On Fri, 5 Aug 2016, Stephan Mueller wrote:
Am Donnerstag, 4. August 2016, 13:41:58 CEST schrieb Mat Martineau:
Hi Mat,
+
+long keyctl_dh_compute(struct keyctl_dh_params __user *params,
+ char __user *buffer, size_t buflen,
+ struct keyctl_kdf_params
Ce message vous a été envoyé parce que "lujiatong " pense
que vous trouverez la page "Sondage" www.hopital.fr intéressante.
Lien vers la page:
http://www.hopital.fr/Media/Sondage/Sondage3
Commentaire par "lujiatong ":
Hi Ted, Herbert,
I sent a question to the ATH9K RNG some time ago to the developers.
See https://www.mail-archive.com/linux-crypto@vger.kernel.org/msg19115.html
I have not yet received a word and I think this issue should be resolved.
Thanks
Stephan
---8<---
The ATH9K driver implements an RNG
From: Govindraj Raja
Current img hash claims sys and periph gate clocks
and this can be gated in system suspend scenarios.
Add support for Device pm ops for img hash to gate
the clocks claimed by img hash.
Signed-off-by: Govindraj Raja
Sporadic null pointer exceptions came from here. Fix them.
Signed-off-by: Will Thomas
Reviewed-by: James Hartley
---
drivers/crypto/img-hash.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/crypto/img-hash.c
Properly allocate enough memory to respect the fallback.
Signed-off-by: Will Thomas
---
drivers/crypto/img-hash.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/img-hash.c b/drivers/crypto/img-hash.c
index 60410d7..a2e77b8 100644
---
Move 0 length buffer to end of structure to stop overwriting
fallback request data. This doesn't cause a bug itself as the
buffer is never used alongside the fallback but should be
changed.
Signed-off-by: Will Thomas
Reviewed-by: James Hartley
Hi Herbert,
This patchset includes small stability fixes, power management
and import/export interface functions for the img-hash driver.
Changes as discussed for [1/7], [2/7] and [5/7].
Govindraj Raja (1):
crypto: img-hash - Add suspend resume hooks for img hash
James Hartley (2):
From: James Hartley
Currently the img-hash accelerator does not probe
successfully due to a change in the checks made during
registration with the crypto framework. This is due to
import and export functions not being defined. Correct
this.
Signed-off-by: James Hartley
Burst length of 16 drives the hash accelerator out of spec
and causes stability issues in some cases. Reduce this to
stop data being lost.
Signed-off-by: Will Thomas
Reviewed-by: James Hartley
---
drivers/crypto/img-hash.c | 3 ++-
1 file
From: James Hartley
Currently the probe function only emits an output on success
when debug is specifically enabled. It would be more useful
if this happens by default.
Signed-off-by: James Hartley
Reviewed-by: Will Thomas
Am Donnerstag, 4. August 2016, 13:41:58 CEST schrieb Mat Martineau:
Hi Mat,
> > +
> > +long keyctl_dh_compute(struct keyctl_dh_params __user *params,
> > + char __user *buffer, size_t buflen,
> > + struct keyctl_kdf_params __user *kdf)
> > +{
> > + struct
Anton Blanchard writes:
> Hi Michael,
>
>> Is VEC_CRYPTO the right feature?
>>
>> That's new power8 crypto stuff.
>
> The vpmsum* instructions are part of the same pipeline as the vcipher*
> instructions, introduced in POWER8.
OK.
>> I thought this only used VMX? (but I
Ce message vous a été envoyé parce que "baliaoyu
" pense que vous trouverez la page "Sondage"
www.hopital.fr intéressante.
Lien vers la page:
http://www.hopital.fr/Media/Sondage/Sondage3
Commentaire par "baliaoyu ":
Am Donnerstag, 4. August 2016, 13:41:58 CEST schrieb Mat Martineau:
Hi Mat,
I will take care of your comments in the next iteration.
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info
Am Donnerstag, 4. August 2016, 13:57:27 CEST schrieb Mat Martineau:
Hi Mat,
> Stephan,
>
> On Thu, 4 Aug 2016, Stephan Mueller wrote:
> > Hi Mat, David,
> >
> > this patch covers all comments you raised. I also added a man page
> > for the new API calls.
> >
> > ---8<---
> >
> > Add the
16 matches
Mail list logo