<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/crypto, branch v3.0.62</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/crypto?h=v3.0.62</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/crypto?h=v3.0.62'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-05-21T16:40:03Z</updated>
<entry>
<title>crypto: mv_cesa requires on CRYPTO_HASH to build</title>
<updated>2012-05-21T16:40:03Z</updated>
<author>
<name>Alexander Clouter</name>
<email>alex@digriz.org.uk</email>
</author>
<published>2012-05-12T08:45:08Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=04a4aeb4052eec420eb1a50ab1cba1f359223e37'/>
<id>urn:sha1:04a4aeb4052eec420eb1a50ab1cba1f359223e37</id>
<content type='text'>
commit 1ebfefcf37a6e308266a8d786e8cfea0a454058c upstream.

Without CRYPTO_HASH being selected, mv_cesa has a lot of hooks
into undefined exports.
----
  MODPOST 81 modules
  Kernel: arch/arm/boot/Image is ready
  AS      arch/arm/boot/compressed/head.o
  GZIP    arch/arm/boot/compressed/piggy.gzip
  CC      arch/arm/boot/compressed/misc.o
  CC      arch/arm/boot/compressed/decompress.o
ERROR: "crypto_ahash_type" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_shash_final" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_register_ahash" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_unregister_ahash" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_shash_update" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_shash_digest" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_shash_setkey" [drivers/crypto/mv_cesa.ko] undefined!
ERROR: "crypto_alloc_shash" [drivers/crypto/mv_cesa.ko] undefined!
make[1]: *** [__modpost] Error 1
make: *** [modules] Error 2
make: *** Waiting for unfinished jobs....
----

Signed-off-by: Alexander Clouter &lt;alex@digriz.org.uk&gt;
Signed-off-by: Jason Cooper &lt;jason@lakedaemon.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>crypto: mv_cesa - fix final callback not ignoring input data</title>
<updated>2012-03-12T17:32:56Z</updated>
<author>
<name>Phil Sutter</name>
<email>phil.sutter@viprinet.com</email>
</author>
<published>2012-02-27T11:17:04Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=56c54856551b8a8199fda32aa7c416c719e5f0b9'/>
<id>urn:sha1:56c54856551b8a8199fda32aa7c416c719e5f0b9</id>
<content type='text'>
commit f8f54e190ddb4ed697036b60f5e2ae6dd45b801c upstream.

Broken by commit 6ef84509f3d439ed2d43ea40080643efec37f54f for users
passing a request with non-zero 'nbytes' field, like e.g. testmgr.

Signed-off-by: Phil Sutter &lt;phil.sutter@viprinet.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>crypto: mv_cesa - fix hashing of chunks &gt; 1920 bytes</title>
<updated>2011-12-09T16:52:20Z</updated>
<author>
<name>Phil Sutter</name>
<email>phil.sutter@viprinet.com</email>
</author>
<published>2011-11-16T17:28:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e84ce11bd0183328e00accb611893b9a819dc0ba'/>
<id>urn:sha1:e84ce11bd0183328e00accb611893b9a819dc0ba</id>
<content type='text'>
commit 274252862f386b7868f35bf5ceaa5391a8ccfdf3 upstream.

This was broken by commit 7759995c75ae0cbd4c861582908449f6b6208e7a (yes,
myself). The basic problem here is since the digest state is only saved
after the last chunk, the state array is only valid when handling the
first chunk of the next buffer. Broken since linux-3.0.

Signed-off-by: Phil Sutter &lt;phil.sutter@viprinet.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>crypto: caam - fix operator precedence in shared descriptor allocation</title>
<updated>2011-06-29T23:43:27Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-26T03:30:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a18b989a5c12ca82ed37f94279273ddbc073758a'/>
<id>urn:sha1:a18b989a5c12ca82ed37f94279273ddbc073758a</id>
<content type='text'>
setkey allocates 16 bytes (CAAM_CMD_SZ *
DESC_AEAD_SHARED_TEXT_LEN) shy of what is needed to
store the shared descriptor, resulting in memory
corruption.  Fix this.

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[S390] ap: skip device registration on type probe failure</title>
<updated>2011-05-23T08:24:29Z</updated>
<author>
<name>Holger Dengler</name>
<email>hd@linux.vnet.ibm.com</email>
</author>
<published>2011-05-23T08:24:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=cf2d007bd43bc254d5254fe9d30af3e73ed5b98a'/>
<id>urn:sha1:cf2d007bd43bc254d5254fe9d30af3e73ed5b98a</id>
<content type='text'>
The registration of an ap device will be skipped, if the device type
probing fails.
Add names of current crypto adapters to the Kconfig help.

