1. 10 10月, 2019 1 次提交
  2. 04 10月, 2019 7 次提交
  3. 13 9月, 2019 4 次提交
  4. 09 9月, 2019 1 次提交
  5. 05 9月, 2019 1 次提交
  6. 04 9月, 2019 1 次提交
  7. 30 8月, 2019 3 次提交
  8. 22 8月, 2019 7 次提交
  9. 20 8月, 2019 1 次提交
  10. 15 8月, 2019 8 次提交
  11. 09 8月, 2019 3 次提交
  12. 06 8月, 2019 1 次提交
    • T
      PKCS#7: Introduce pkcs7_get_digest() · e201af16
      Thiago Jung Bauermann 提交于
      IMA will need to access the digest of the PKCS7 message (as calculated by
      the kernel) before the signature is verified, so introduce
      pkcs7_get_digest() for that purpose.
      
      Also, modify pkcs7_digest() to detect when the digest was already
      calculated so that it doesn't have to do redundant work. Verifying that
      sinfo->sig->digest isn't NULL is sufficient because both places which
      allocate sinfo->sig (pkcs7_parse_message() and pkcs7_note_signed_info())
      use kzalloc() so sig->digest is always initialized to zero.
      Signed-off-by: NThiago Jung Bauermann <bauerman@linux.ibm.com>
      Reviewed-by: NMimi Zohar <zohar@linux.ibm.com>
      Cc: David Howells <dhowells@redhat.com>
      Cc: David Woodhouse <dwmw2@infradead.org>
      Cc: Herbert Xu <herbert@gondor.apana.org.au>
      Cc: "David S. Miller" <davem@davemloft.net>
      Signed-off-by: NMimi Zohar <zohar@linux.ibm.com>
      e201af16
  13. 02 8月, 2019 2 次提交
    • A
      crypto: jitterentropy - build without sanitizer · dec0fb39
      Arnd Bergmann 提交于
      Recent clang-9 snapshots double the kernel stack usage when building
      this file with -O0 -fsanitize=kernel-hwaddress, compared to clang-8
      and older snapshots, this changed between commits svn364966 and
      svn366056:
      
      crypto/jitterentropy.c:516:5: error: stack frame size of 2640 bytes in function 'jent_entropy_init' [-Werror,-Wframe-larger-than=]
      int jent_entropy_init(void)
          ^
      crypto/jitterentropy.c:185:14: error: stack frame size of 2224 bytes in function 'jent_lfsr_time' [-Werror,-Wframe-larger-than=]
      static __u64 jent_lfsr_time(struct rand_data *ec, __u64 time, __u64 loop_cnt)
                   ^
      
      I prepared a reduced test case in case any clang developers want to
      take a closer look, but from looking at the earlier output it seems
      that even with clang-8, something was very wrong here.
      
      Turn off any KASAN and UBSAN sanitizing for this file, as that likely
      clashes with -O0 anyway.  Turning off just KASAN avoids the warning
      already, but I suspect both of these have undesired side-effects
      for jitterentropy.
      
      Link: https://godbolt.org/z/fDcwZ5Signed-off-by: NArnd Bergmann <arnd@arndb.de>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      dec0fb39
    • H
      Revert "crypto: aegis128 - add support for SIMD acceleration" · c9f1fd4f
      Herbert Xu 提交于
      This reverts commit ecc8bc81
      ("crypto: aegis128 - provide a SIMD implementation based on NEON
      intrinsics") and commit 7cdc0ddb
      ("crypto: aegis128 - add support for SIMD acceleration").
      
      They cause compile errors on platforms other than ARM because
      the mechanism to selectively compile the SIMD code is broken.
      Repoted-by: NHeiko Carstens <heiko.carstens@de.ibm.com>
      Reported-by: NStephen Rothwell <sfr@canb.auug.org.au>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      c9f1fd4f