On Thu, Jul 09, 2015 at 08:19:45AM +0200, Stephan Mueller wrote:
> Am Donnerstag, 9. Juli 2015, 07:17:31 schrieb Herbert Xu:
>
> Hi Herbert,
>
> >This patch converts rfc4106 to the new calling convention where
> >the IV is now part of the AD and needs to be skipped. This patch
> >also makes use
On Tue, Jul 07, 2015 at 09:49:36PM +0800, Herbert Xu wrote:
> On Mon, Jul 06, 2015 at 09:10:47PM +0200, LABBE Corentin wrote:
> >
> > +int sun4i_hash_init(struct ahash_request *areq)
> > +{
> > + const char *hash_type;
> > + struct sun4i_req_ctx *op = ahash_request_ctx(areq);
> > + struct cry
Am Donnerstag, 9. Juli 2015, 07:17:31 schrieb Herbert Xu:
Hi Herbert,
>This patch converts rfc4106 to the new calling convention where
>the IV is now part of the AD and needs to be skipped. This patch
>also makes use of type-safe AEAD functions where possible.
>
>Signed-off-by: Herbert Xu
This
This patch adds a type-safe function for freeing AEAD instances
to struct aead_instance. This replaces the existing free function
in struct crypto_template which does not know the type of the
instance that it's freeing.
Signed-off-by: Herbert Xu
---
crypto/aead.c | 13 ++
This patch converts rfc4106 to the new calling convention where
the IV is now part of the AD and needs to be skipped. This patch
also makes use of the new type-safe way of freeing instances.
Signed-off-by: Herbert Xu
---
crypto/gcm.c | 114 +++--
This patch allows the CRYPTO_ALG_AEAD_NEW flag to be propagated.
It also restores the ASYNC bit that went missing during the AEAD
conversion.
Signed-off-by: Herbert Xu
---
crypto/pcrypt.c | 12 +++-
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/crypto/pcrypt.c b/crypt
This patch converts rfc4106 to the new calling convention where
the IV is now in the AD and needs to be skipped.
Signed-off-by: Herbert Xu
---
arch/x86/crypto/aesni-intel_glue.c | 56 +
1 file changed, 20 insertions(+), 36 deletions(-)
diff --git a/arch/x8
This patch fixes a bug where we were incorrectly including the
IV in the AD during encryption. The IV must remain in the plain
text for it to be encrypted.
During decryption there is no need to copy the IV to dst because
it's now part of the AD.
This patch removes an unncessary check on authsize
This patch converts rfc4106 to the new calling convention where
the IV is now part of the AD and needs to be skipped. This patch
also makes use of type-safe AEAD functions where possible.
Signed-off-by: Herbert Xu
---
drivers/crypto/nx/nx-aes-gcm.c | 66 --
Now that all implementations of rfc4106 have been converted we can
reenable the test.
Signed-off-by: Herbert Xu
---
crypto/testmgr.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index c4fe6a8..d0a42bd 100644
--- a/crypto/testmgr.c
++
This patch allows the CRYPTO_ALG_AEAD_NEW flag to be propagated.
Signed-off-by: Herbert Xu
---
crypto/aead.c |5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 8cd45a7..1a5b118 100644
--- a/crypto/aead.c
+++ b/crypto/aead.c
@@ -604,7
This patch converts rfc4106 to the new calling convention where
the IV is now part of the AD and needs to be skipped.
Signed-off-by: Herbert Xu
---
drivers/crypto/caam/caamalg.c | 75 +++---
1 file changed, 49 insertions(+), 26 deletions(-)
diff --git a/dr
This patch replaces the seqniv generator with seqiv when the
underlying algorithm understands the new calling convention.
This not only makes more sense as now seqiv is solely responsible
for IV generation rather than also determining how the IV is going
to be used, it also allows for optimisation
This patch allows the CRYPTO_ALG_AEAD_NEW flag to be propagated.
Signed-off-by: Herbert Xu
---
crypto/cryptd.c | 11 ++-
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git a/crypto/cryptd.c b/crypto/cryptd.c
index 2f833dc..360ee85 100644
--- a/crypto/cryptd.c
+++ b/crypto/cry
This patch disables the rfc4106 test while the conversion to the
new seqiv calling convention takes place. It also converts the
rfc4106 test vectors to the new format.
Signed-off-by: Herbert Xu
---
crypto/testmgr.c |2
crypto/testmgr.h | 602 +-
This patch allows the AEAD speed tests to cope with the new seqiv
calling convention as well as the old one.
Signed-off-by: Herbert Xu
---
crypto/tcrypt.c | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c
index 3603c7c..73ed4f2 1
Currently the task of freeing an instance is given to the crypto
template. However, it has no type information on the instance so
we have to resort to checking type information at runtime.
