<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/crypto/caam, branch v3.2.41</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/crypto/caam?h=v3.2.41</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/crypto/caam?h=v3.2.41'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-07-25T19:53:15Z</updated>
<entry>
<title>Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6</title>
<updated>2011-07-25T19:53:15Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2011-07-25T19:53:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0003230e8200699860f0b10af524dc47bf8aecad'/>
<id>urn:sha1:0003230e8200699860f0b10af524dc47bf8aecad</id>
<content type='text'>
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6:
  fs: take the ACL checks to common code
  bury posix_acl_..._masq() variants
  kill boilerplates around posix_acl_create_masq()
  generic_acl: no need to clone acl just to push it to set_cached_acl()
  kill boilerplate around posix_acl_chmod_masq()
  reiserfs: cache negative ACLs for v1 stat format
  xfs: cache negative ACLs if there is no attribute fork
  9p: do no return 0 from -&gt;check_acl without actually checking
  vfs: move ACL cache lookup into generic code
  CIFS: Fix oops while mounting with prefixpath
  xfs: Fix wrong return value of xfs_file_aio_write
  fix devtmpfs race
  caam: don't pass bogus S_IFCHR to debugfs_create_...()
  get rid of create_proc_entry() abuses - proc_mkdir() is there for purpose
  asus-wmi: -&gt;is_visible() can't return negative
  fix jffs2 ACLs on big-endian with 16bit mode_t
  9p: close ACL leaks
  ocfs2_init_acl(): fix a leak
  VFS : mount lock scalability for internal mounts
</content>
</entry>
<entry>
<title>caam: don't pass bogus S_IFCHR to debugfs_create_...()</title>
<updated>2011-07-24T14:12:42Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2011-07-24T08:32:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=eda65cc6ce2a45dc01c233e301e59cd7a0f763ad'/>
<id>urn:sha1:eda65cc6ce2a45dc01c233e301e59cd7a0f763ad</id>
<content type='text'>
it will be replaced with S_IFREG anyway

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>crypto: caam - ablkcipher support</title>
<updated>2011-07-15T03:21:42Z</updated>
<author>
<name>Yuan Kang</name>
<email>Yuan.Kang@freescale.com</email>
</author>
<published>2011-07-15T03:21:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=acdca31dba86c4f426460aa000d13930a00549b7'/>
<id>urn:sha1:acdca31dba86c4f426460aa000d13930a00549b7</id>
<content type='text'>
caam now supports encrypt and decrypt
for aes, des and 3des

Signed-off-by: Yuan Kang &lt;Yuan.Kang@freescale.com&gt;
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - faster aead implementation</title>
<updated>2011-07-15T03:21:42Z</updated>
<author>
<name>Yuan Kang</name>
<email>Yuan.Kang@freescale.com</email>
</author>
<published>2011-07-15T03:21:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1acebad3d8db8d5220b3010c2eb160c625434cf2'/>
<id>urn:sha1:1acebad3d8db8d5220b3010c2eb160c625434cf2</id>
<content type='text'>
Job descriptors only contain header and seq pointers.

Other commands are stored in separate shared descriptors
for encrypt, decrypt and givencrypt, stored as arrays
in caam_ctx.

This requires additional macros to create math commands
to calculate assoclen and cryptlen.

Signed-off-by: Yuan Kang &lt;Yuan.Kang@freescale.com&gt;
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - structure renaming</title>
<updated>2011-07-15T03:21:41Z</updated>
<author>
<name>Yuan Kang</name>
<email>Yuan.Kang@freescale.com</email>
</author>
<published>2011-07-15T03:21:41Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=885e9e2fd3f009de56dd265f4ecd8740e9ad5aaa'/>
<id>urn:sha1:885e9e2fd3f009de56dd265f4ecd8740e9ad5aaa</id>
<content type='text'>
caam_ctx.key_phys to key_dma

caam_alg_template supports multiple algorithm types
listed in union, which requires cases for
different types in function caam_alg_alloc

Signed-off-by: Yuan Kang &lt;Yuan.Kang@freescale.com&gt;
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - shorter names</title>
<updated>2011-07-15T03:21:41Z</updated>
<author>
<name>Yuan Kang</name>
<email>Yuan.Kang@freescale.com</email>
</author>
<published>2011-07-15T03:21:41Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0e47930020081b07047842be3e4552edb2395352'/>
<id>urn:sha1:0e47930020081b07047842be3e4552edb2395352</id>
<content type='text'>
"aead_authenc" and "ipsec_esp" changed to "aead,"
except for function "ipsec_esp," which is changed
to "init_aead_job."

Variable name of aead_request structures changed
to "req" and name of aead_givcrypt_request structure
changed to "areq"

Signed-off-by: Yuan Kang &lt;Yuan.Kang@freescale.com&gt;
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - fix build warning when DEBUG_FS not configured</title>
<updated>2011-06-29T23:44:05Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-06-05T21:42:54Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=23457bc9566be64f33afdc159aadd42712673e0b'/>
<id>urn:sha1:23457bc9566be64f33afdc159aadd42712673e0b</id>
<content type='text'>
drivers/crypto/caam/ctrl.c: In function 'caam_probe':
drivers/crypto/caam/ctrl.c:55:23: warning: unused variable 'perfmon'

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - fix operator precedence in shared descriptor allocation</title>
<updated>2011-06-29T23:43:27Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-26T03:30:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a18b989a5c12ca82ed37f94279273ddbc073758a'/>
<id>urn:sha1:a18b989a5c12ca82ed37f94279273ddbc073758a</id>
<content type='text'>
setkey allocates 16 bytes (CAAM_CMD_SZ *
DESC_AEAD_SHARED_TEXT_LEN) shy of what is needed to
store the shared descriptor, resulting in memory
corruption.  Fix this.

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - add support for sha512 variants of existing AEAD algorithms</title>
<updated>2011-05-19T04:38:00Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:08:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4427b1b4ec111622071ec872c94594e05635c6e9'/>
<id>urn:sha1:4427b1b4ec111622071ec872c94594e05635c6e9</id>
<content type='text'>
In doing so, sha512 sized keys would not fit with the current
descriptor inlining mechanism, so we now calculate whether keys
should be referenced instead by pointers in the shared descriptor.

also, use symbols for descriptor text lengths, and, ahem, unmap and
free key i/o memory in cra_exit.

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - remove unused authkeylen from caam_ctx</title>
<updated>2011-05-19T04:37:59Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:08:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=66664487b137d71fd43667ac2a6a90970a040eb7'/>
<id>urn:sha1:66664487b137d71fd43667ac2a6a90970a040eb7</id>
<content type='text'>
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
