Re: [RFC PATCH 0/3] Make rfc3686 template work with asynchronous block ciphers

2013-01-07 Thread Steffen Klassert
On Fri, Dec 28, 2012 at 12:04:48PM +0200, Jussi Kivilinna wrote: > I'm not sure how this patchset should be dealt with (should 1st patch go > through different tree than 2nd and 3rd?), so therefore it's RFC. > > Second patch makes rfc3686 template work with asynchronous block ciphers and > third p

[PATCH] crypto: testmgr - add aead cbc aes hmac sha384 test vectors

2013-01-07 Thread Vakul Garg
Test vectors were generated starting from existing CBC(AES) test vectors (RFC3602, NIST SP800-38A) and adding HMAC(SHA384) computed with Crypto++ and double-checked with HashCalc. Signed-off-by: Vakul Garg --- crypto/testmgr.c | 12 ++ crypto/testmgr.h | 293 ++

Re: [PATCH 07/10] crypto: omap-aes - Add Device Tree Support

2013-01-07 Thread Mark A. Greer
On Fri, Dec 28, 2012 at 02:06:02AM -0800, Russ Dill wrote: > On Fri, Dec 21, 2012 at 10:04 AM, Mark A. Greer > wrote: > > From: "Mark A. Greer" > > > > Add Device Tree suport to the omap-aes crypto > > driver. Currently, only support for OMAP2 and > > OMAP3 is being added but support for OMAP4

Re: [RFC PATCH 0/3] Make rfc3686 template work with asynchronous block ciphers

2013-01-07 Thread Herbert Xu
On Mon, Jan 07, 2013 at 08:00:36AM +0100, Steffen Klassert wrote: > On Sat, Dec 29, 2012 at 11:08:12AM +1100, Herbert Xu wrote: > > On Fri, Dec 28, 2012 at 03:23:11PM -0800, David Miller wrote: > > > From: Herbert Xu > > > Date: Sat, 29 Dec 2012 09:42:49 +1100 > > > > > > > On Fri, Dec 28, 2012 a

[PATCH] crypto: caam - Fix missing init of '.type' in AEAD algos.

2013-01-07 Thread Vakul Garg
Following AEAD algo templates are updated for '.type' initialization. (a) authenc(hmac(sha224),cbc(aes)) (b) authenc(hmac(sha384),cbc(aes)) (c) authenc(hmac(sha224),cbc(des3_ede)) (d) authenc(hmac(sha384),cbc(des3_ede)) (e) authenc(hmac(sha224),cbc(des))

[PATCH 2/2] drivers/crypto/bfin_crc.c: reposition free_irq to avoid access to invalid data

2013-01-07 Thread Julia Lawall
From: Julia Lawall The data referenced by an interrupt handler should not be freed before the interrupt is ended. The handler is bfin_crypto_crc_handler. It may refer to crc->regs, which is released by the iounmap. Furthermore, the second argument to all calls to free_irq is incorrect. It sho