From: Yanjiang Jin
This can make sure we get a clean memory, else system would report
the below warning:
caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has
not allocated [device address=0xdeadbeefdeadbeef] [size=18446744073150512879
bytes]
[ cut here ]
From: Yanjiang Jin
Fix rng_unmap_ctx's DMA_UNMAP size problem for caam_rng, else system would
report the below calltrace during kexec boot:
caam_jr ffe301000.jr: DMA-API: device driver frees DMA memory with different
size [device address=0x7f080010] [map size=16 bytes] [unmap size=40
b
From: Yanjiang Jin
Add two missed dma_mapping_error() after dma_map_single().
Signed-off-by: Yanjiang Jin
---
drivers/crypto/caam/caamhash.c | 8
1 file changed, 8 insertions(+)
diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
index f347ab7..f6ad322 100644
From: Yanjiang Jin
This commit is to avoid the below warnings:
drivers/crypto/caam/sg_sw_sec4.h:88:12: warning:
'dma_map_sg_chained' defined but not used [-Wunused-function]
static int dma_map_sg_chained(struct device *dev, struct scatterlist *sg,
^
drivers/crypto/caam/sg_sw_sec4.h:
On 02/24/2015 12:02 AM, Johannes Ernst wrote:
> All in one place:
>
>> dd if=/dev/zero of=./test.img count=8 bs=1M
>
>> cryptsetup --hash sha512 --key-size 512 -v luksFormat ./test.img
> Used password ‘asdf’ (no quotes)
>
>> cryptsetup open test.img test
> Enter passphrase for test.img:
> No ke
The way the algif_skcipher works currently is that on sendmsg/sendpage it
builds an sgl for the input data and then on read/recvmsg it sends the job
for encryption putting the user to sleep till the data is processed.
This way it can only handle one job at a given time.
This patch changes it to be
The way the algif_skcipher works currently is that on sendmsg/sendpage it
builds an sgl for the input data and then on read/recvmsg it sends the job
for encryption putting the user to sleep till the data is processed.
This way it can only handle one job at a given time.
To be able to fuly utilize t
Allow to link af_alg sgls.
Signed-off-by: Tadeusz Struk
---
crypto/af_alg.c | 18 +-
include/crypto/if_alg.h |4 +++-
2 files changed, 16 insertions(+), 6 deletions(-)
diff --git a/crypto/af_alg.c b/crypto/af_alg.c
index 7f8b7edc..26089d1 100644
--- a/crypto/af_alg
The kernel crypto API has many indirections which warrant a description
as otherwise one can get easily lost. The description explains the
layers of the kernel crypto API based on examples.
Signed-off-by: Stephan Mueller
---
Documentation/DocBook/crypto-API.tmpl | 264 +++
Am Freitag, 27. Februar 2015, 10:34:37 schrieb Tadeusz Struk:
Hi Tadeusz,
> On 02/27/2015 02:26 AM, Stephan Mueller wrote:
> This patch adds the AEAD support for AF_ALG.
>
> >> > The implementation is based on algif_skcipher, but contains heavy
> >> > modifications to streaml
On 02/27/2015 02:26 AM, Stephan Mueller wrote:
This patch adds the AEAD support for AF_ALG.
>> >
>> > The implementation is based on algif_skcipher, but contains heavy
>> > modifications to streamline the interface for AEAD uses.
>> >
>> > To use AEAD, the user space
* Pali Rohár [150227 08:05]:
> On Friday 27 February 2015 16:43:20 Tony Lindgren wrote:
> > * Pali Rohár [150226 05:54]:
> > > Harmattan system on Nokia N9 and N950 devices uses omap
> > > crypto support. Bootloader on those devices is known that
> > > it enables HW crypto support. This patch jus
* Pali Rohár [150226 05:54]:
> Harmattan system on Nokia N9 and N950 devices uses omap crypto support.
> Bootloader on those devices is known that it enables HW crypto support.
