Hi Greg,
On Sun, Jul 01, 2018 at 11:47:19AM +0200, Greg Kroah-Hartman wrote:
> On Sun, Jul 01, 2018 at 05:16:11PM +0800, Herbert Xu wrote:
> > On Thu, Jun 21, 2018 at 07:12:47AM +0900, Juan Manuel Torres Palma wrote:
> > > On Wed, Jun 20, 2018 at 11:10:51AM -0700, Eric Biggers wrote:
> > > > Also,
one who originally
requested this transitioning time,
Acked-by: Jason Cooper
For the series.
thx,
Jason.
> hwrng: omap - move clock related code to omap_rng_probe()
>
> drivers/char/hw_random/omap-rng.c | 36 +---
> 1 file changed, 25 insertions(+), 11 deletions(-)
For the whole series,
Acked-by: Jason Cooper
thx,
Jason.
On Sat, Aug 27, 2016 at 02:43:31PM +, Jason Cooper wrote:
> Hi Corentin,
>
> On Fri, Aug 26, 2016 at 01:11:34PM +0200, LABBE Corentin wrote:
> > Instead of having two global variable, it's better to use a
> > private struct. This will permit to remove amd_pdev varia
32/iowrite32
> hwrng: amd: Convert to new hwrng read() API
>
> drivers/char/hw_random/amd-rng.c | 150
> +--
> 1 file changed, 96 insertions(+), 54 deletions(-)
Once you've fixed up the casting in #6, you can add my
Reviewed-by: Jason C
Hi Corentin,
On Fri, Aug 26, 2016 at 01:11:34PM +0200, LABBE Corentin wrote:
> Instead of having two global variable, it's better to use a
> private struct. This will permit to remove amd_pdev variable
>
> Signed-off-by: LABBE Corentin
> ---
> drivers/char/hw_random/amd-rng.c | 57
> ++
Hi Corentin,
On Fri, Aug 26, 2016 at 10:38:02AM +0200, LABBE Corentin wrote:
> On Thu, Aug 25, 2016 at 02:56:38PM +0000, Jason Cooper wrote:
> > On Thu, Aug 25, 2016 at 02:16:35PM +0200, LABBE Corentin wrote:
> > > This patch convert the hwrng interface used by amd768-rng to it
Hi Corentin,
On Thu, Aug 25, 2016 at 02:16:35PM +0200, LABBE Corentin wrote:
> This patch convert the hwrng interface used by amd768-rng to its new API
> by replacing data_read()/data_present() by read().
>
> Furthermore, Instead of having two global variable, it's better to use a
> private struc
Hey Ted,
On Wed, Aug 10, 2016 at 07:44:25PM -0400, Theodore Ts'o wrote:
> On Tue, Aug 09, 2016 at 02:04:44PM +0000, Jason Cooper wrote:
> > iiuc, Ted, you're saying using the hw_random framework would be
> > disasterous because despite most drivers having a default quali
On Thu, Aug 11, 2016 at 10:54:11AM +0800, miaoq...@codeaurora.org wrote:
> On 2016-08-10 21:24, Jason Cooper wrote:
> >The fact is, barring userspace expectations of /dev/hwrng, hw_random is
> >the appropriate place for it. It's not a devicetree blob, mac address,
> >o
Hi Miaoqing Pan, Stephen,
*gentle reminder: others are reading which may not be directly included
in the conversation. Including the archives. Please avoid top posting.
:)
On Wed, Aug 10, 2016 at 07:43:45AM +, Pan, Miaoqing wrote:
> The problem with using the add_device_randomness is that w
Hi Keith,
On Tue, Aug 09, 2016 at 10:58:05AM -0700, Keith Packard wrote:
> Jason Cooper writes:
> > Perhaps a /dev/hwrng[0-9] per rng? That would lend itself nicely to a
> > sysfs interface for per device quality, rate, and enabled attributes.
