lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 Mar 2020 19:59:53 +0200 From: Horia Geantă <horia.geanta@....com> To: Andrey Smirnov <andrew.smirnov@...il.com>, "linux-crypto@...r.kernel.org" <linux-crypto@...r.kernel.org> Cc: Andrei Botila <andrei.botila@....com>, Chris Healy <cphealy@...il.com>, Lucas Stach <l.stach@...gutronix.de>, Herbert Xu <herbert@...dor.apana.org.au>, Iuliana Prodan <iuliana.prodan@....com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, dl-linux-imx <linux-imx@....com> Subject: Re: [PATCH v8 7/8] crypto: caam - enable prediction resistance in HRWNG On 3/16/2020 5:01 PM, Andrey Smirnov wrote: > @@ -564,6 +579,26 @@ static void caam_remove_debugfs(void *root) > } > #endif > > +#ifdef CONFIG_FSL_MC_BUS > +static bool check_version(struct fsl_mc_version *mc_version, u32 major, > + u32 minor, u32 revision) > +{ > + if (mc_version->major > major) > + return true; > + > + if (mc_version->major == major) { > + if (mc_version->minor > minor) > + return true; > + > + if (mc_version->minor == minor && mc_version->revision > 0) > + return true; > + } > + > + return false; > +} > +#endif > + > + Nitpick - checkpatch complains here: CHECK: Please don't use multiple blank lines Horia
Powered by blists - more mailing lists