1. 09 11月, 2011 4 次提交
  2. 21 10月, 2011 2 次提交
  3. 04 5月, 2011 1 次提交
  4. 29 1月, 2011 2 次提交
    • J
      crypto: testmgr - mark ghash as fips_allowed · 18c0ebd2
      Jarod Wilson 提交于
      A self-test failure in fips mode means a panic. Well, gcm(aes)
      self-tests currently fail in fips mode, as gcm is dependent on ghash,
      which semi-recently got self-test vectors added, but wasn't marked as a
      fips_allowed algorithm. Because of gcm's dependence on what is now seen
      as a non-fips_allowed algorithm, its self-tests refuse to run.
      Previously, ghash got a pass in fips mode, due to the lack of any test
      vectors at all, and thus gcm self-tests were able to run. After this
      patch, a 'modprobe tcrypt mode=35' no longer panics in fips mode, and
      successful self-test of gcm(aes) is reported.
      Signed-off-by: NJarod Wilson <jarod@redhat.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      18c0ebd2
    • J
      crypto: testmgr - mark xts(aes) as fips_allowed · 2918aa8d
      Jarod Wilson 提交于
      We (Red Hat) are intending to include dm-crypt functionality, using
      xts(aes) for disk encryption, as part of an upcoming FIPS-140-2
      certification effort, and xts(aes) *is* on the list of possible
      mode/cipher combinations that can be certified. To make that possible, we
      need to mark xts(aes) as fips_allowed in the crypto subsystem.
      
      A 'modprobe tcrypt mode=10' in fips mode shows xts(aes) self-tests
      passing successfully after this change.
      Signed-off-by: NJarod Wilson <jarod@redhat.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      2918aa8d
  5. 13 11月, 2010 1 次提交
  6. 06 8月, 2010 1 次提交
  7. 03 6月, 2010 1 次提交
  8. 19 5月, 2010 1 次提交
  9. 23 12月, 2009 1 次提交
  10. 23 11月, 2009 1 次提交
  11. 27 10月, 2009 1 次提交
  12. 02 9月, 2009 1 次提交
  13. 02 7月, 2009 1 次提交
  14. 24 6月, 2009 1 次提交
  15. 02 6月, 2009 14 次提交
  16. 04 3月, 2009 2 次提交
  17. 25 12月, 2008 4 次提交
  18. 29 8月, 2008 1 次提交