Wed, Dec 09, 2020 at 12:14:24 +, David Howells wrote:
> I've extended my collection of minor keyrings fixes for the next merge
> window. Anything else I should add (or anything I should drop)?
>
> The patches can be found on the following branch:
>
>
> https://git.kernel.org/pub/sc
Hi All,
I am trying to create NETLINK socket for type NETLINK_AUDIT. Bind fails with
error number 1. I have enabled capabilities CAP_NET_ADMIN, CAP_AUDIT_READ.
Can anyone please tell me what additional capabilities are needed?
Regards,
Jayalakshmi
Hi Phil,
On Tue, Dec 8, 2020 at 8:51 PM Phil Sutter wrote:
>
> Hi Eyal,
>
> On Tue, Dec 08, 2020 at 04:47:02PM +0200, Eyal Birger wrote:
> > On Mon, Dec 7, 2020 at 4:07 PM Phil Sutter wrote:
> > >
> > > With an IPsec tunnel without dedicated interface, netfilter sees locally
> > > generated pack
Hi Jarkko,
I've extended my collection of minor keyrings fixes for the next merge
window. Anything else I should add (or anything I should drop)?
The patches can be found on the following branch:
https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-fixes
From: Alex Shi
The function is a static function, so no needs add into kernel-doc. and
we could avoid warning:
crypto/asymmetric_keys/pkcs7_trust.c:25: warning: Function parameter or
member 'pkcs7' not described in 'pkcs7_validate_trust_one'
crypto/asymmetric_keys/pkcs7_trust.c:25: warning: Funct
Mickaël Salaün wrote:
> + cmd_check_blacklist_hashes = $(AWK) -f
> scripts/check-blacklist-hashes.awk $(2); touch $@
The script name needs prefixing with $(srctree)/ so that it can be used with
alternative build directories.
Note that doesn't apply to scripts/extract-cert in the same make
> >
> > Signed-off-by: Romain Perier
> > Signed-off-by: Allen Pais
> > ---
> > drivers/crypto/ccree/cc_fips.c| 6 +++---
> > drivers/crypto/ccree/cc_request_mgr.c | 12 ++--
> > 2 files changed, 9 insertions(+), 9 deletions(-)
> >
> > diff --git a/drivers/crypto/ccree/cc_fips.c
13 matches
Mail list logo