> > e.g. /sys/class/hw_
Hi Henrique,
On Tue, Aug 09, 2016 at 07:24:58AM -0300, Henrique de Moraes Holschuh wrote:
> On Tue, 09 Aug 2016, Stephan Mueller wrote:
> > RHEL 7 and Fedora do not adjust it. So, shall we consider those rng-tools
> > then
> > broken (at least in those large distros)?
>
> Might I humbly suggest
mbedded systems.
>
> Signed-off-by: Miaoqing Pan
Until we get the hw_random/get_device_randomness question sorted...
Reviewed-by: Jason Cooper
thx,
Jason.
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.ke
Hi Keith, Herbert,
On Tue, Aug 09, 2016 at 05:50:58PM +0800, Herbert Xu wrote:
> On Mon, Jul 25, 2016 at 01:07:35PM -0700, Keith Packard wrote:
> > Instead of having only one hwrng feeding /dev/random at a time, maintain
> > a list of devices and cycle between them when filling the entropy pool.
>
Hi Ted,
On Tue, Aug 09, 2016 at 07:56:22AM -0400, Theodore Ts'o wrote:
> On Tue, Aug 09, 2016 at 06:30:03AM +, Pan, Miaoqing wrote:
> > Agree with Jason's point, also understand Stephan's concern. The
> > date rate can be roughly estimated by 'cat /dev/random |rngtest -c
> > 1000', the averag
Hi Stephan,
On Mon, Aug 08, 2016 at 05:29:30PM +, Jason Cooper wrote:
> On Mon, Aug 08, 2016 at 08:41:36AM +0200, Stephan Mueller wrote:
...
> > If you think that this patch is a challenge because your driver starts to
> > spin, please help and offer another solution.
>
&
Hi Stephan, Miaoqing Pan,
On Mon, Aug 08, 2016 at 08:41:36AM +0200, Stephan Mueller wrote:
> Am Montag, 8. August 2016, 02:03:36 CEST schrieb Pan, Miaoqing:
> > The entropy was evaluated by crypto expert, the analysis report show the
> > ADC with at least 10bits and up to 22 bits of min-entropy f
Hi Stephan,
On Sat, Aug 06, 2016 at 10:03:58PM +0200, Stephan Mueller wrote:
> Am Samstag, 6. August 2016, 19:45:51 CEST schrieb Jason Cooper:
> > On Fri, Aug 05, 2016 at 05:08:14PM +0200, Stephan Mueller wrote:
...
> > > diff --git a/drivers/net/wireless/ath/ath9k/rng.c
&
> -ATH9K_RNG_ENTROPY(bytes_read));
This is the only use of this macro. I'd remove the #define on line 25
as well.
> + add_hwgenerator_randomness((void *)rng_buf, bytes_read, 0);
> }
>
> kfree(rng_buf);
Oth
Hey Sandy,
I know we talked about this series offlist, but we need to fill in
folks who are seeing it for the first time. Usually, this is done with
a coverletter (--coverletter for git format-patch). No need to resend
before receiving feedback, but would you mind replying with a
description of
On Sat, Nov 07, 2015 at 09:30:36AM -0500, Sandy Harris wrote:
> Signed-off-by: Sandy Harris
> ---
> .gitignore | 3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/.gitignore b/.gitignore
> index fd3a355..dd80bfd 100644
> --- a/.gitignore
> +++ b/.gitignore
> @@ -112,3 +112,6 @@ all.confi
On Sat, Nov 07, 2015 at 09:30:38AM -0500, Sandy Harris wrote:
> Signed-off-by: Sandy Harris
> ---
> drivers/char/random.c | 50 ++
> 1 file changed, 46 insertions(+), 4 deletions(-)
>
> diff --git a/drivers/char/random.c b/drivers/char/random.c
> i
On Mon, Oct 19, 2015 at 04:25:07PM +0100, Russell King - ARM Linux wrote:
> On Mon, Oct 19, 2015 at 03:04:51PM +0000, Jason Cooper wrote:
> > Hey Russell,
> >
> > On Sun, Oct 18, 2015 at 05:23:40PM +0100, Russell King wrote:
> > > static int mv_cesa_ahash_
Hey Russell,
On Sun, Oct 18, 2015 at 05:23:40PM +0100, Russell King wrote:
> Rather than determining whether we're using a MD5 hash by looking at
> the digest size, switch to a cleaner solution using a per-request flag
> initialised by the method type.
