next-20160303
for you to fetch changes up to 4e8ae72a75aae285ec5b93518b9680da198afd0d:
X.509: Make algo identifiers text instead of enum (2016-03-03 21:49:27 +)
Keyrings changes for
On Mon, Feb 29, 2016 at 04:52:34PM +0100, Steffen Trumtrar wrote:
> Add binding documentation for the Freescale RNGC found on
> some i.MX2/3/5 SoCs.
>
> Signed-off-by: Steffen Trumtrar
> ---
> Documentation/devicetree/bindings/rng/mxc_rngc.txt | 16
>
On Fri, 4 Mar 2016, David Howells wrote:
> Hi James,
>
> Could you pull this into security/next, please?
>
Done.
--
James Morris
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More
Hi Robert,
On 4 March 2016 at 03:15, Robert Jarzmik wrote:
> Baolin Wang writes:
>
>> @@ -212,6 +212,37 @@ static inline void sg_unmark_end(struct scatterlist *sg)
>> }
>>
>> /**
>> + * sg_is_contiguous - Check if the scatterlists are contiguous
On Wed, Feb 24, 2016 at 09:37:39PM +, Mark McKinstry wrote:
> On 19/02/16 01:19, Steffen Klassert wrote:
> > On Thu, Feb 18, 2016 at 01:40:00AM +, Mark McKinstry wrote:
> >> This patch fixes our issue, thanks. In our scenario the tunnel path MTU
> >> now gets updated so that subsequent
On Mon, Feb 29, 2016 at 09:32:08AM +, David Howells wrote:
> Herbert Xu wrote:
>
> > David Howells wrote:
> > >
> > > Here's a set of patches that change the software public key asymmetric key
> > > subtype to use the RSA pkcs1pad module in
Hi Salvatore,
> Implement Diffie-Hellman primitives required by the scheme under the
> akcipher API. Here is how it works.
> 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
> 2) Call set_priv_key() to set your own private key (xa) in raw format
> 3) Call decrypt() without
On Tue, Mar 01, 2016 at 10:54:50PM +0900, Joonsoo Kim wrote:
> 2016-03-01 3:04 GMT+09:00 Dan Williams :
> > On Mon, Feb 29, 2016 at 1:33 AM, Arnd Bergmann wrote:
> >> The addition of tracepoints to the page reference tracking had an
> >> unfortunate
Implement Diffie-Hellman primitives required by the scheme under the
akcipher API. Here is how it works.
1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
2) Call set_priv_key() to set your own private key (xa) in raw format
3) Call decrypt() without passing any data as input to
On 03/01/2016 01:49 PM, Gary R Hook wrote:
> Future hardware may introduce new algorithms wherein the
> driver will need to manage resources for different versions
> of the cryptographic coprocessor. This precursor patch
> determines the version of the available device, and marks
> and registers
On 03/01/2016 01:48 PM, Gary R Hook wrote:
> Each x86 SoC will make use of a unique PCI ID for the CCP
> device so it is not necessary to check for the CPU family
> and model.
>
> Signed-off-by: Gary R Hook
Acked-by: Tom Lendacky
> ---
>
Baolin Wang writes:
> @@ -212,6 +212,37 @@ static inline void sg_unmark_end(struct scatterlist *sg)
> }
>
> /**
> + * sg_is_contiguous - Check if the scatterlists are contiguous
> + * @sga: SG entry
> + * @sgb: SG entry
> + *
> + * Description:
> + * If the sga
12 matches
Mail list logo