Signed-off-by: Holger Dengler &lt;hd@linux.vnet.ibm.com&gt;
Signed-off-by: Martin Schwidefsky &lt;schwidefsky@de.ibm.com&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6</title>
<updated>2011-05-21T00:24:14Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2011-05-21T00:24:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=052497553e5dedc04c43800820c1d5788201cc71'/>
<id>urn:sha1:052497553e5dedc04c43800820c1d5788201cc71</id>
<content type='text'>
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (45 commits)
  crypto: caam - add support for sha512 variants of existing AEAD algorithms
  crypto: caam - remove unused authkeylen from caam_ctx
  crypto: caam - fix decryption shared vs. non-shared key setting
  crypto: caam - platform_bus_type migration
  crypto: aesni-intel - fix aesni build on i386
  crypto: aesni-intel - Merge with fpu.ko
  crypto: mv_cesa - make count_sgs() null-pointer proof
  crypto: mv_cesa - copy remaining bytes to SRAM only when needed
  crypto: mv_cesa - move digest state initialisation to a better place
  crypto: mv_cesa - fill inner/outer IV fields only in HMAC case
  crypto: mv_cesa - refactor copy_src_to_buf()
  crypto: mv_cesa - no need to save digest state after the last chunk
  crypto: mv_cesa - print a warning when registration of AES algos fail
  crypto: mv_cesa - drop this call to mv_hash_final from mv_hash_finup
  crypto: mv_cesa - the descriptor pointer register needs to be set just once
  crypto: mv_cesa - use ablkcipher_request_cast instead of the manual container_of
  crypto: caam - fix printk recursion for long error texts
  crypto: caam - remove unused keylen from session context
  hwrng: amd - enable AMD hw rnd driver for Maple PPC boards
  hwrng: amd - manage resource allocation
  ...
</content>
</entry>
<entry>
<title>crypto: caam - add support for sha512 variants of existing AEAD algorithms</title>
<updated>2011-05-19T04:38:00Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:08:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4427b1b4ec111622071ec872c94594e05635c6e9'/>
<id>urn:sha1:4427b1b4ec111622071ec872c94594e05635c6e9</id>
<content type='text'>
In doing so, sha512 sized keys would not fit with the current
descriptor inlining mechanism, so we now calculate whether keys
should be referenced instead by pointers in the shared descriptor.

also, use symbols for descriptor text lengths, and, ahem, unmap and
free key i/o memory in cra_exit.

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - remove unused authkeylen from caam_ctx</title>
<updated>2011-05-19T04:37:59Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:08:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=66664487b137d71fd43667ac2a6a90970a040eb7'/>
<id>urn:sha1:66664487b137d71fd43667ac2a6a90970a040eb7</id>
<content type='text'>
Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - fix decryption shared vs. non-shared key setting</title>
<updated>2011-05-19T04:37:59Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:08:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ddbb80884a37601026ac3e5eaf176c4296231862'/>
<id>urn:sha1:ddbb80884a37601026ac3e5eaf176c4296231862</id>
<content type='text'>
Key sharing is enabled by default in the shared descriptor.

Using CBC decrypt, AES has to alter the key in order to decrypt.
During high traffic decryption rates, i.e, when sharing starts to
take place, we need to use a different OPERATION option to tell AES
that the key was already altered by the PRIOR descriptor - we need
the following kind of logic:

if ( shared )
    operation where AES uses decryption key (DK=1)
else
    operation where AES uses encryption key (DK=0)

this patch implements this logic using a conditional and
a non-conditional local jump within the decryption job
descriptor.

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - platform_bus_type migration</title>
<updated>2011-05-19T04:37:58Z</updated>
<author>
<name>Kim Phillips</name>
<email>kim.phillips@freescale.com</email>
</author>
<published>2011-05-15T03:07:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2930d49768e5276da4fbed9d9cc1bd40ed25818e'/>
<id>urn:sha1:2930d49768e5276da4fbed9d9cc1bd40ed25818e</id>
<content type='text'>
this fixes a build error since cryptodev-2.6 got rebased
to include commit d714d1979d7b4df7e2c127407f4014ce71f73cd0
"dt: eliminate of_platform_driver shim code".

Signed-off-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