> This patch just include omap36xx.dtsi directly, so aes and sham is enabled.
Let's also remove omap36xx-hs.dtsi with th
On Friday 27 February 2015 16:43:20 Tony Lindgren wrote:
> * Pali Rohár [150226 05:54]:
> > Harmattan system on Nokia N9 and N950 devices uses omap
> > crypto support. Bootloader on those devices is known that
> > it enables HW crypto support. This patch just include
> > omap36xx.dtsi directly, so
On 2/20/2015 7:00 PM, Martin Hicks wrote:
> The newer talitos hardware has support for AES in XTS mode.
>
> Signed-off-by: Martin Hicks
> ---
checkpatch complains about formatting, please check.
> drivers/crypto/talitos.c | 33 +
> drivers/crypto/talitos.h |
On Thursday 26 February 2015 23:46:05 Aaro Koskinen wrote:
> Hi,
>
> On Thu, Feb 26, 2015 at 02:49:50PM +0100, Pali Rohár wrote:
> > This patch series fix crypto support for omap3 devices which
> > use DT.
> >
> > It enables AES and SHAM on N9/N950 and SHAM on N900. AES is
> > still disabled for
On 2/20/2015 6:21 PM, Martin Hicks wrote:
> This is properly defined in the md5 header file.
> ---
Signed-off-by tag is missing.
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.ker
Hi Herbert,
On 02/27/2015 11:25 AM, Herbert Xu wrote:
> On Tue, Feb 03, 2015 at 03:59:48PM +0200, Cristian Stoica wrote:
>> test_aead_speed is written for sync algorithms without specifically
[...]
> Please fix it to test asynchronously instead.
Thanks for review.
I think that a fix for async ae
Am Freitag, 27. Februar 2015, 22:49:44 schrieb Herbert Xu:
Hi Herbert,
>On Thu, Feb 05, 2015 at 04:10:58PM +0100, Stephan Mueller wrote:
>> Am Donnerstag, 29. Januar 2015, 21:24:45 schrieb Stephan Mueller:
>>
>> Hi Herbert,
>>
>> > This patch adds the AEAD support for AF_ALG.
>> >
>> > The imp
On Thu, Feb 05, 2015 at 10:29:35AM +, Lad Prabhakar wrote:
> From: "Lad, Prabhakar"
>
> this patch fixes following sparse warning:
>
> sha1_mb_mgr_init_avx2.c:59:31: warning: constant 0xF76543210 is so big it is
> long
>
> Signed-off-by: Lad, Prabhakar
Applied.
--
Email: Herbert Xu
Hom
On Wed, Jan 28, 2015 at 04:41:10PM -0600, Tom Lendacky wrote:
> The following series of patches includes functional updates to the
> driver as well as some trivial changes.
>
> - Fix checks/warnings from checkpatch
> - Update how the CCP is built (Kconfig and Makefile)
> - Use dma_set_mask_and_coh
On Fri, Jan 30, 2015 at 03:39:23PM +0100, Markus Stockhausen wrote:
> This is the assembler code for SHA256 implementation with
> the SIMD SPE instruction set. Although being only a 32 bit
> architecture GPRs are extended to 64 bit presenting two
> 32 bit values. With the enhanced instruction set w
On Thu, Feb 05, 2015 at 04:10:58PM +0100, Stephan Mueller wrote:
> Am Donnerstag, 29. Januar 2015, 21:24:45 schrieb Stephan Mueller:
>
> Hi Herbert,
>
> > This patch adds the AEAD support for AF_ALG.
> >
> > The implementation is based on algif_skcipher, but contains heavy
> > modifications to s
On Tue, Feb 03, 2015 at 03:59:48PM +0200, Cristian Stoica wrote:
> test_aead_speed is written for sync algorithms without specifically
> requiring them. The effect is that an async algorithm may be used without
> setting up the request callback, this leading to a kernel panic.
>
> Signed-off-by: C
24 matches
Mail list logo