>
> Signed-off-by: Russell King
> ---
> dr
On Tue, May 26, 2015 at 11:10:51AM +0200, Boris Brezillon wrote:
> On Tue, 26 May 2015 09:06:29 +
> Jason Cooper wrote:
>
> > On Mon, May 25, 2015 at 08:43:02PM +0200, Boris Brezillon wrote:
> > > Jason, Gregory,
> > >
> > > On Mon, 25 May 201
On Mon, May 25, 2015 at 08:43:02PM +0200, Boris Brezillon wrote:
> Jason, Gregory,
>
> On Mon, 25 May 2015 16:46:51 +0000
> Jason Cooper wrote:
>
> > On Mon, May 25, 2015 at 05:39:13PM +0200, Gregory CLEMENT wrote:
> > > Hi Boris, Arnaud,
> > >
> >
On Mon, May 25, 2015 at 05:39:13PM +0200, Gregory CLEMENT wrote:
> Hi Boris, Arnaud,
>
> On 22/05/2015 15:34, Boris Brezillon wrote:
> > From: Arnaud Ebalard
> >
> > Add crypto related nodes to kirkwood.dtsi.
>
> Here you use a new compatible string but with an old binding
> to let the user cho
+ Jason Gunthorpe, he may be interested in this.
On Fri, May 22, 2015 at 03:33:46PM +0200, Boris Brezillon wrote:
> Hello,
>
> This patch series adds a new driver supporting Marvell's CESA IP.
> This driver addresses some limitations of the existing one.
> From a performance and CPU load point of
Hey Boris,
On Fri, Apr 17, 2015 at 10:39:46AM +0200, Boris Brezillon wrote:
> On Fri, 17 Apr 2015 10:33:56 +0200 Boris Brezillon
> wrote:
> > On Mon, 13 Apr 2015 20:11:46 + Jason Cooper
> > wrote:
> > > >
> > > > > I'd appreciate if
Hey Arnaud,
On Mon, Apr 13, 2015 at 06:06:49PM +0200, Arnaud Ebalard wrote:
> Jason Cooper writes:
...
> >> >> I really tried to adapt the existing driver to add the missing
> >> >> features (especially the support for TDMA), but all my attempts
> >>
Hey Gregory,
On Mon, Apr 13, 2015 at 11:39:16AM +0200, Gregory CLEMENT wrote:
> Hi Jason, Boris,
>
> On 11/04/2015 00:30, Jason Cooper wrote:
> > Hey Boris,
> >
> > On Fri, Apr 10, 2015 at 05:11:48PM +0200, Boris Brezillon wrote:
> >> On Fri, 10 Apr 2015 13:5
Hey Boris,
On Fri, Apr 10, 2015 at 05:11:48PM +0200, Boris Brezillon wrote:
> On Fri, 10 Apr 2015 13:50:56 +0000 Jason Cooper wrote:
> > On Thu, Apr 09, 2015 at 04:58:41PM +0200, Boris Brezillon wrote:
> > > I know we usually try to adapt existing drivers instead of replacing
On Fri, Dec 05, 2014 at 02:44:54PM +0900, Joshua I. James wrote:
> From: "Joshua I. James"
>
> Fixed style error identified by checkpatch.
>
> WARNING: Missing a blank line after declarations
> + unsigned int unaligned = alignmask + 1 - (offset & alignmask);
> + if (n
On Fri, Dec 05, 2014 at 02:38:40PM +0900, Joshua I. James wrote:
> From: "Joshua I. James"
>
> Fixed style error identified by checkpatch.
>
> ERROR: space required before the open parenthesis '('
> + switch(cmsg->cmsg_type) {
>
> Signed-off-by: Joshua I. James
> ---
> crypto/af
Joshua,
On Fri, Dec 05, 2014 at 02:24:44PM +0900, Joshua I. James wrote:
> From: "Joshua I. James"
>
> Fixed style error identified by checkpatch.
