Re: [PATCH 14/16] crypto/nx: Register and unregister VAS interface

2021-04-11 Thread kernel test robot
submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch] url: https://github.com/0day-ci/linux/commits/Haren-Myneni/Enable-VAS-and-NX-GZIP-support-on-powerVM/20210411-084631 base: https://git.kernel.org/pub/scm/linux/kernel/git/powerpc

Re: [PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type

2021-04-11 Thread kernel test robot
submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch] url: https://github.com/0day-ci/linux/commits/Haren-Myneni/Enable-VAS-and-NX-GZIP-support-on-powerVM/20210411-084631 base: https://git.kernel.org/pub/scm/linux/kernel/git/powerpc

Re: [PATCH 00/16] Enable VAS and NX-GZIP support on powerVM

2021-04-11 Thread Christophe Leroy
Le 11/04/2021 à 02:27, Haren Myneni a écrit : This patch series enables VAS / NX-GZIP on powerVM which allows the user space to do copy/paste with the same existing interface that is available on powerNV. Can you explain (here and in patch 1 at least) what VAS and NX means ? Is that Vector

Re: [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent

2021-04-11 Thread Christophe Leroy
Le 11/04/2021 à 02:31, Haren Myneni a écrit : Using the same /dev/crypto/nx-gzip interface for both powerNV and pseries. So this patcb moves VAS API to powerpc platform indepedent directory. The actual functionality is not changed in this patch. This patch seems to do a lot more than moving

linux-next: Fixes tag needs some work in the crypto tree

2021-04-11 Thread Stephen Rothwell
Hi all, In commit 36303413885e ("crypto: chelsio - Read rxchannel-id from firmware") Fixes tag Fixes: 567be3a5d227 ("crypto: chelsio - Use multiple txq/rxq per tfm to process the requests) has these problem(s): - Subject has leading but no trailing quotes -- Cheers, Stephen Rothwell

[PATCH] crypto: fix kernel-doc notation in chacha.c and af_alg.c

2021-04-11 Thread Randy Dunlap
Fix function name in chacha.c kernel-doc comment to remove a warning. Convert af_alg.c to kernel-doc notation to eliminate many kernel-doc warnings. ../lib/crypto/chacha.c:77: warning: expecting prototype for chacha_block(). Prototype was for chacha_block_generic() instead chacha.c:104: warning:

Re: [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent

2021-04-11 Thread Haren Myneni
Christophe, Thanks for your comments. Please see below for my responses. On Sun, 2021-04-11 at 10:49 +0200, Christophe Leroy wrote: > > Le 11/04/2021 à 02:31, Haren Myneni a écrit : > > Using the same /dev/crypto/nx-gzip interface for both powerNV and > > pseries. So this patcb moves VA

Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode

2021-04-11 Thread Hangbin Liu
On Fri, Apr 09, 2021 at 12:29:42PM -0600, Jason A. Donenfeld wrote: > On Fri, Apr 9, 2021 at 2:08 AM Hangbin Liu wrote: > > After offline discussion with Herbert, here is > > what he said: > > > > """ > > This is not a problem in RHEL8 because the Crypto API RNG replaces > > /dev/random > > in FI

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-04-11 Thread Lee, Chun-Yi
NIAP PP_OS certification requests that the OS shall validate the CodeSigning extended key usage extension field for integrity verifiction of exectable code: https://www.niap-ccevs.org/MMO/PP/-442-/ FIA_X509_EXT.1.1 This patchset adds the logic for parsing the codeSigning EKU extension

[PATCH v5,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-04-11 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/certs/Makefile ++

[PATCH v5,1/4] X.509: Add CodeSigning extended key usage parsing

2021-04-11 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_parser.c | 24 +++

[PATCH v5,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-04-11 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 + crypto/asymmetric

[PATCH v5,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-04-11 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/admin-guide/