Am Donnerstag, 4. Juni 2015, 00:01:21 schrieb Masanari Iida:
Hi Masanari,
This patch fix some typos found in crypto-API.xml.
It is because the file is generated from comments in sources,
so I had to fix typo in sources.
Signed-off-by: Masanari Iida standby2...@gmail.com
Acked-by: Stephan
Le 23/05/2015 16:35, Boris Brezillon a écrit :
Hi Corentin,
On Sat, 23 May 2015 15:12:23 +0200
Corentin LABBE clabbe.montj...@gmail.com wrote:
Le 17/05/2015 10:45, Boris Brezillon a écrit :
Hi Corentin,
I started to review this new version, and I still think there's
something wrong
Change the existing rsa and public key code to integrate it
with the new Public Key Encryption API.
Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com
---
crypto/asymmetric_keys/Kconfig|1
crypto/asymmetric_keys/Makefile |1
crypto/asymmetric_keys/pkcs7_parser.c
This patch set introduces a Public Key Encryption API.
What is proposed is a new crypto type called crypto_pkey_type
plus new struct pkey_alg and struct pkey_tfm together with number
of helper functions to register pkey type algorithms and allocate
tfm instances. This is to make it similar to how
Add Public Key Encryption API.
Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com
---
crypto/Kconfig |6 +
crypto/Makefile|1
crypto/akcipher.c | 100 +++
crypto/crypto_user.c | 23 +++
include/crypto/akcipher.h | 385
New test vectors for RSA algorithm.
Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com
---
crypto/testmgr.c | 151 ++
crypto/testmgr.h | 86 +++
2 files changed, 237 insertions(+)
diff --git a/crypto/testmgr.c
Am Mittwoch, 3. Juni 2015, 15:44:24 schrieb Tadeusz Struk:
Hi Tadeusz,
New test vectors for RSA algorithm.
Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com
---
crypto/testmgr.c | 151
++ crypto/testmgr.h |
86
Hi:
Currently we always use stdrng in interrupt context, which doesn't
work very well with DRBG which cannot be called there.
We could change DRBG but it really does a lot of work (e.g., a
reseed) in its generation function and doing it in interrupt context
would be bad.
In fact, the only
Just a reminder to folk who've done interesting things in Linux security
this year, the CFP for LSS 2015 is open until this Friday, 5th June.
See the following link for details:
http://kernsec.org/wiki/index.php/Linux_Security_Summit_2015
This is not just for kernel developers, or even
We currently do the IV seeding on the first givencrypt call in
order to conserve entropy. However, this does not work with
DRBG which cannot be called from interrupt context. In fact,
with DRBG we don't need to conserve entropy anyway. So this
patch moves the seeding into the init function.
As this is required by many IPsec algorithms, let's set the default
to m.
Signed-off-by: Herbert Xu herb...@gondor.apana.org.au
---
crypto/Kconfig |1 +
1 file changed, 1 insertion(+)
diff --git a/crypto/Kconfig b/crypto/Kconfig
index af011a9..c3b6a5b 100644
--- a/crypto/Kconfig
+++
This patch adds the stdrng module alias and increases the priority
to ensure that it is loaded in preference to other RNGs.
Signed-off-by: Herbert Xu herb...@gondor.apana.org.au
---
crypto/drbg.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/crypto/drbg.c
We currently do the IV seeding on the first givencrypt call in
order to conserve entropy. However, this does not work with
DRBG which cannot be called from interrupt context. In fact,
with DRBG we don't need to conserve entropy anyway. So this
patch moves the seeding into the init function.
We currently do the IV seeding on the first givencrypt call in
order to conserve entropy. However, this does not work with
DRBG which cannot be called from interrupt context. In fact,
with DRBG we don't need to conserve entropy anyway. So this
patch moves the seeding into the init function.
We currently do the IV seeding on the first givencrypt call in
order to conserve entropy. However, this does not work with
DRBG which cannot be called from interrupt context. In fact,
with DRBG we don't need to conserve entropy anyway. So this
patch moves the seeding into the init function.
This patch creates a new invisible Kconfig option CRYPTO_RNG_DEFAULT
that simply selects the DRBG. This new option is then selected
by the IV generators.
Signed-off-by: Herbert Xu herb...@gondor.apana.org.au
---
crypto/Kconfig | 15 ---
1 file changed, 8 insertions(+), 7
On Wed, Jun 03, 2015 at 08:59:13AM +0200, Stephan Mueller wrote:
Considering the patch 8/8 which removes krng, wouldn't it make sense to
remove
the following code from the DRBG:
/*
* If FIPS mode enabled, the selected DRBG shall have the
* highest cra_priority
Am Mittwoch, 3. Juni 2015, 14:49:28 schrieb Herbert Xu:
Hi Herbert,
This patch adds the stdrng module alias and increases the priority
to ensure that it is loaded in preference to other RNGs.
Signed-off-by: Herbert Xu herb...@gondor.apana.org.au
---
crypto/drbg.c |3 ++-
1 file changed, 2
Am Mittwoch, 3. Juni 2015, 15:01:39 schrieb Herbert Xu:
Hi Herbert,
You'd have to remove it from ansi_cprng first. Feel free to send
patches to do that.
Absolutely, my bad.
--
Ciao
Stephan
--
To unsubscribe from this list: send the line unsubscribe linux-crypto in
the body of a message to
On Wed, Jun 03, 2015 at 10:44:25AM +0800, Herbert Xu wrote:
On Mon, Jun 01, 2015 at 01:43:55PM +0200, Martin Willi wrote:
This is a first version of a patch series implementing the ChaCha20-Poly1305
AEAD construction defined in RFC7539. It is based on the current cryptodev
tree.
The
On Wed, Jun 3, 2015 at 1:08 AM, Herbert Xu herb...@gondor.apana.org.au wrote:
On Thu, May 28, 2015 at 04:21:31PM -0400, Dan Streetman wrote:
Change the nx-842 common driver to wait for loading of both platform
drivers, and fail loading if the platform driver pointer is not set.
Add an
This patch fix some spelling typo found in crypto-API.tmpl
Signed-off-by: Masanari Iida standby2...@gmail.com
---
Documentation/DocBook/crypto-API.tmpl | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/Documentation/DocBook/crypto-API.tmpl
On Wed, 2015-06-03 at 09:37 -0500, Suravee Suthikulanit wrote:
On 5/28/2015 9:38 PM, Mark Salter wrote:
On Wed, 2015-05-20 at 17:09 -0500, Suravee Suthikulpanit wrote:
Fromhttp://www.uefi.org/sites/default/files/resources/ACPI_6.0.pdf,
section 6.2.17 _CCA states that ARM platforms require
On Wed, Jun 03, 2015 at 03:02:13PM -0500, Jay Monkman wrote:
That would be one use, but a more likely use would be to prevent
access to the keys. A system could write keys to the key slots in
the bootloader or in a TrustZone secure world. Then those keys could
be used for crypto operations in
24 matches
Mail list logo