On Thu, Apr 26, 2018 at 09:52:57AM +0300, Dan Carpenter wrote:
> On Wed, Apr 25, 2018 at 08:36:22PM +0530, Atul Gupta wrote:
> > Reported-by: Dan Carpenter
> > Signed-off-by: Atul Gupta
> > ---
> > drivers/crypto/chelsio/chtls/chtls_main.c | 6 +++---
> > 1 file changed, 3 insertions(+), 3 delet
On Wed, Apr 25, 2018 at 08:36:22PM +0530, Atul Gupta wrote:
> Reported-by: Dan Carpenter
> Signed-off-by: Atul Gupta
> ---
> drivers/crypto/chelsio/chtls/chtls_main.c | 6 +++---
> 1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/drivers/crypto/chelsio/chtls/chtls_main.c
> b/dr
On Wed, Apr 25, 2018 at 08:35:32PM +0530, Atul Gupta wrote:
> - unindented continue
> - check for null page
> - signed return
>
> Reported-by: Dan Carpenter
> Signed-off-by: Atul Gupta
> ---
> drivers/crypto/chelsio/chtls/chtls_io.c | 9 ++---
> 1 file changed, 6 insertions(+), 3 deletions(
The following changes since commit d848e5f8e1ebdb227d045db55fe4f825e82965fa:
random: add new ioctl RNDRESEEDCRNG (2018-04-14 11:59:31 -0400)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git
tags/random_for_linus_stable
for you to fetch
On Wed, Apr 25, 2018 at 8:49 PM, Eric Biggers wrote:
> I agree that my explanation should have been better, and should have
> considered
> more crypto algorithms. The main difficulty is that we have extreme
> performance
> requirements -- it needs to be 50 MB/s at the very least on even low-end
Hi Samuel,
On Wed, Apr 25, 2018 at 03:33:16PM +0100, Samuel Neves wrote:
> Let's put the provenance of Speck aside for a moment, and suppose that
> it is an ideal block cipher. There are still some issues with this
> patch as it stands.
>
> - The rationale seems off. Consider this bit from the c
Hi, Gilad,
On 04/23/2018 10:25 AM, Gilad Ben-Yossef wrote:
Enable CryptoCell support for hardware keys.
Hardware keys are regular AES keys loaded into CryptoCell internal memory
via firmware, often from secure boot ROM or hardware fuses at boot time.
As such, they can be used for enc/dec purpo
> -Original Message-
> From: Eric Biggers
> Sent: Tuesday, 27 March 2018 9:55
> To: Yael Chemla
> Cc: Alasdair Kergon ; Mike Snitzer ;
> dm-de...@redhat.com; linux-ker...@vger.kernel.org; ofir.dr...@gmail.com;
> Yael Chemla ; linux-crypto@vger.kernel.org;
> gi...@benyossef.com
> Subject
some of the supported socket options are sent to HW while rest
are handled by SW
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls.h | 10 ++
drivers/crypto/chelsio/chtls/chtls_cm.h | 12 ++
drivers/crypto/chelsio/chtls/chtls_hw.c | 2 +-
drivers/crypto/chelsio/chtls/
removed redundant check and made TLS PDU and header recv
handling common as received from HW
Signed-off-by: Atul Gupta
Signed-off-by: Harsh Jain
---
drivers/crypto/chelsio/chtls/chtls.h| 10 ++
drivers/crypto/chelsio/chtls/chtls_cm.c | 12 +---
drivers/crypto/chelsio/chtls/chtls_io.
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_main.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/chelsio/chtls/chtls_main.c
b/drivers/crypto/chelsio/chtls/chtls_main.c
index e9ffc3d..4dc3d0e 100644
--- a/
- unindented continue
- check for null page
- signed return
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_io.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c
b/drivers/crypto/che
corrected the key length to copy 128b key. Removed 192b and 256b
key as user input supports key of size 128b in gcm_ctx
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_hw.c | 6 +-
1 file changed, 1 insertion(+), 5 deletions(-)
diff --git a/drive
skb dereferenced before check in sendpage
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_io.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c
b/drivers/crypto/chelsio/chtls/chtls_io.c
ind
wait for memory in sendmsg and sendpage
Reported-by: Gustavo A. R. Silva
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls.h | 1 +
drivers/crypto/chelsio/chtls/chtls_io.c | 90 +--
drivers/crypto/chelsio/chtls/chtls_main.c | 1 +
3 files chan
Let's put the provenance of Speck aside for a moment, and suppose that
it is an ideal block cipher. There are still some issues with this
patch as it stands.
- The rationale seems off. Consider this bit from the commit message:
> Other AES alternatives such as Twofish, Threefish, Camellia, CAST6
On Wed, Apr 25, 2018 at 3:20 PM, Ard Biesheuvel
wrote:
> In preparation of adding support for the SIMD based arm64 implementation
> of arm64, which requires a fallback to non-SIMD code when invoked in
> certain contexts, expose the generic SM4 encrypt and decrypt routines
> to other drivers.
>
> S
On 25 April 2018 at 14:20, Ard Biesheuvel wrote:
> In preparation of adding support for the SIMD based arm64 implementation
> of arm64,
SM4 ^^^
> which requires a fallback to non-SIMD code when invoked in
> certain contexts, expose the generic SM4 encrypt and decrypt routines
> to other drivers.
In preparation of adding support for the SIMD based arm64 implementation
of arm64, which requires a fallback to non-SIMD code when invoked in
certain contexts, expose the generic SM4 encrypt and decrypt routines
to other drivers.
Signed-off-by: Ard Biesheuvel
---
crypto/sm4_generic.c | 10 ++
Add support for the SM4 symmetric cipher implemented using the special
SM4 instructions introduced in ARM architecture revision 8.2.
Signed-off-by: Ard Biesheuvel
---
arch/arm64/crypto/Kconfig | 6 ++
arch/arm64/crypto/Makefile | 3 +
arch/arm64/crypto/sm4-ce-core.S | 36 ++
Patch #1 makes some preparatory changes so the C routines can be used as
a fallback by other drivers.
Patch #2 implements the SM4 core cipher using the special instructions
introduced as an optional extension by revision 8.2 of the ARM architecture.
Note that this does not implement cipher+chaini
21 matches
Mail list logo