>
> ERROR: do not use assignment in if condition
> + if ((err = crypto_register_instance(tmpl, inst))) {
Short comment needed here like I men
Joshua,
Your subject, "[PATCH] staging: crypto: fixed style errors in
ablkcipher.c" is misleading. 'staging' is a location in the tree,
drivers/staging/, not a separate git tree. So your subject for this
series should have been "[PATCH] crypto: ablkcipher: Cleanup minor
checkpatch error." More
has everything
> > together in one place?
>
> How do you suggest that is done? The API comments in the header file follow
> the Doxygen style. Note, Jason Cooper raised the concern that an API
> documentation separate from the code will surely deviate from the code
> relatively
On Thu, Oct 16, 2014 at 06:50:58PM +0200, Stephan Mueller wrote:
> Am Donnerstag, 16. Oktober 2014, 11:06:05 schrieb Jason Cooper:
>
> Hi Jason,
>
> > On Thu, Oct 16, 2014 at 09:25:01AM -0400, Jason Cooper wrote:
> > > + Grant, Geert,
> > >
> > > St
On Thu, Oct 16, 2014 at 09:25:01AM -0400, Jason Cooper wrote:
> + Grant, Geert,
>
> Stephan has created some great example code for both the kernel crypto
> API and the userspace crypto API. As examples tend to bitrot, I was
> wondering if the code could serve as test code. Then
On Thu, Oct 16, 2014 at 09:25:01AM -0400, Jason Cooper wrote:
> + Grant, Geert,
oops. It helps if I actually *add* them. Sorry for the noise.
> Stephan has created some great example code for both the kernel crypto
> API and the userspace crypto API. As examples tend to bitr
implementation.
Original patch is here:
https://lkml.kernel.org/r/7502136.9bkwhtz...@myon.chronox.de
On Thu, Oct 16, 2014 at 09:19:08AM +0200, Stephan Mueller wrote:
> Am Mittwoch, 15. Oktober 2014, 13:58:00 schrieb Jason Cooper:
>
> Hi Jason,
>
> > Stephan,
> >
Stephan,
Wow. This is very thorough. Herbert and others will be making the
final call on this, but if I may make a suggestion:
On Tue, Oct 14, 2014 at 09:46:50PM +0200, Stephan Mueller wrote:
> The update adds a complete interface documentation of the kernel crypto
> API. All cipher types suppo
On Mon, Oct 06, 2014 at 01:59:06PM -0400, Sandy Harris wrote:
> On Mon, Oct 6, 2014 at 1:44 PM, Jason Cooper wrote:
>
> > On Sat, Oct 04, 2014 at 11:09:40PM -0400, Sandy Harris wrote:
> >> There was recently a patch to the random driver to replace memset()
> >
On Sat, Oct 04, 2014 at 11:09:40PM -0400, Sandy Harris wrote:
> There was recently a patch to the random driver to replace memset()
> because, according to the submitter, gcc sometimes optimises memset()
> away which might leave data unnecessarily exposed. The solution
> suggested was a function ca
Muran,
+ free-electron's, mvebu maintainers
On Mon, Jul 28, 2014 at 03:24:43PM +0200, Muran Hrun wrote:
> What is the status of DMA support for mv_cesa? I tried applying the patches at
> git://nwl.cc/~n0-1/linux.git (cesa-dma branch)
> on kernel 3.15.6 but the kernel just crashed on my DNS-320, w
x this in the Kconfig by depending on CRYPTO.
Reported-by: Fengguang Wu
Signed-off-by: Jason Cooper
---
drivers/staging/skein/Kconfig | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/skein/Kconfig b/drivers/staging/skein/Kconfig
index 8f5a72a90ced..b9172bfcdc1b
These are the minimum changes required to get the code to build
statically in the kernel. It's necessary to do this first so that we
can empirically determine that future cleanup patches aren't changing
the generated object code.
