<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/crypto, branch v3.12.10</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/crypto?h=v3.12.10</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/crypto?h=v3.12.10'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2013-09-07T02:53:35Z</updated>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux</title>
<updated>2013-09-07T02:53:35Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2013-09-07T02:53:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=eeca9fad52fc4bfdf42c38bfcf383e932eb3e9d6'/>
<id>urn:sha1:eeca9fad52fc4bfdf42c38bfcf383e932eb3e9d6</id>
<content type='text'>
Merge upstream tree in order to reinstate crct10dif.
</content>
</entry>
<entry>
<title>crypto: nx - fix SHA-2 for chunks bigger than block size</title>
<updated>2013-09-02T10:32:56Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=069fa0453f9dc86fd97dd5b3f5fda4724ed5ff69'/>
<id>urn:sha1:069fa0453f9dc86fd97dd5b3f5fda4724ed5ff69</id>
<content type='text'>
Each call to the co-processor, with exception of the last call, needs to
send data that is multiple of block size. As consequence, any remaining
data is kept in the internal NX context.

This patch fixes a bug in the driver that causes it to save incorrect
data into the context when data is bigger than the block size.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix GCM for zero length messages</title>
<updated>2013-09-02T10:32:55Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=dec0ed6c1b2c8c2aa37c04feccaf4784764c95f1'/>
<id>urn:sha1:dec0ed6c1b2c8c2aa37c04feccaf4784764c95f1</id>
<content type='text'>
The NX CGM implementation doesn't support zero length messages and the
current implementation has two flaws:

 - When the input data length is zero, it ignores the associated data.
 - Even when both lengths are zero, it uses the Crypto API to encrypt a
   zeroed block using ctr(aes) and because of this it allocates a new
   transformation and sets the key for this new tfm. Both operations are
   intended to be used only in user context, while the cryptographic
   operations can be called in both user and softirq contexts.

This patch replaces the nested Crypto API use and adds two special
cases:

 - When input data and associated data lengths are zero: it uses NX ECB
   mode to emulate the encryption of a zeroed block using ctr(aes).
 - When input data is zero and associated data is available: it uses NX
   GMAC mode to calculate the associated data MAC.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix XCBC for zero length messages</title>
<updated>2013-09-02T10:32:55Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=41e3173daf4e2d2f2dcc48ae7ffc8d0c4f3ecec9'/>
<id>urn:sha1:41e3173daf4e2d2f2dcc48ae7ffc8d0c4f3ecec9</id>
<content type='text'>
The NX XCBC implementation doesn't support zero length messages and
because of that NX is currently returning a hard-coded hash for zero
length messages. However this approach is incorrect since the hash value
also depends on which key is used.

This patch removes the hard-coded hash and replace it with an
implementation based on the RFC 3566 using ECB.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-CCM</title>
<updated>2013-09-02T10:32:54Z</updated>
<author>
<name>Fionnuala Gunter</name>
<email>fin@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:37Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2b188b3b86005ca63eb851a1992f06b9a301f800'/>
<id>urn:sha1:2b188b3b86005ca63eb851a1992f06b9a301f800</id>
<content type='text'>
This patch updates the NX driver to perform several hyper calls when necessary
so that the length limits of scatter/gather lists are respected.

Reviewed-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Fionnuala Gunter &lt;fin@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-XCBC</title>
<updated>2013-09-02T10:32:54Z</updated>
<author>
<name>Fionnuala Gunter</name>
<email>fin@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9d6f1a82d3a81d603526980ef705b9ab39f997f3'/>
<id>urn:sha1:9d6f1a82d3a81d603526980ef705b9ab39f997f3</id>
<content type='text'>
This patch updates the NX driver to perform several hyper calls when necessary
so that the length limits of scatter/gather lists are respected.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Reviewed-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Fionnuala Gunter &lt;fin@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-GCM</title>
<updated>2013-09-02T10:32:54Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=799804348d11763b84213156318bb92cb955bfb5'/>
<id>urn:sha1:799804348d11763b84213156318bb92cb955bfb5</id>
<content type='text'>
This patch updates the nx-aes-gcm implementation to perform several
hyper calls if needed in order to always respect the length limits for
scatter/gather lists.

Two different limits are considered:

 - "ibm,max-sg-len": maximum number of bytes of each scatter/gather
   list.

 - "ibm,max-sync-cop":
    - The total number of bytes that a scatter/gather list can hold.
    - The maximum number of elements that a scatter/gather list can have.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-CTR</title>
<updated>2013-09-02T10:32:53Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=884d981b04f3c00f61f4efaf9a93103e01260685'/>
<id>urn:sha1:884d981b04f3c00f61f4efaf9a93103e01260685</id>
<content type='text'>
This patch updates the nx-aes-ctr implementation to perform several
hyper calls if needed in order to always respect the length limits for
scatter/gather lists.

Two different limits are considered:

 - "ibm,max-sg-len": maximum number of bytes of each scatter/gather
   list.

 - "ibm,max-sync-cop":
    - The total number of bytes that a scatter/gather list can hold.
    - The maximum number of elements that a scatter/gather list can have.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-CBC</title>
<updated>2013-09-02T10:32:53Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2d290f0240c682a5dddf6b9ba39460c82f9fdff1'/>
<id>urn:sha1:2d290f0240c682a5dddf6b9ba39460c82f9fdff1</id>
<content type='text'>
This patch updates the nx-aes-cbc implementation to perform several
hyper calls if needed in order to always respect the length limits for
scatter/gather lists.

Two different limits are considered:

 - "ibm,max-sg-len": maximum number of bytes of each scatter/gather
   list.

 - "ibm,max-sync-cop":
    - The total number of bytes that a scatter/gather list can hold.
    - The maximum number of elements that a scatter/gather list can have.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: nx - fix limits to sg lists for AES-ECB</title>
<updated>2013-09-02T10:32:52Z</updated>
<author>
<name>Marcelo Cerri</name>
<email>mhcerri@linux.vnet.ibm.com</email>
</author>
<published>2013-08-29T14:36:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ab74175938c0cd819733e68f5848bb4c818ec7aa'/>
<id>urn:sha1:ab74175938c0cd819733e68f5848bb4c818ec7aa</id>
<content type='text'>
This patch updates the nx-aes-ecb implementation to perform several
hyper calls if needed in order to always respect the length limits for
scatter/gather lists.

Two different limits are considered:

 - "ibm,max-sg-len": maximum number of bytes of each scatter/gather
   list.

 - "ibm,max-sync-cop":
    - The total number of bytes that a scatter/gather list can hold.
    - The maximum number of elements that a scatter/gather list can have.

Reviewed-by: Joy Latten &lt;jmlatten@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Cerri &lt;mhcerri@linux.vnet.ibm.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
