aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/mvebu
Commit message (Expand)AuthorAgeFilesLines
* kernel: bump 4.14 to 4.14.160Hauke Mehrtens2019-12-251-1/+1
* kernel: bump 4.14 to 4.14.158Koen Vandeputte2019-12-101-1/+1
* kernel: bump 4.14 to 4.14.154Koen Vandeputte2019-11-191-2/+2
* treewide: use new procd sysupgrade $UPGRADE_BACKUP variableRafał Miłecki2019-09-122-2/+2
* treewide: when copying a backup file always specify dest nameRafał Miłecki2019-09-122-2/+2
* treewide: don't hardcode "sysupgrade.tgz" file nameRafał Miłecki2019-09-123-7/+7
* mvebu: sysupgrade: don't use $ARGV in platform_check_image()Rafał Miłecki2019-09-071-1/+1
* treewide: sysupgrade: don't use $ARGV in platform_do_upgrade()Rafał Miłecki2019-09-071-3/+3
* treewide: sysupgrade: pass "save_partitions" option to the "sysupgrade" methodRafał Miłecki2019-09-041-1/+1
* mvebu: sysupgrade: drop platform_copy_config_sdcard() argumentRafał Miłecki2019-09-041-1/+1
* mvebu: sysupgrade: sdcard: fix platform_do_upgrade_sdcardKlaus Kudielka2019-08-171-18/+16
* mvebu: enable xHCI USB controller connected to PCIeTomasz Maciej Nowak2019-08-171-0/+1
* kernel: bump 4.14 to 4.14.138Koen Vandeputte2019-08-142-3/+3
* kernel: bump 4.14 to 4.14.136Koen Vandeputte2019-08-064-48/+9
* mvebu: Fix platform.sh for non-generic espressobin versionsBrett Mastbergen2019-06-281-2/+4
* mvebu: fix regression for non-generic ESPRESSObin versionsVladimir Vid2019-06-282-2/+6
* mvebu: image: fix generic-arm64.bootscript mmc selectionVladimir Vid2019-06-281-2/+8
* mvebu: fixes commit 4089df4f4b0dGeorge Amanakis2019-06-171-1/+1
* kernel: bump 4.14 to 4.14.125 (FS#2305 FS#2297)Koen Vandeputte2019-06-126-24/+25
* kernel: bump 4.14 to 4.14.120Koen Vandeputte2019-05-211-2/+2
* mtd: base-files: Unify dual-firmware devices (Linksys)Jeff Kletsky2019-05-183-37/+54
* mvebu: add kmod-i2c-mux-pca954x for Turris OmniaJosef Schlehofer2019-05-151-1/+1
* mvebu: add images for additional ESPRESSObin boardsTomasz Maciej Nowak2019-05-118-1/+239
* mvebu: use device-tree board detectionTomasz Maciej Nowak2019-05-1117-179/+86
* mvebu: align device names to vendor_device formatTomasz Maciej Nowak2019-05-114-46/+51
* mvebu: image: don't create unnecessarily shell variablesTomasz Maciej Nowak2019-05-112-14/+8
* mvebu: image: improve readability of device recipesTomasz Maciej Nowak2019-05-112-41/+19
* mvebu: image: introduce BOOT_SCRIPT variableTomasz Maciej Nowak2019-05-117-57/+12
* mvebu: image: stack repeated variablesTomasz Maciej Nowak2019-05-113-25/+15
* mvebu: remove unnecessary code building dtbsTomasz Maciej Nowak2019-05-112-17/+3
* kernel: Remove CONFIG_COMPATHauke Mehrtens2019-05-112-2/+0
* kernel: Activate CONFIG_ARM64_SW_TTBR0_PANHauke Mehrtens2019-05-112-2/+0
* mvebu: fix board_name condition in 79_move_configKlaus Kudielka2019-05-111-1/+1
* kernel: bump 4.14 to 4.14.112Koen Vandeputte2019-04-221-2/+2
* mvebu: sysupgrade: sdcard: keep user added partitonsTomasz Maciej Nowak2019-04-065-11/+83
* mvebu: base-files: autodetect upgrade deviceTomasz Maciej Nowak2019-04-062-10/+18
* mvebu: shrink amount of packages and reorganize themTomasz Maciej Nowak2019-04-066-11/+15
* mvebu: use ext4 for clearfog image bootfsTomasz Maciej Nowak2019-04-061-2/+2
* mvebu: make bootfs size for sdcard image configurableTomasz Maciej Nowak2019-04-062-11/+7
* kernel: bump 4.14 to 4.14.108Koen Vandeputte2019-03-271-1/+1
* mvebu: Add dependency to kmod-i2c-mux-pca954x for armada-macchiatobinHauke Mehrtens2019-03-261-1/+1
* mvebu: Refresh kernel configurationHauke Mehrtens2019-03-263-12/+16
* mvebu: Fix typo in MACCHIATOBin detectionHauke Mehrtens2019-03-251-1/+1
* kernel: bump 4.14 to 4.14.106Koen Vandeputte2019-03-182-3/+3
* kernel: bump 4.14 to 4.14.104Koen Vandeputte2019-03-055-18/+18