Signed-off-by: Jason Cooper
---
Changes since V2:
On Tue, Mar 18, 2014 at 02:28:20PM +, Greg KH wrote:
> On Tue, Mar 18, 2014 at 08:58:49AM -0400, Jason Cooper wrote:
> > On Mon, Mar 17, 2014 at 02:52:52PM -0700, Greg KH wrote:
> > > On Tue, Mar 11, 2014 at 09:32:35PM +, Jason Cooper wrote:
> > > > These ar
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/brg_endian.h | 148 -
drivers/staging/skein/include/brg_types.h | 131 -
drivers/staging/skein/include/skein_port.h | 6 +-
3 files changed, 2 insertions(+), 283 deletions
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 58 ++--
drivers/staging/skein/include/skeinApi.h | 32 +++
drivers/staging/skein/include/threefishApi.h | 32 +++
drivers/staging/skein/skein.c| 42
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 73 ++---
drivers/staging/skein/include/skeinApi.h | 4 +-
drivers/staging/skein/include/skein_iv.h | 26
drivers/staging/skein/include/threefishApi.h | 6 +-
drivers/staging/skein
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 9 +++--
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 780b4936f783..6e0f4a21aae3 100644
--- a/drivers/staging/skein
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 11 ---
drivers/staging/skein/include/skeinApi.h | 9 -
drivers/staging/skein/include/threefishApi.h | 9 -
3 files changed, 29 deletions(-)
diff --git a/drivers/staging/skein/include
n particular, I really don't like the
adhoc macro definitions, nor the camelCase.
The plan is to get skein and threefish registered into the crypto API, build as
modules, and then move it to crypto/.
thx,
Jason.
Jason Cooper (21):
staging: crypto: skein: import code from Skein3Fish.gi
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 30 -
drivers/staging/skein/include/skein_iv.h | 65 --
drivers/staging/skein/skein.c| 111 ++-
3 files changed, 74 insertions(+), 132 deletions(-)
diff
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skeinApi.h | 8
drivers/staging/skein/include/threefishApi.h | 22 +++---
drivers/staging/skein/skeinApi.c | 22 +++---
drivers/staging/skein/threefish1024Block.c | 18
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 16 +-
drivers/staging/skein/include/skeinApi.h | 44 ++--
drivers/staging/skein/include/threefishApi.h | 40 -
drivers/staging/skein/skeinBlockNo3F.c
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h | 14 +++-
drivers/staging/skein/include/skein_port.h | 108 -
drivers/staging/skein/skein.c | 21 --
3 files changed, 13 insertions(+), 130 deletions(-)
delete mode 100644
Signed-off-by: Jason Cooper
---
drivers/staging/skein/TODO | 11 +++
1 file changed, 11 insertions(+)
create mode 100644 drivers/staging/skein/TODO
diff --git a/drivers/staging/skein/TODO b/drivers/staging/skein/TODO
new file mode 100644
index ..f5c167a305ae
--- /dev/null
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 66 -
1 file changed, 51 insertions(+), 15 deletions(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 6e0f4a21aae3..707a21ae53c6 100644
--- a
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 707a21ae53c6..fd96ca0ad0ed 100644
--- a/drivers/staging/skein/skein_block.c
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skeinApi.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/skein/skeinApi.c b/drivers/staging/skein/skeinApi.c
index f0015d5b10f5..dd109bf6f7b9 100644
--- a/drivers/staging/skein/skeinApi.c
+++ b
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein_block.h | 22 ++
drivers/staging/skein/skein.c | 10 +-
2 files changed, 23 insertions(+), 9 deletions(-)
create mode 100644 drivers/staging/skein/include/skein_block.h
diff --git a
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 18 +-
drivers/staging/skein/include/skeinApi.h | 10 +-
drivers/staging/skein/include/threefishApi.h | 22 +++---
drivers/staging/skein/skeinApi.c | 18
These are the minimum changes required to get the code to build
statically in the kernel. It's necessary to do this first so that we
can empirically determine that future cleanup patches aren't changing
the generated object code.
