Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation

2020-12-09 Thread Ard Biesheuvel
On Thu, 10 Dec 2020 at 04:01, Ben Greear wrote: > > On 12/9/20 6:43 PM, Herbert Xu wrote: > > On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote: > >> > >> One thing I realized just now is that in the current situation, all > >> the synchronous skciphers already degrade like this. > >>

Re: [PATCH] KVM/SVM: add support for SEV attestation command

2020-12-09 Thread Brijesh Singh
On 12/9/20 1:51 AM, Ard Biesheuvel wrote: > On Fri, 4 Dec 2020 at 22:30, Brijesh Singh wrote: >> The SEV FW version >= 0.23 added a new command that can be used to query >> the attestation report containing the SHA-256 digest of the guest memory >> encrypted through the KVM_SEV_LAUNCH_UPDATE_{DA

Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation

2020-12-09 Thread Ben Greear
On 12/9/20 6:43 PM, Herbert Xu wrote: On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote: One thing I realized just now is that in the current situation, all the synchronous skciphers already degrade like this. I.e., in Ben's case, without the special ccm implementation, ccm(aes) w

Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation

2020-12-09 Thread Herbert Xu
On Thu, Dec 10, 2020 at 01:18:12AM +0100, Ard Biesheuvel wrote: > > One thing I realized just now is that in the current situation, all > the synchronous skciphers already degrade like this. > > I.e., in Ben's case, without the special ccm implementation, ccm(aes) > will resolve to ccm(ctr(aesni)

Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation

2020-12-09 Thread Ard Biesheuvel
On Wed, 2 Dec 2020 at 00:12, Herbert Xu wrote: > > On Tue, Dec 01, 2020 at 11:27:52PM +0100, Ard Biesheuvel wrote: > > > > > The problem is that the degradation would come at the worst time, > > > when the system is loaded. IOW when you get an interrupt during > > > your TX path and get RX traffi

[PATCH] crypto: sahara - Remove unused .id_table support

2020-12-09 Thread Fabio Estevam
Since 5.10-rc1 i.MX is a devicetree-only platform and the existing .id_table support in this driver was only useful for old non-devicetree platforms. Remove the unused .id_table support. Signed-off-by: Fabio Estevam --- drivers/crypto/sahara.c | 7 --- 1 file changed, 7 deletions(-) diff -

Re: [PATCH 00/18] keys: Miscellaneous fixes

2020-12-09 Thread Ben Boeckel
On Wed, Dec 09, 2020 at 12:14:24 +, David Howells wrote: > I've extended my collection of minor keyrings fixes for the next merge > window. Anything else I should add (or anything I should drop)? > > The patches can be found on the following branch: > > > https://git.kernel.org/pub/sc

Capabilities required by NETLINK_AUDIT socket

2020-12-09 Thread Bhat, Jayalakshmi Manjunath
Hi All, I am trying to create NETLINK socket for type NETLINK_AUDIT. Bind fails with error number 1. I have enabled capabilities CAP_NET_ADMIN, CAP_AUDIT_READ. Can anyone please tell me what additional capabilities are needed? Regards, Jayalakshmi

Re: [PATCH v2] xfrm: interface: Don't hide plain packets from netfilter

2020-12-09 Thread Eyal Birger
Hi Phil, On Tue, Dec 8, 2020 at 8:51 PM Phil Sutter wrote: > > Hi Eyal, > > On Tue, Dec 08, 2020 at 04:47:02PM +0200, Eyal Birger wrote: > > On Mon, Dec 7, 2020 at 4:07 PM Phil Sutter wrote: > > > > > > With an IPsec tunnel without dedicated interface, netfilter sees locally > > > generated pack

[PATCH 00/18] keys: Miscellaneous fixes

2020-12-09 Thread David Howells
Hi Jarkko, I've extended my collection of minor keyrings fixes for the next merge window. Anything else I should add (or anything I should drop)? The patches can be found on the following branch: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-fixes

[PATCH 10/18] PKCS#7: drop function from kernel-doc pkcs7_validate_trust_one

2020-12-09 Thread David Howells
From: Alex Shi The function is a static function, so no needs add into kernel-doc. and we could avoid warning: crypto/asymmetric_keys/pkcs7_trust.c:25: warning: Function parameter or member 'pkcs7' not described in 'pkcs7_validate_trust_one' crypto/asymmetric_keys/pkcs7_trust.c:25: warning: Funct

Re: [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid

2020-12-09 Thread David Howells
Mickaël Salaün wrote: > + cmd_check_blacklist_hashes = $(AWK) -f > scripts/check-blacklist-hashes.awk $(2); touch $@ The script name needs prefixing with $(srctree)/ so that it can be used with alternative build directories. Note that doesn't apply to scripts/extract-cert in the same make

Re: [RESEND 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API

2020-12-09 Thread Allen
> > > > Signed-off-by: Romain Perier > > Signed-off-by: Allen Pais > > --- > > drivers/crypto/ccree/cc_fips.c| 6 +++--- > > drivers/crypto/ccree/cc_request_mgr.c | 12 ++-- > > 2 files changed, 9 insertions(+), 9 deletions(-) > > > > diff --git a/drivers/crypto/ccree/cc_fips.c