* kernel: bump 4.14 to 4.14.98Koen Vandeputte2019-02-081-1/+1
* mvebu: backport upstream fixes for armada 37xxTomasz Maciej Nowak2019-01-273-0/+158
* mvebu: espressobin: correct spi node in dtsTomasz Maciej Nowak2019-01-272-8/+77
* mvebu: sort armada 37xx upstream patches chronologicallyTomasz Maciej Nowak2019-01-279-0/+0
* mvebu: move HARDEN_BRANCH_PREDICTOR to common configTomasz Maciej Nowak2019-01-274-3/+1
cryptography.hazmat.primitives.asymmetric.padding.MGF1` mask generation function it may also refer to the `MGF1` hash algorithm. :raises UnsupportedPadding: This is raised when the backend does not support the chosen padding. .. class:: RSAPublicKey(public_exponent, modulus) .. versionadded:: 0.2 An RSA public key is required for encryption and verification of messages. Normally you do not need to directly construct public keys because you'll be loading them from a file, generating them automatically or receiving them from a 3rd party. This class conforms to the :class:`~cryptography.hazmat.primitives.interfaces.RSAPublicKey` interface. :raises TypeError: This is raised when the arguments are not all integers. :raises ValueError: This is raised when the values of ``public_exponent`` or ``modulus`` do not match the bounds specified in :rfc:`3447`. .. method:: verifier(signature, padding, algorithm, backend) .. versionadded:: 0.3 Verify data was signed by the private key associated with this public key. .. doctest:: >>> from cryptography.hazmat.backends import default_backend >>> from cryptography.hazmat.primitives import hashes >>> from cryptography.hazmat.primitives.asymmetric import rsa, padding >>> private_key = rsa.RSAPrivateKey.generate( ... public_exponent=65537, ... key_size=2048, ... backend=default_backend() ... ) >>> signer = private_key.signer( ... padding.PSS( ... mgf=padding.MGF1( ... algorithm=hashes.SHA256(), ... salt_length=padding.MGF1.MAX_LENGTH ... ) ... ), ... hashes.SHA256(), ... default_backend() ... ) >>> data= b"this is some data I'd like to sign" >>> signer.update(data) >>> signature = signer.finalize() >>> public_key = private_key.public_key() >>> verifier = public_key.verifier( ... signature, ... padding.PSS( ... mgf=padding.MGF1( ... algorithm=hashes.SHA256(), ... salt_length=padding.MGF1.MAX_LENGTH ... ) ... ), ... hashes.SHA256(), ... default_backend() ... ) >>> verifier.update(data) >>> verifier.verify() :param bytes signature: The signature to verify. :param padding: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricPadding` provider. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :param backend: A :class:`~cryptography.hazmat.backends.interfaces.RSABackend` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricVerificationContext` :raises cryptography.exceptions.UnsupportedInterface: This is raised if the provided ``backend`` does not implement :class:`~cryptography.hazmat.backends.interfaces.RSABackend` :raises TypeError: This is raised when the padding is not an :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricPadding` provider. :raises UnsupportedHash: This is raised when the backend does not support the chosen hash algorithm. If the padding is :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` with the :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1` mask generation function it may also refer to the `MGF1` hash algorithm. :raises UnsupportedPadding: This is raised when the backend does not support the chosen padding. .. _`RSA`: https://en.wikipedia.org/wiki/RSA_(cryptosystem) .. _`public-key`: https://en.wikipedia.org/wiki/Public-key_cryptography .. _`use 65537`: http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html .. _`at least 2048`: http://www.ecrypt.eu.org/documents/D.SPA.20.pdf