Signed-off-by: Jason Cooper
---
Changes since RFC:
On Mon, Mar 17, 2014 at 02:52:52PM -0700, Greg KH wrote:
> On Tue, Mar 11, 2014 at 09:32:35PM +0000, Jason Cooper wrote:
> > These are the minimum changes required to get the code to build
> > statically in the kernel. It's necessary to do this first so that we
> > can
On Tue, Mar 11, 2014 at 09:32:32PM +, Jason Cooper wrote:
> To facilitate tinkering with this, One can pull from the following:
>
> git://git.infradead.org/users/jcooper/linux.git tags/staging-skein-3.14-rc1
>
> This is based on v3.14-rc1, and is prone to rebasing based on
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h | 14 +++-
drivers/staging/skein/include/skein_port.h | 108 -
drivers/staging/skein/skein.c | 21 --
3 files changed, 13 insertions(+), 130 deletions(-)
delete mode 100644
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 16 +-
drivers/staging/skein/include/skeinApi.h | 44 ++--
drivers/staging/skein/include/threefishApi.h | 40 -
drivers/staging/skein/skeinBlockNo3F.c
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein_block.h | 22 ++
drivers/staging/skein/skein.c | 10 +-
2 files changed, 23 insertions(+), 9 deletions(-)
create mode 100644 drivers/staging/skein/include/skein_block.h
diff --git a
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 707a21ae53c6..fd96ca0ad0ed 100644
--- a/drivers/staging/skein/skein_block.c
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skeinApi.h | 8
drivers/staging/skein/include/threefishApi.h | 22 +++---
drivers/staging/skein/skeinApi.c | 22 +++---
drivers/staging/skein/threefish1024Block.c | 18
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 11 ---
drivers/staging/skein/include/skeinApi.h | 9 -
drivers/staging/skein/include/threefishApi.h | 9 -
3 files changed, 29 deletions(-)
diff --git a/drivers/staging/skein/include
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 73 ++---
drivers/staging/skein/include/skeinApi.h | 4 +-
drivers/staging/skein/include/skein_iv.h | 26
drivers/staging/skein/include/threefishApi.h | 6 +-
drivers/staging/skein
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 58 ++--
drivers/staging/skein/include/skeinApi.h | 32 +++
drivers/staging/skein/include/threefishApi.h | 32 +++
drivers/staging/skein/skein.c| 42
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 66 -
1 file changed, 51 insertions(+), 15 deletions(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 6e0f4a21aae3..707a21ae53c6 100644
--- a
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 30 -
drivers/staging/skein/include/skein_iv.h | 65 --
drivers/staging/skein/skein.c| 111 ++-
3 files changed, 74 insertions(+), 132 deletions(-)
diff
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/skein.h| 18 +-
drivers/staging/skein/include/skeinApi.h | 10 +-
drivers/staging/skein/include/threefishApi.h | 22 +++---
drivers/staging/skein/skeinApi.c | 18
Signed-off-by: Jason Cooper
---
drivers/staging/skein/TODO | 11 +++
1 file changed, 11 insertions(+)
create mode 100644 drivers/staging/skein/TODO
diff --git a/drivers/staging/skein/TODO b/drivers/staging/skein/TODO
new file mode 100644
index ..f5c167a305ae
--- /dev/null
Signed-off-by: Jason Cooper
---
drivers/staging/skein/include/brg_endian.h | 148 -
drivers/staging/skein/include/brg_types.h | 131 -
drivers/staging/skein/include/skein_port.h | 6 +-
3 files changed, 2 insertions(+), 283 deletions
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skeinApi.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/skein/skeinApi.c b/drivers/staging/skein/skeinApi.c
index f0015d5b10f5..dd109bf6f7b9 100644
--- a/drivers/staging/skein/skeinApi.c
+++ b
Signed-off-by: Jason Cooper
---
drivers/staging/skein/skein_block.c | 9 +++--
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/drivers/staging/skein/skein_block.c
b/drivers/staging/skein/skein_block.c
index 780b4936f783..6e0f4a21aae3 100644
--- a/drivers/staging/skein
on v3.14-rc1, and is prone to rebasing based on comments.
thx,
Jason.