This patch introduces a free function to crypto_type that will be
used to free an instance. This can then b
Hi:
This series attempts to phase out the recently introduced seqniv
generator. The reason is that the logic of seqniv should not be
implemented at the IV generator layer. Having the IV skipping
logic in seqniv means that you cannot perform encryption without
doing IV generation.
In fact moving
On Wed, Jul 08, 2015 at 10:36:23PM +0200, Martin Willi wrote:
>
> I get less constant numbers between different runs when using sec=0,
> hence I've used sec=1. Below are the numbers of "average" runs for the
> AEAD measuring cycles; I'll use cycles in the individual patch notes in
> a v2.
If you'
Herbert,
> Running the speed test with sec=1 makes no sense because it's
> too short. Please use sec=0 and count cycles instead.
I get less constant numbers between different runs when using sec=0,
hence I've used sec=1. Below are the numbers of "average" runs for the
AEAD measuring cycles; I'll
Am Mittwoch, 8. Juli 2015, 23:29:32 schrieb Herbert Xu:
Hi Herbert,
>On Wed, Jul 08, 2015 at 05:27:15PM +0200, Stephan Mueller wrote:
>> But according to Tadeusz it may be viable to register hybrid asym ciphers
>> with the akcipher API. If there is a full blown hybrid asym cipher we have
>> to ha
On Wed, Jul 08, 2015 at 05:27:15PM +0200, Stephan Mueller wrote:
>
> But according to Tadeusz it may be viable to register hybrid asym ciphers
> with
> the akcipher API. If there is a full blown hybrid asym cipher we have to
> handle potentially large chunks of data. I am now wondering whether
Hi Herbert, Tadeusz,
I looked a bit further into the akcipher code to see how we can add an AF_ALG
there.
What currently wonders me is the akcipher_request_set_crypt function: the
memory for input/output buffers is *no* scatter list but a plain buffer. I
think I can understand that for raw RSA
> PS it would appear that you can make this completely reentrant
> by moving all the data from the tfm into the reqeust. Could you
> work on this and remove the spinlock completely?
Yes.
Thank you!
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a messa
The transform context is shared memory and must not be written
to without locking. This patch adds locking to nx-842 to prevent
context corruption.
Signed-off-by: Herbert Xu
diff --git a/drivers/crypto/nx/nx-842-crypto.c
b/drivers/crypto/nx/nx-842-crypto.c
index d53a1dc..3288a70 100644
--- a/d
On Wednesday 08 July 2015 01:23 PM, Herbert Xu wrote:
> On Wed, Jul 08, 2015 at 03:48:05PM +0800, Herbert Xu wrote:
>> On Wed, Jul 08, 2015 at 12:29:47PM +0530, Lokesh Vutla wrote:
>>>
> + if (req->assoclen + req->cryptlen == 0) {
> + scatterwalk_map_and_copy(ctx->auth_tag, req->dst
On Wednesday 08 July 2015 01:18 PM, Herbert Xu wrote:
> On Wed, Jul 08, 2015 at 12:29:47PM +0530, Lokesh Vutla wrote:
>>
+ if (req->assoclen + req->cryptlen == 0) {
+ scatterwalk_map_and_copy(ctx->auth_tag, req->dst, 0, authlen,
+ 1);
On Wed, Jul 08, 2015 at 03:48:05PM +0800, Herbert Xu wrote:
> On Wed, Jul 08, 2015 at 12:29:47PM +0530, Lokesh Vutla wrote:
> >
> > >> +if (req->assoclen + req->cryptlen == 0) {
> > >> +scatterwalk_map_and_copy(ctx->auth_tag, req->dst, 0,
> > >> authlen,
> > >> +
On Wed, Jul 08, 2015 at 12:29:47PM +0530, Lokesh Vutla wrote:
>
> >> + if (req->assoclen + req->cryptlen == 0) {
> >> + scatterwalk_map_and_copy(ctx->auth_tag, req->dst, 0, authlen,
> >> + 1);
> >> + return 0;
> >> + }
> >
> > How can this be r
On Tue, Jul 07, 2015 at 09:01:42PM +0530, Lokesh Vutla wrote:
> This series does some basic cleanup and adds support for
> AES GCM mode for omap aes driver.
>
> Changes since v1:
> - Switched GCM to new AEAD interface
Patches 1-4 and 7 applied.
Cheers,
--
Email: Herbert Xu
Home Page: http://go
On Wednesday 08 July 2015 09:48 AM, Herbert Xu wrote:
> On Tue, Jul 07, 2015 at 09:01:48PM +0530, Lokesh Vutla wrote:
>>
>> +static int omap_aes_gcm_copy_buffers(struct omap_aes_dev *dd,
>> + struct aead_request *req)
>> +{
>> +void *buf_in;
>> +int pages, al
31 matches
Mail list logo