> -Original Message-
> From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto-
> ow...@vger.kernel.org] On Behalf Of Stephan Mueller
> Sent: Tuesday, April 12, 2016 2:21 PM
> To: Benedetto, Salvatore
> Cc: herb...@gondor.apana.org.au; linux-crypto@vger.kernel.org
> Subject: Re: [PAT
Am Mittwoch, 13. April 2016, 09:07:38 schrieb Benedetto, Salvatore:
Hi Salvatore,
>
> I don't see any particular benefit in replacing this check with a lower
> boundary check only. Values other than those listed are very unlikely.
> Anyway, if you feel so strong about it and other people think th
Document the devicetree bindings for the random number generator found
on Hisilicon Hip04 and Hip05 soc.
Signed-off-by: Kefeng Wang
---
Documentation/devicetree/bindings/rng/hisi-rng.txt | 12
1 file changed, 12 insertions(+)
create mode 100644 Documentation/devicetree/bindings/rng
Changes since v3:
- Compatible name "hisilicon,hip04-rng" and "hisilicon,hip05-rng" are used,
suggested by Robe Herring
- Add reviewed-by from Mathieu Poirier
Changes since v2:
- Remove unused RNG_RELOAD_ERR.
- Add comment of seed choice in hisi_rng_init
- Add head inculde linux/random.h for ge
This adds the Hisilicon Random Number Generator(RNG) support,
which is found in Hip04 and Hip05 soc.
Reviewed-by: Mathieu Poirier
Signed-off-by: Kefeng Wang
---
drivers/char/hw_random/Kconfig| 13
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/hisi-rng.c | 126 +
Hi James, Herbert,
Since the actual crypto bits (RSA) have been extracted from the asymmetric
keys code and moved to base crypto, shall I move the asymmetric_keys/ subdir
over to security/keys/?
If so, how best to do it? I'm thinking that it might be best for me to create
a git branch that effec
Prevent information from leaking to userspace by doing a memset to 0 of
the export state structure before setting the structure values and copying
it. This prevents un-initialized padding areas from being copied into the
export area.
Cc: # 3.14.x-
Reported-by: Ben Hutchings
Signed-off-by: Tom Le
On Tue, 2016-04-12 at 09:45 +, Xiaodong Liu wrote:
> In sha_complete_job, incorrect mcryptd_hash_request_ctx pointer is
> used
> when check and complete other jobs. If the memory of first completed
> req
> is freed, while still completing other jobs in the func, kernel will
> crash since NULL p
Hi Fridolin,
On 04/12/2016 04:13 AM, Fridolin Pokorny wrote:
> we were experimenting with this. We have a prove of concept of a kernel
> TLS type socket, so called AF_KTLS, which is based on Dave Watson's
> RFC5288 patch. It handles both TLS and DTLS, unfortunately it is not
> ready now to be propo
From: Zhaoxiu Zeng
Signed-off-by: Zhaoxiu Zeng
---
drivers/crypto/qat/qat_common/qat_hal.c | 32 ++--
1 file changed, 10 insertions(+), 22 deletions(-)
diff --git a/drivers/crypto/qat/qat_common/qat_hal.c
b/drivers/crypto/qat/qat_common/qat_hal.c
index 1e480f1..318
From: Zhaoxiu Zeng
When I do "grep parity -r linux", I found many parity calculations
distributed in many drivers.
This patch series does:
1. provide generic and architecture-specific parity calculations
2. remove drivers' local parity calculations, use bitops' parity
functions instead
Hi Linus:
This push fixes an NFS regression caused by the skcipher/hash
conversion in sunrpc. It also fixes a build problem in certain
configurations with bcm63xx.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Herbert Xu (1):
sunrpc: Fix sk
On Thu, Apr 14, 2016 at 12:46 AM, Tadeusz Struk wrote:
> Hi Fridolin,
> On 04/12/2016 04:13 AM, Fridolin Pokorny wrote:
>> we were experimenting with this. We have a prove of concept of a kernel
>> TLS type socket, so called AF_KTLS, which is based on Dave Watson's
>> RFC5288 patch. It handles bot
13 matches
Mail list logo