[PATCH 4/4] crypto: caamhash: replace kmalloc with kzalloc

2015-02-27 Thread yanjiang.jin
From: Yanjiang Jin This can make sure we get a clean memory, else system would report the below warning: caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has not allocated [device address=0xdeadbeefdeadbeef] [size=18446744073150512879 bytes] [ cut here ]

[PATCH 2/4] crypto: caam_rng: fix rng_unmap_ctx's DMA_UNMAP size problem

2015-02-27 Thread yanjiang.jin
From: Yanjiang Jin Fix rng_unmap_ctx's DMA_UNMAP size problem for caam_rng, else system would report the below calltrace during kexec boot: caam_jr ffe301000.jr: DMA-API: device driver frees DMA memory with different size [device address=0x7f080010] [map size=16 bytes] [unmap size=40 b

[PATCH 3/4] crypto: caamhash: add two missed dma_mapping_error

2015-02-27 Thread yanjiang.jin
From: Yanjiang Jin Add two missed dma_mapping_error() after dma_map_single(). Signed-off-by: Yanjiang Jin --- drivers/crypto/caam/caamhash.c | 8 1 file changed, 8 insertions(+) diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c index f347ab7..f6ad322 100644

[PATCH 1/4] crypto: caam: fix some compile warnings

2015-02-27 Thread yanjiang.jin
From: Yanjiang Jin This commit is to avoid the below warnings: drivers/crypto/caam/sg_sw_sec4.h:88:12: warning: 'dma_map_sg_chained' defined but not used [-Wunused-function] static int dma_map_sg_chained(struct device *dev, struct scatterlist *sg, ^ drivers/crypto/caam/sg_sw_sec4.h:

Re: [dm-crypt] cryptsetup problem on Raspberry Pi 2 w 512bit key-size (works on Raspberry Pi 1, x86_64, 256bit)

2015-02-27 Thread Milan Broz
On 02/24/2015 12:02 AM, Johannes Ernst wrote: > All in one place: > >> dd if=/dev/zero of=./test.img count=8 bs=1M > >> cryptsetup --hash sha512 --key-size 512 -v luksFormat ./test.img > Used password ‘asdf’ (no quotes) > >> cryptsetup open test.img test > Enter passphrase for test.img: > No ke

[PATCH RESEND 2/2] crypto: algif - change algif_skcipher to be asynchronous

2015-02-27 Thread Tadeusz Struk
The way the algif_skcipher works currently is that on sendmsg/sendpage it builds an sgl for the input data and then on read/recvmsg it sends the job for encryption putting the user to sleep till the data is processed. This way it can only handle one job at a given time. This patch changes it to be

[PATCH RESEND 0/2] crypto: algif - change algif_skcipher to be asynchronous

2015-02-27 Thread Tadeusz Struk
The way the algif_skcipher works currently is that on sendmsg/sendpage it builds an sgl for the input data and then on read/recvmsg it sends the job for encryption putting the user to sleep till the data is processed. This way it can only handle one job at a given time. To be able to fuly utilize t

[PATCH RESEND 1/2] crypto: af_alg - Allow to link sgl

2015-02-27 Thread Tadeusz Struk
Allow to link af_alg sgls. Signed-off-by: Tadeusz Struk --- crypto/af_alg.c | 18 +- include/crypto/if_alg.h |4 +++- 2 files changed, 16 insertions(+), 6 deletions(-) diff --git a/crypto/af_alg.c b/crypto/af_alg.c index 7f8b7edc..26089d1 100644 --- a/crypto/af_alg

[PATCH] crypto: Documentation - describe internal structure

2015-02-27 Thread Stephan Mueller
The kernel crypto API has many indirections which warrant a description as otherwise one can get easily lost. The description explains the layers of the kernel crypto API based on examples. Signed-off-by: Stephan Mueller --- Documentation/DocBook/crypto-API.tmpl | 264 +++

Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support

2015-02-27 Thread Stephan Mueller
Am Freitag, 27. Februar 2015, 10:34:37 schrieb Tadeusz Struk: Hi Tadeusz, > On 02/27/2015 02:26 AM, Stephan Mueller wrote: > This patch adds the AEAD support for AF_ALG. > > >> > The implementation is based on algif_skcipher, but contains heavy > >> > modifications to streaml

Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support

2015-02-27 Thread Tadeusz Struk
On 02/27/2015 02:26 AM, Stephan Mueller wrote: This patch adds the AEAD support for AF_ALG. >> > >> > The implementation is based on algif_skcipher, but contains heavy >> > modifications to streamline the interface for AEAD uses. >> > >> > To use AEAD, the user space

Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support

2015-02-27 Thread Tony Lindgren
* Pali Rohár [150227 08:05]: > On Friday 27 February 2015 16:43:20 Tony Lindgren wrote: > > * Pali Rohár [150226 05:54]: > > > Harmattan system on Nokia N9 and N950 devices uses omap > > > crypto support. Bootloader on those devices is known that > > > it enables HW crypto support. This patch jus

Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support

2015-02-27 Thread Tony Lindgren
* Pali Rohár [150226 05:54]: > Harmattan system on Nokia N9 and N950 devices uses omap crypto support. > Bootloader on those devices is known that it enables HW crypto support. > This patch just include omap36xx.dtsi directly, so aes and sham is enabled. Let's also remove omap36xx-hs.dtsi with th

Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support

2015-02-27 Thread Pali Rohár
On Friday 27 February 2015 16:43:20 Tony Lindgren wrote: > * Pali Rohár [150226 05:54]: > > Harmattan system on Nokia N9 and N950 devices uses omap > > crypto support. Bootloader on those devices is known that > > it enables HW crypto support. This patch just include > > omap36xx.dtsi directly, so

Re: [PATCH 2/2] crypto: talitos: Add AES-XTS Support

2015-02-27 Thread Horia Geantă
On 2/20/2015 7:00 PM, Martin Hicks wrote: > The newer talitos hardware has support for AES in XTS mode. > > Signed-off-by: Martin Hicks > --- checkpatch complains about formatting, please check. > drivers/crypto/talitos.c | 33 + > drivers/crypto/talitos.h |

Re: [PATCH 00/10] omap3 crypto fixes

2015-02-27 Thread Pali Rohár
On Thursday 26 February 2015 23:46:05 Aaro Koskinen wrote: > Hi, > > On Thu, Feb 26, 2015 at 02:49:50PM +0100, Pali Rohár wrote: > > This patch series fix crypto support for omap3 devices which > > use DT. > > > > It enables AES and SHAM on N9/N950 and SHAM on N900. AES is > > still disabled for

Re: [PATCH 2/5] crypto: talitos: Remove MD5_BLOCK_SIZE

2015-02-27 Thread Horia Geantă
On 2/20/2015 6:21 PM, Martin Hicks wrote: > This is properly defined in the md5 header file. > --- Signed-off-by tag is missing. -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.ker

Re: [PATCH] crypto: tcrypt speed: fix filter for aead algorithms

2015-02-27 Thread Cristian Stoica
Hi Herbert, On 02/27/2015 11:25 AM, Herbert Xu wrote: > On Tue, Feb 03, 2015 at 03:59:48PM +0200, Cristian Stoica wrote: >> test_aead_speed is written for sync algorithms without specifically [...] > Please fix it to test asynchronously instead. Thanks for review. I think that a fix for async ae

Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support

2015-02-27 Thread Stephan Mueller
Am Freitag, 27. Februar 2015, 22:49:44 schrieb Herbert Xu: Hi Herbert, >On Thu, Feb 05, 2015 at 04:10:58PM +0100, Stephan Mueller wrote: >> Am Donnerstag, 29. Januar 2015, 21:24:45 schrieb Stephan Mueller: >> >> Hi Herbert, >> >> > This patch adds the AEAD support for AF_ALG. >> > >> > The imp

Re: [PATCH] crypto: sha-mb: Fix big integer constant sparse warning

2015-02-27 Thread Herbert Xu
On Thu, Feb 05, 2015 at 10:29:35AM +, Lad Prabhakar wrote: > From: "Lad, Prabhakar" > > this patch fixes following sparse warning: > > sha1_mb_mgr_init_avx2.c:59:31: warning: constant 0xF76543210 is so big it is > long > > Signed-off-by: Lad, Prabhakar Applied. -- Email: Herbert Xu Hom

Re: [PATCH v1 0/5] crypto: ccp - CCP driver updates 2015-01-28

2015-02-27 Thread Herbert Xu
On Wed, Jan 28, 2015 at 04:41:10PM -0600, Tom Lendacky wrote: > The following series of patches includes functional updates to the > driver as well as some trivial changes. > > - Fix checks/warnings from checkpatch > - Update how the CCP is built (Kconfig and Makefile) > - Use dma_set_mask_and_coh

Re: [v2,1/3] crypto: ppc/sha256 - assembler

2015-02-27 Thread Herbert Xu
On Fri, Jan 30, 2015 at 03:39:23PM +0100, Markus Stockhausen wrote: > This is the assembler code for SHA256 implementation with > the SIMD SPE instruction set. Although being only a 32 bit > architecture GPRs are extended to 64 bit presenting two > 32 bit values. With the enhanced instruction set w

Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support

2015-02-27 Thread Herbert Xu
On Thu, Feb 05, 2015 at 04:10:58PM +0100, Stephan Mueller wrote: > Am Donnerstag, 29. Januar 2015, 21:24:45 schrieb Stephan Mueller: > > Hi Herbert, > > > This patch adds the AEAD support for AF_ALG. > > > > The implementation is based on algif_skcipher, but contains heavy > > modifications to s

Re: [PATCH] crypto: tcrypt speed: fix filter for aead algorithms

2015-02-27 Thread Herbert Xu
On Tue, Feb 03, 2015 at 03:59:48PM +0200, Cristian Stoica wrote: > test_aead_speed is written for sync algorithms without specifically > requiring them. The effect is that an async algorithm may be used without > setting up the request callback, this leading to a kernel panic. > > Signed-off-by: C