On Tue, Aug 20, 2019 at 8:01 AM Pascal Van Leeuwen
wrote:
>
> > -Original Message-
> > From: linux-crypto-ow...@vger.kernel.org
> > On Behalf Of
> > Josh Boyer
> > Sent: Thursday, August 15, 2019 1:33 PM
> > To: Pascal van Leeuwen
> > Cc:
On Tue, Aug 6, 2019 at 8:54 AM Pascal van Leeuwen wrote:
>
> The following changes since commit dff98c6c57383fe343407bcb7b6e775e0b87274f:
>
> Merge branch 'master' of git://github.com/skeggsb/linux-firmware
> (2019-07-26 07:32:37 -0400)
>
> are available in the git repository at:
>
>
> https:/
On Fri, Nov 23, 2018 at 1:53 AM Nagadheeraj, Rottela
wrote:
>
> Firmware upgraded to v10
>
> Signed-off-by: Nagadheeraj Rottela
> ---
> WHENCE | 2 +-
> cavium/cnn55xx_se.fw | Bin 27698 -> 35010 bytes
> 2 files changed, 1 insertion(+), 1 deletion(-)
Applied and pushed out.
jos
On Wed, Oct 21, 2015 at 2:11 PM, Mimi Zohar wrote:
> On Wed, 2015-10-21 at 13:21 -0400, Josh Boyer wrote:
>> On Wed, Oct 21, 2015 at 1:02 PM, Mimi Zohar wrote:
>> > On Wed, 2015-10-21 at 16:13 +0100, David Howells wrote:
>> >> Here's a set of patches that ch
On Wed, Oct 21, 2015 at 1:02 PM, Mimi Zohar wrote:
> On Wed, 2015-10-21 at 16:13 +0100, David Howells wrote:
>> Here's a set of patches that changes how keys are determined to be trusted
>> - currently, that's a case of whether a key has KEY_FLAG_TRUSTED set upon
>> it. A keyring can then have a
On Fri, Dec 6, 2013 at 8:46 AM, Josh Boyer wrote:
> On Thu, Dec 5, 2013 at 10:47 AM, Tom Lendacky wrote:
>>
>> On Thursday, December 05, 2013 09:03:02 AM Josh Boyer wrote:
>>> Hi All,
>>>
>>> We've had a report [1] of the backtrace below on the
On Thu, Dec 5, 2013 at 10:47 AM, Tom Lendacky wrote:
>
> On Thursday, December 05, 2013 09:03:02 AM Josh Boyer wrote:
>> Hi All,
>>
>> We've had a report [1] of the backtrace below on the latest rawhide
>> kernel, which is essentially Linus' tree as
Hi All,
We've had a report [1] of the backtrace below on the latest rawhide
kernel, which is essentially Linus' tree as of yesterday. We aren't
carrying any patches to crypto at the moment. It's basically hitting
the second BUG_ON in the sg_page function:
static inline struct page *sg_page(stru
On Tue, Oct 02, 2012 at 12:58:03PM +0930, Rusty Russell wrote:
> Josh Boyer writes:
>
> > On Sat, Sep 29, 2012 at 08:13:25AM +0100, David Howells wrote:
> >> Rusty Russell wrote:
> >>
> >> > [2.808075] Loading module verification cert
On Sat, Sep 29, 2012 at 08:13:25AM +0100, David Howells wrote:
> Rusty Russell wrote:
>
> > [2.808075] Loading module verification certificates
> > [2.809331] X.509: Cert 6e03943da0f3b015ba6ed7f5e0cac4fe48680994 has
> > expired
> > [2.810500] MODSIGN: Problem loading in-kernel X.509
is to work when
> they are built-in, we need to use subsys_initcall in cryptd.
>
> Signed-off-by: Herbert Xu
Tested-by: Josh Boyer
> diff --git a/crypto/cryptd.c b/crypto/cryptd.c
> index e46d21a..671d4d6 100644
> --- a/crypto/cryptd.c
> +++ b/crypto/cryptd.
On Tue, Aug 16, 2011 at 08:32:27PM +0800, Herbert Xu wrote:
> On Mon, Aug 15, 2011 at 07:50:39AM -0400, Josh Boyer wrote:
> >
> > Well, yes, it does in this code:
> >
> > if (!((alg->cra_flags & CRYPTO_ALG_TYPE_MASK) ==
> > CRYPTO_ALG_TY
On Mon, Aug 15, 2011 at 03:15:28PM +0800, Herbert Xu wrote:
> On Thu, Aug 11, 2011 at 12:40:41PM -0400, Josh Boyer wrote:
> > The ablkcipher structure in ablk_ecb_alg is lacking an ivsize setting.
> > This causes the algorithm to fail it's self-test when it's registered
&
missing ivsize. Adding the ivsize
allows the self-test lookup to pass.
Signed-off-by: Josh Boyer
---
arch/x86/crypto/aesni-intel_glue.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/arch/x86/crypto/aesni-intel_glue.c
b/arch/x86/crypto/aesni-intel_glue.c
index feee8ff.
> Fedora has had a bug[1] open for a while with people seeing this upon boot:
> [0.807387] alg: skcipher: Failed to load transform for ecb-aes-aesni: -2
> We're still seeing it with the 3.0 kernel, so I poked at it today.
> So it seems that the aesni module is trying to register the ecb(ae
Fedora has had a bug[1] open for a while with people seeing this upon boot:
[0.807387] alg: skcipher: Failed to load transform for ecb-aes-aesni: -2
We're still seeing it with the 3.0 kernel, so I poked at it today.
We have the crypto manager built in to the kernel, as well as the
AES_NI_INT
.
Perform a read/modify/write to enable the 3DES function instead.
Signed-off-by: Josh Boyer
---
diff --git a/drivers/crypto/amcc/crypto4xx_core.c
b/drivers/crypto/amcc/crypto4xx_core.c
index 1891252..1d103f9 100644
--- a/drivers/crypto/amcc/crypto4xx_core.c
+++ b/drivers/crypto/amcc
On Wed, 12 Nov 2008 18:33:59 -0600
Kim Phillips <[EMAIL PROTECTED]> wrote:
> On Fri, 07 Nov 2008 14:30:47 -0800
> James Hsiao <[EMAIL PROTECTED]> wrote:
> > + * Changes:
> > + * James Hsiao:10/04/08
> > + * replace global variable lsec_core with data in
> > + *
18 matches
Mail list logo