summaryrefslogtreecommitdiffstats
AgeCommit message (Expand)AuthorFilesLines
2019-04-18X.509: parse public key parameters from x509 for akcipherVitaly Chikunov8-29/+136
2019-04-18KEYS: do not kmemdup digest in {public,tpm}_key_verify_signatureVitaly Chikunov2-17/+2
2019-04-18crypto: akcipher - new verify API for public key algorithmsVitaly Chikunov5-91/+92
2019-04-18crypto: rsa - unimplement sign/verify for raw RSA backendsVitaly Chikunov5-117/+2
2019-04-18crypto: akcipher - default implementations for request callbacksVitaly Chikunov1-0/+14
2019-04-18crypto: ux500 - Forbid 2-key 3DES in FIPS modeHerbert Xu1-79/+7
2019-04-18crypto: talitos - Forbid 2-key 3DES in FIPS modeHerbert Xu1-13/+95
2019-04-18crypto: sun4i-ss - Forbid 2-key 3DES in FIPS modeHerbert Xu1-6/+5
2019-04-18crypto: stm32 - Forbid 2-key 3DES in FIPS modeHerbert Xu1-4/+11
2019-04-18crypto: rockchip - Forbid 2-key 3DES in FIPS modeHerbert Xu1-12/+24
2019-04-18crypto: qce - Forbid 2-key 3DES in FIPS modeHerbert Xu1-1/+21
2019-04-18crypto: picoxcell - Forbid 2-key 3DES in FIPS modeHerbert Xu1-7/+26
2019-04-18crypto: omap - Forbid 2-key 3DES in FIPS modeHerbert Xu1-5/+24
2019-04-18crypto: n2 - Forbid 2-key 3DES in FIPS modeHerbert Xu1-4/+9
2019-04-18crypto: marvell - Forbid 2-key 3DES in FIPS modeHerbert Xu1-6/+5
2019-04-18crypto: ixp4xx - Forbid 2-key 3DES in FIPS modeHerbert Xu1-9/+55
2019-04-18crypto: inside-secure - Forbid 2-key 3DES in FIPS modeHerbert Xu1-6/+5
2019-04-18crypto: hisilicon - Forbid 2-key 3DES in FIPS modeHerbert Xu1-8/+4
2019-04-18crypto: hifn_795x - Forbid 2-key 3DES in FIPS modeHerbert Xu1-4/+27
2019-04-18crypto: ccree - Forbid 2-key 3DES in FIPS modeHerbert Xu1-2/+35
2019-04-18crypto: ccp - Forbid 2-key 3DES in FIPS modeHerbert Xu1-17/+4
2019-04-18crypto: nitrox - Forbid 2-key 3DES in FIPS modeHerbert Xu1-6/+2
2019-04-18crypto: cavium - Forbid 2-key 3DES in FIPS modeHerbert Xu1-0/+18
2019-04-18crypto: caam - Forbid 2-key 3DES in FIPS modeHerbert Xu3-38/+151
2019-04-18crypto: bcm - Forbid 2-key 3DES in FIPS modeHerbert Xu1-10/+11
2019-04-18crypto: atmel - Forbid 2-key 3DES in FIPS modeHerbert Xu1-93/+10
2019-04-18crypto: sparc - Forbid 2-key 3DES in FIPS modeHerbert Xu1-7/+4
2019-04-18crypto: s390 - Forbid 2-key 3DES in FIPS modeHerbert Xu1-17/+4
2019-04-18crypto: des_generic - Forbid 2-key in 3DES and add helpersHerbert Xu2-7/+47
2019-04-18crypto: vmx - return correct error code on failed setkeyEric Biggers4-12/+16
2019-04-18crypto: arm64/aes-neonbs - don't access already-freed walk.ivEric Biggers1-0/+2
2019-04-18crypto: arm/aes-neonbs - don't access already-freed walk.ivEric Biggers1-0/+2
2019-04-18crypto: salsa20 - don't access already-freed walk.ivEric Biggers1-1/+1
2019-04-18crypto: lrw - don't access already-freed walk.ivEric Biggers1-1/+3
2019-04-18crypto: mxs-dcp - remove set but not used variable 'fini'YueHaibing1-9/+1
2019-04-18crypto: sahara - Convert IS_ENABLED uses to __is_definedJoe Perches1-3/+3
2019-04-18crypto: caam/jr - Remove extra memory barrier during job ring dequeueVakul Garg2-1/+9
2019-04-18crypto: ccp - Do not free psp_master when PLATFORM_INIT failsSingh, Brijesh1-1/+1
2019-04-18crypto: stm32/hash - Fix self test issue during exportLionel Debieve1-3/+1
2019-04-16crypto: mxc-scc - Remove broken driverHerbert Xu3-777/+0
2019-04-15hwrng: stm32 - set default random qualityLionel Debieve1-0/+1
2019-04-15hwrng: stm32 - fix unbalanced pm_runtime_enableLionel Debieve1-0/+8
2019-04-08crypto: testmgr - add panic_on_fail module parameterEric Biggers1-2/+6
2019-04-08crypto: arm64/cbcmac - handle empty messages in same way as templateEric Biggers1-1/+1
2019-04-08crypto: cts - don't support empty messagesEric Biggers1-7/+11
2019-04-08crypto: streebog - fix unaligned memory accessesEric Biggers2-13/+17
2019-04-08crypto: chacha20poly1305 - set cra_name correctlyEric Biggers1-2/+2
2019-04-08crypto: skcipher - don't WARN on unprocessed data after slow walk stepEric Biggers1-2/+7
2019-04-08crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()Eric Biggers1-8/+5
2019-04-08crypto: crct10dif-generic - fix use via crypto_shash_digest()Eric Biggers1-7/+4