Jason Cooper (22):
scripts: objdiff: detect object code changes between two commits
staging: crypto: skein: import code from Skein3Fish.git
staging: crypto: skein: allow building statically
staging: crypto: skein: rem
values as diff(1).
This was written specifically to support adding the skein and threefish
cryto drivers to the staging tree. I needed a programmatic way to
confirm that commits changing >90% of the lines didn't inadvertently
change the code.
Signed-off-by: Jason Cooper
---
scripts
These are the minimum changes required to get the code to build
statically in the kernel. It's necessary to do this first so that we
can empirically determine that future cleanup patches aren't changing
the generated object code.
Signed-off-by: Jason Cooper
---
drivers/stagi
differences.
>
> Signed-off-by: Kees Cook
> ---
> drivers/char/hw_random/core.c |7 +++
> 1 file changed, 7 insertions(+)
fwiw,
Reviewed-by: Jason Cooper
thx,
Jason.
> diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
> index a0f77248
On Wed, Mar 05, 2014 at 06:52:27PM -0600, Matt Mackall wrote:
> On Wed, 2014-03-05 at 16:11 -0500, Jason Cooper wrote:
> > > In other words, if there are 4096 bits of "unknownness" in X to start
> > > with, and I can get those same 4096 bits of "unknownness&qu
Matt, Kees,
On Tue, Mar 04, 2014 at 04:39:57PM -0600, Matt Mackall wrote:
> On Tue, 2014-03-04 at 11:59 -0800, Kees Cook wrote:
> > On Tue, Mar 4, 2014 at 11:53 AM, Jason Cooper wrote:
> > > On Tue, Mar 04, 2014 at 11:01:49AM -0800, Kees Cook wrote:
> > >> On Tue,
On Tue, Mar 04, 2014 at 11:01:49AM -0800, Kees Cook wrote:
> On Tue, Mar 4, 2014 at 7:38 AM, Jason Cooper wrote:
> > Kees, Ted,
> >
> > On Mon, Mar 03, 2014 at 03:51:48PM -0800, Kees Cook wrote:
> >> When bringing a new RNG source online, it seems like it would make
Kees, Ted,
On Mon, Mar 03, 2014 at 03:51:48PM -0800, Kees Cook wrote:
> When bringing a new RNG source online, it seems like it would make sense
> to use some of its bytes to make the system entropy pool more random,
> as done with all sorts of other devices that contain per-device or
> per-boot d
On Mon, Sep 03, 2012 at 08:29:34PM +0200, Andrew Lunn wrote:
> Based on work by Michael Waller and Jason Cooper.
>
> Added support for getting the interrupt number and address of SRAM
> from DT.
>
> Signed-off-by: Andrew Lunn
Applied to:
git://git.infradead.org/users
On Mon, Sep 03, 2012 at 08:29:34PM +0200, Andrew Lunn wrote:
> Based on work by Michael Waller and Jason Cooper.
nit. "Michael Walle"
If nothing significant crops up in the next few days, I'll fix it when I
pull it in.
thx,
Jason.
--
To unsubscribe from this list: send the
_digest" [drivers/crypto/mv_cesa.ko] undefined!
> ERROR: "crypto_shash_setkey" [drivers/crypto/mv_cesa.ko] undefined!
> ERROR: "crypto_alloc_shash" [drivers/crypto/mv_cesa.ko] undefined!
> make[1]: *** [__modpost] Error 1
> make: *** [modules] Error 2
> make: *** Wait
On Fri, Mar 09, 2012 at 02:58:25PM -0500, Paul Gortmaker wrote:
> Commit 737b75872487f560397ba34846a19823b1addf88 (linux-next)
>
> "ARM: kirkwood: mv_cesa devicetree bindings"
>
> fails to compile as follows:
>
> CC drivers/crypto/mv_cesa.o
> drivers/crypto/mv_cesa.c:1139: error: impl
95 matches
Mail list logo